Search for "629" returned 1976 results
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…
62 min
Public Library/Memory of the World
Access to knowledge for every member of society
60 min
So you want to build a satellite?
How hard can it be? An introduction into CubeSat development
61 min
Copywrongs 2.0
We must prevent EU copyright reform from breaking the…
61 min
Correcting copywrongs
European copyright reform is finally on the horizon
61 min
An Elevator to the Moon (and back)
Space Transportation and the Extraterrestrial Imperative
63 min
Building Custom Pinball Machines
What you need and how it works. An experiences report
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
61 min
25 Jahre Chipkarten-Angriffe
Von der Historie zur Zukunft
62 min
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Der Protest gegen TTIP und CETA
61 min
Now I sprinkle thee with crypto dust
Internet reengineering session
60 min
Das Zahnrad aus Fleisch
Expeditionen ins Kommentierreich
31 min
Media Disruption Led By The Blind
Hacking Visual Culture
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…
38 min