Search for "【"W" returned 10201 results
55 min
Cyber Necromancy
Reverse Engineering Dead Protocols
62 min
Tell no-one
A century of secret deals between the NSA and the telecom…
61 min
Uncaging Microchips
Techniques for Chip Preparation
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
58 min
Switches Get Stitches
Industrial System Ownership
53 min
From Maxwell to antenna arrays
How 150 year old equations still help to communicate
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?
59 min
Towards General Purpose Reconfigurable Computing on Novena
FPGAs for Everybody with Novena
62 min
Space Hacker
Uploading rover...
60 min
Ich sehe, also bin ich ... Du
Gefahren von Kameras für (biometrische)…
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
54 min
10 Jahre OpenStreetMap
Wir leben noch und zwar sehr gut.
65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets
50 min