Search for "m-1-k-3" returned 9403 results

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

CCC Camp 2011 Video Impressions
43 min

CCC Camp 2011 Video Impressions

Reviving a nice summer dream

The best of The oXcars
53 min

The best of The oXcars

the greatest free/Libre culture show of all times

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Hacker Jeopardy
116 min

Hacker Jeopardy

Number guessing for geeks

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
57 min

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast…

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web