Search for "m-1-k-3" returned 9403 results

How the Internet sees you
58 min

How the Internet sees you

demonstrating what activities most ISPs see you doing on…

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

International Cyber Jurisdiction
59 min

International Cyber Jurisdiction

Kill Switching” Cyberspace, Cyber Criminal Prosecution &…

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

Hacker Jeopardy
134 min

Hacker Jeopardy

Number guessing for geeks

Safety on the Open Sea
59 min

Safety on the Open Sea

Safe navigation with the aid of an open sea chart.

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

IMMI, from concept to reality
56 min

IMMI, from concept to reality

The Icelandic Modern Media Initiative and our need for a…

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP