Search for "tor" returned 10373 results

*sing* %post and %pre and securiteeee
27 min

*sing* %post and %pre and securiteeee

How not to get a CVE assigned while packaging

What de.fac2?
29 min

What de.fac2?

Attacking an opensource U2F device in 30 minutes or less

Artistic PCB Design and Fabrication
36 min

Artistic PCB Design and Fabrication

From doodle to manufacture: how I make mechanically…

Mining Search Queries
49 min

Mining Search Queries

How to discover additional knowledge in the AOL query logs

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

Mobile devices and openSUSE, is it posible?
30 min

Mobile devices and openSUSE, is it posible?

It is time to check if we can use a mobile device with a…

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers

The World in 24 Hours Revisited
40 min

The World in 24 Hours Revisited

How to re-enact a 1982 network art performance

Open vSwitch and DPDK - Your VMs deserve better
29 min

Open vSwitch and DPDK - Your VMs deserve better

Using OvS + DPDK to boost inter-VM network traffic

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

Inertial navigation
37 min

Inertial navigation

Rigid body dynamics and its application to dead reckoning

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Artist Talk
43 min

Artist Talk

We Show You What You Want To See

Weaponized Social
35 min

Weaponized Social

Understanding and tools to mitigate network-scale violences

MySQL Plugins - what are they ?
41 min

MySQL Plugins - what are they ?

how can you use them to do wonders

Atomic Updates - and /etc?
29 min

Atomic Updates - and /etc?

How to handle updates of config files in /etc

Creating printable maps
37 min

Creating printable maps

From OpenStreetMap data to large scale maps on paper