Search for "16" returned 4670 results

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Keine Anhaltspunkte für flächendeckende Überwachung
66 min

Keine Anhaltspunkte für flächendeckende Überwachung

Die Diskussion um NSA, PRISM, Tempora sprachlich und…

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology