Search for "【"W" returned 10204 results

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Hacker Jeopardy
116 min

Hacker Jeopardy

Number guessing for geeks

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
57 min

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast…

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

The coming war on general computation
54 min

The coming war on general computation

The copyright war was just the beginning

Does Hacktivism Matter?
49 min

Does Hacktivism Matter?

How the Btx hack changed computer law-making in Germany

The movements against state-controlled Internet in Turkey
62 min

The movements against state-controlled Internet in Turkey

A short account of its history and future challenges

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1