Search for "fake"
prev
next
26 min
From upstream source code to Leap packaged application
29 min
Technical Teardown of the Pegasus malware and Trident…
52 min
Who is the root on your router?
50 min
An explanation of Inter-Net and everyday protocols
48 min
Post-Exploitation Fun in Windows Environments
60 min
A critical talk about sustainability, technology, society,…
41 min
From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…
33 min
How do I manage such a big cluster?
prev
next