Search for "N-te" returned 8901 results

MySQL Multi-Master Replication Failover - A step-by-step explanation
49 min

MySQL Multi-Master Replication Failover - A step-by-step explanation

How to setup a MySQL cluster with Automatic failover for HA

Are Whistleblowers safer today than they were at OHM2013?
64 min

Are Whistleblowers safer today than they were at OHM2013?

Current case studies of whistleblowing in Europe, and how…

Human body as an electric IO system
61 min

Human body as an electric IO system

Hacking your brain, and other body parts. Debunking myths…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

The JPEG is dead! Long live the JPEG!
51 min

The JPEG is dead! Long live the JPEG!

A tour de force of major developments in open source image…

Linguistic Hacking
58 min

Linguistic Hacking

How to know what a text in an unknown language is about?

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind