Search for "m-1-k-3" returned 9406 results
59 min
Writing better code (in Dylan)
Fast development of object-oriented functional programs
57 min
Cybercrime Convention
Hacking on its way to become a criminal act?
47 min
Hacking health
Electronic Patient Records in The Netherlands
45 min
Finding and Preventing Buffer Overflows
An overview of static and dynamic approaches
49 min
Hacking Data Retention
How bureaucrats fail to fight terror
49 min
VoIPhreaking
Introduction to SIP Hacking
47 min
Peer-to-peer under the hood
An in-depth look at p2p algorithmics
42 min
Covert channels in TCP/IP: attack and defence
Creation and detection of IP steganography for covert…
64 min
A guided tour to European IT lobbying
An investigation into intransparency
45 min
Hopalong Casualty
On automated video analysis of human behaviour
49 min
Syscall proxying fun and applications
Introduction to syscall proxying and applications for in…
59 min
Understanding buffer overflow exploitation
The fascinating interplay of CPU, stack, C-compiler and…
46 min
Secure Instant Messaging
Suppression of secure communications by governments
56 min
TKÜV - Das Ohr am Draht
Recht, Regulierung und Realität der…
30 min
Closing Event
So long and thanks for all the fish
56 min
Protesting in the new Millenium
The Use of Electronic Communications to Protest
45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel
52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac
61 min