Search for "m-1-k-3" returned 9406 results

Lyrical I
46 min

Lyrical I

Abschluss des CCC-Poesie-Wettbewerbs

Vulnerability markets
59 min

Vulnerability markets

What is the economic value of a zero-day exploit?

Autodafé: An Act of Software Torture
38 min

Autodafé: An Act of Software Torture

Presentation of an innovative buffer overflow uncovering…

Collateral Damage
54 min

Collateral Damage

Consequences of Spam and Virus Filtering for the E-Mail…

PyPy - the new Python implementation on the block
61 min

PyPy - the new Python implementation on the block

Language/VM R&D, whole program type inference, translation…

A way to fuzzy democracy
62 min

A way to fuzzy democracy

Using modern communication to transform the way we make…

Software Patenting
47 min

Software Patenting

Adequate means of protection for software.

Military intelligence for terrorists(tm)
52 min

Military intelligence for terrorists(tm)

A lamer's introduction to retrieving "sensitive"…

Learning cryptography through handcyphers
35 min

Learning cryptography through handcyphers

Shaping a digital future with ancient wisdom

The Realtime Podcast
61 min

The Realtime Podcast

Everything you need to know about Podcasting

Anonymous Data Broadcasting by Misuse of Satellite ISPs
43 min

Anonymous Data Broadcasting by Misuse of Satellite ISPs

An open-source project to develop a tool for broadband…

Black Ops Of TCP/IP 2005.5
60 min

Black Ops Of TCP/IP 2005.5

New Explorations: Large Graphs, Larger Threats

Message generation at the info layer
27 min

Message generation at the info layer

Basic introduction in coding on unvirtual realities.

W3C on Mobile, CSS, Multimodal and more
54 min

W3C on Mobile, CSS, Multimodal and more

A look at the upcoming standards by W3C

Bad TRIPs
54 min

Bad TRIPs

What the WTO Treaty did in Hongkong and what that means for…