Search for "26" returned 4318 results

calc.pw
30 min

calc.pw

Passwortgenerierung mit Arduino [Generating passwords with…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Forensic Architecture
43 min

Forensic Architecture

Forensic Architecture is an independent research agency…

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Let’s play Infokrieg
46 min

Let’s play Infokrieg

Wie die radikale Rechte (ihre) Politik gamifiziert

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

2 Takte später
29 min

2 Takte später

30C3S SCE mbH: GEMA-Konkurrenz für Fortgeschrittene

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

The Moon and European Space Exploration
32 min

The Moon and European Space Exploration

Refocusing on the moon as a platform for future deep space…

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks