Search for "tor" returned 9962 results
29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less
60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…
30 min
Mobile devices and openSUSE, is it posible?
It is time to check if we can use a mobile device with a…
31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers
40 min
The World in 24 Hours Revisited
How to re-enact a 1982 network art performance
29 min
Open vSwitch and DPDK - Your VMs deserve better
Using OvS + DPDK to boost inter-VM network traffic
59 min
10GE monitoring live!
How to find that special one out of millions
53 min
Crouching Powerpoint, Hidden Trojan
An analysis of targeted attacks from 2005 to 2007
43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
37 min
Inertial navigation
Rigid body dynamics and its application to dead reckoning
29 min
Blinkenrocket!
How to make a community project fly
30 min
NFCGate - NFC security analysis with smartphones
Use your smartphone to relay NFC data
55 min
Steal Everything, Kill Everyone, Cause Total Financial Ruin!
Or: How I walked in and misbehaved
61 min
The Realtime Podcast
Everything you need to know about Podcasting
38 min
Multi-Model NoSQL Databases
An introduction to Polyglot persistence and NoSQL
51 min
EFI Rootkits
Abusing your Firmware to backdoor the kernel
50 min