Search for "【"W" returned 10204 results
40 min
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy
56 min
Effective Denial of Service attacks against web application platforms
We are the 99% (CPU usage)
62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
53 min
Building a Distributed Satellite Ground Station Network - A Call To Arms
Hackers need satellites. Hackers need internet over…
57 min
Hacking MFPs
Part2 - PostScript: Um, you've been hacked
116 min
Hacker Jeopardy
Number guessing for geeks
45 min
Crowdsourcing Genome Wide Association Studies
Freeing Genetic Data from Corporate Vaults
62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
26 min
Don't scan, just ask
A new approach of identifying vulnerable web applications
57 min
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
Lessons learned from producing a weekly independent podcast…
56 min
Rootkits in your Web application
Achieving a permanent stealthy compromise of user accounts…
26 min
Data Mining the Israeli Census
Insights into a publicly available registry
61 min
Time is on my Side
Exploiting Timing Side Channel Vulnerabilities on the Web
54 min
Datamining for Hackers
Encrypted Traffic Mining
60 min
The Atari 2600 Video Computer System: The Ultimate Talk
The history, the hardware and how to write programs
62 min
Automatic Algorithm Invention with a GPU
Hell Yeah, it's rocket science
54 min
The coming war on general computation
The copyright war was just the beginning
49 min
Does Hacktivism Matter?
How the Btx hack changed computer law-making in Germany
60 min
What is WhiteIT and what does it aim for?
Why you probably want to be concerned about it and similiar…
62 min
The movements against state-controlled Internet in Turkey
A short account of its history and future challenges
57 min