Search for "272" returned 2180 results
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
60 min
Best of Informationsfreiheit
Transparenz mit der Brechstange
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
53 min
When algorithms fail in our personal lives
Social media break up coordinator
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
54 min
10 Jahre OpenStreetMap
Wir leben noch und zwar sehr gut.
69 min
Telescope Making
How to make your own telescope
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
58 min
Virtual Machine Introspection
From the Outside Looking In
57 min
Hello World!
How to make art after Snowden?
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
43 min
Hirne Hacken
Menschliche Faktoren der IT-Sicherheit
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…
67 min