Search for "Lisa"

PrivacyScore.org
39 min

PrivacyScore.org

Test websites and rank them according to their security and…

Die göttliche Informatik
61 min

Die göttliche Informatik

Die Informatik löst formale (mathematisch modellierte)…

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

An academic's view to incident response
52 min

An academic's view to incident response

It's all fun and games until reality starts kicking you in…

OWASP ProActive Controls
69 min

OWASP ProActive Controls

Sichere Anwendungen erstellen?

Embedded device security nightmares
46 min

Embedded device security nightmares

An Introduction to the usual mistakes

Open Emacs Workshop (join anytime)
108 min

Open Emacs Workshop (join anytime)

An introduction to the Lispers' editor of choice

BuggedPlanet
51 min

BuggedPlanet

Surveillance Industry & Country's Actings

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes