Search for "m-1-k-3" returned 9406 results
52 min
Personal experiences bringing technology and new media to disaster areas
Experiences from Iraq and post Katrina New Orleans
59 min
Vulnerability markets
What is the economic value of a zero-day exploit?
52 min
Digital Identity and the Ghost in the Machine
"Once I Was Lost But Now I've Been Found"
38 min
Autodafé: An Act of Software Torture
Presentation of an innovative buffer overflow uncovering…
54 min
Collateral Damage
Consequences of Spam and Virus Filtering for the E-Mail…
61 min
PyPy - the new Python implementation on the block
Language/VM R&D, whole program type inference, translation…
62 min
A way to fuzzy democracy
Using modern communication to transform the way we make…
55 min
Technological art off the trodden tracks
Artists (mis)using technology
47 min
Software Patenting
Adequate means of protection for software.
52 min
Military intelligence for terrorists(tm)
A lamer's introduction to retrieving "sensitive"…
35 min
Learning cryptography through handcyphers
Shaping a digital future with ancient wisdom
61 min
The Realtime Podcast
Everything you need to know about Podcasting
43 min
Anonymous Data Broadcasting by Misuse of Satellite ISPs
An open-source project to develop a tool for broadband…
56 min
Corp vs. Corp
Profiling Modern Espionage
60 min
Black Ops Of TCP/IP 2005.5
New Explorations: Large Graphs, Larger Threats
27 min
Message generation at the info layer
Basic introduction in coding on unvirtual realities.
54 min
W3C on Mobile, CSS, Multimodal and more
A look at the upcoming standards by W3C
60 min