Search for "Dan" returned 11216 results
71 min
Security in the cardholder data processing?!
Experiences and lessons learned with the Payment Card…
54 min
Unlocking FileVault
An analysis of Apple's encrypted disk storage system
68 min
Überwachungsdruck - einige Experimente
Wie wirkt Überwachung?
72 min
Security Nightmares 2007
Oder: worüber wir nächstes Jahr lachen werden
60 min
Hacking fingerprint recognition systems
Kann ich dir ein Bier ausgeben?
46 min
Freie Software - Eine Chance für Afrika?
Ein Erfahrungsbericht aus Malawi
40 min
Pornography and Technology
a love affair
53 min
Subverting AJAX
Next generation vulnerabilities in 2.0 Web Applications
63 min
Counter-Development
The Accessibility of Technology as an Addendum to…
68 min
Data Retention Update
News and Perspectives on Implementation and Opposition
53 min
Fuzzing in the corporate world
The use of fuzzing in the corporate world over the years…
60 min
Faster PwninG Assured
Hardware Hacks and Cracks with FPGAs
46 min
Automated Exploit Detection in Binaries
Finding exploitable vulnerabilities in binaries
63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem
45 min
Homegrown Interactive Tables
Any Technology Sufficiently Advanced is Indistinguishable…
61 min
CSRF, the Intranet and You
Causes, Attacks and Countermeasures
54 min
Juristische Fragen um die Mitbenutzung fremder WLANs
Zivilrechtliche und strafrechtliche Haftung
58 min