Search for "atd" returned 7633 results

The hills are alive with the sound of hacking ... don't wake the monkeys!
69 min

The hills are alive with the sound of hacking ... don't wake the monkeys!

The State of the Hack in India. A place to be^W hack in the…

Dockerize stuff
27 min

Dockerize stuff

Postgis swarm and other geo boxes

Gems are truly outrageous
30 min

Gems are truly outrageous

Combining 3D printing and crystallisation techniques

FaceDancer 2.0
61 min

FaceDancer 2.0

easy USB hacking, sniffing, and spoofing

DG73: Hacking with Care
101 min

DG73: Hacking with Care

Tactical and ethical care for all

Space Federation
56 min

Space Federation

Linking and Launching Earth-Based Hackerspaces

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

How medicine discovered sex
54 min

How medicine discovered sex

Introduction to sex- and gender-sensitive medicine

Replacing Docker with Podman
47 min

Replacing Docker with Podman

Simple tool for running pods and containers

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Securing the Campaign
52 min

Securing the Campaign

Security and the 2012 US Presidential Election

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

gpg4libre - OpenPGP signing & encryption in LibreOffice
54 min

gpg4libre - OpenPGP signing & encryption in LibreOffice

Transparently and securely use your existing keys to sign…

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Container Football
61 min

Container Football

for Load Balancing and Hardware Lifecycle

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

SHOULD I STAY OR SHOULD I GO?
46 min

SHOULD I STAY OR SHOULD I GO?

THE ALGORITHMIC PUBLIC SPHERE AND YOU

Working with massively distributed database systems
47 min

Working with massively distributed database systems

The CAP Theorem and Architectual Consequences

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more