Search for "m-1-k-3" returned 9406 results

Writing better code (in Dylan)
59 min

Writing better code (in Dylan)

Fast development of object-oriented functional programs

Cybercrime Convention
57 min

Cybercrime Convention

Hacking on its way to become a criminal act?

Hacking health
47 min

Hacking health

Electronic Patient Records in The Netherlands

Finding and Preventing Buffer Overflows
45 min

Finding and Preventing Buffer Overflows

An overview of static and dynamic approaches

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

TKÜV - Das Ohr am Draht
56 min

TKÜV - Das Ohr am Draht

Recht, Regulierung und Realität der…

Closing Event
30 min

Closing Event

So long and thanks for all the fish

Protesting in the new Millenium
56 min

Protesting in the new Millenium

The Use of Electronic Communications to Protest

The Kernel Accelerator Device
45 min

The Kernel Accelerator Device

Reconfigurable computing for the kernel

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Siegerehrung Lockpicking
61 min

Siegerehrung Lockpicking

8. Deutsche Meisterschaften im Schlossöffnen