Search for "Kat" returned 5493 results
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
29 min
lasers in space
more than just pew pew!
61 min
Uncaging Microchips
Techniques for Chip Preparation
30 min
Shut Up and Take My Money!
The Red Pill of N26 Security
36 min
Modchips of the State
Hardware implants in the supply-chain
54 min
World War II Hackers
Stalin's best men, armed with paper and pen
32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research
54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online
34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…
33 min
Rebel Cities
Towards A Global Network Of Neighbourhoods And Cities…
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
20 min
The Nibbletronic
A DIY MIDI Controller and a New UI for Wind Instruments
61 min
Programming FPGAs with PSHDL
Let's create the Arduino for FPGAs
22 min