Search for "Ron" returned 9425 results
60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…
56 min
Sachsen dreht frei
On- und Offline-Überwachung: Weil sie es können
28 min
Learn how to add functionality to the MySQL server: a guided tour
Hack on the MySQL code for fun and profit !
57 min
“I feel like a criminal and I have to be god at the same time”
Perceptions of hackers and hacktivists on their…
41 min
Reverse Engineering a pocket synthesizer
from nothing to custom firmware on the OP-1
37 min
Creating printable maps
From OpenStreetMap data to large scale maps on paper
49 min
Future 3.0
One Theory on Patterns in Culture, Technology and Commerce
61 min
The A5 Cracking Project
Practical attacks on GSM using GNU Radio and FPGAs
50 min
Connected Mobility hacken: digital.bike.23
Von E-Bikes in der Connected Mobility zur Entstehung eines…
60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…
138 min
Enemies of the State: What Happens When Telling the Truth about Secret US Government…
Blowing the Whistle on Spying, Lying & Illegalities in the…
39 min
Analog Computing
High performance/low power computing based on the analog…
59 min
The Surveillance State limited by acts of courage and conscience
An update on the fate of the Snowden Refugees
50 min
Creating printable maps
From OpenStreetMap data to large scale maps on paper
47 min
All your secrets belong to me
Why you shouldn't store secrets on a mobile device
51 min
Strong encryption of credit card information
Attacks on common failures when encrypting credit card…
64 min
Sovereign Keys
A proposal for fixing attacks on CAs and DNSSEC
21 min
Another Approach to AI
An approach to ethical AI focussed on transparency and…
52 min
DNGerousLINK
A Deep Dive into WhatsApp 0-Click Exploits on iOS and…
57 min
Aus der Debian Appliance in die Deutsche Verwaltungscloud - behalten oder neu machen?
Migration bestehender Softwarestrukturen in DVS konforme…
25 min