Search for "fake"

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

Safety on the Open Sea
59 min

Safety on the Open Sea

Safe navigation with the aid of an open sea chart.

Biohacking in art
56 min

Biohacking in art

An interdisciplinary foray from slime moulds to fungi and…

3D Printing High-Quality Low-Cost Free Medical Hardware
48 min

3D Printing High-Quality Low-Cost Free Medical Hardware

Making medical devices accessible and hackable for all

Business Applications as Free Software - Demystifying FUD
41 min

Business Applications as Free Software - Demystifying FUD

You should not believe everything that Big Money tells…