Search for "Kat" returned 5621 results

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Think big or care for yourself
32 min

Think big or care for yourself

On the obstacles to think of emergent technologies in the…

Trust us and our business will expand!
22 min

Trust us and our business will expand!

Net-activism strategies against fake web companies

CHINTERNET ART
58 min

CHINTERNET ART

Creativity, Archives & Digital Media from the Chinese…

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

The Precariat: A Disruptive Class for Disruptive Times.
57 min

The Precariat: A Disruptive Class for Disruptive Times.

Why and How the Precariat will define the Global…

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

Ling - High level system programming
34 min

Ling - High level system programming

modular and precise resource management

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Make the Internet Neutral Again
31 min

Make the Internet Neutral Again

Let's put the new EU Net Neutrality rules to work