Search for "Udo Vetter" returned 1123 results

Top X* usability obstacles
59 min

Top X* usability obstacles

*(will be specified later based on usability test with…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Scuttlebutt
34 min

Scuttlebutt

The decentralized P2P gossip protocol

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Magic Lantern
64 min

Magic Lantern

Free Software on Your Camera

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…