Search for "tor" returned 10368 results

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Bintracker
23 min

Bintracker

A chiptune audio workstation for the 21st century

GeoHealthCheck
25 min

GeoHealthCheck

Uptime and QoS monitor for geospatial web-services

Terraforming Planet Earth
58 min

Terraforming Planet Earth

Practical terraforming technologies for regenerating soils…

What is forensic software doing in journalism (and elsewhere)?
48 min

What is forensic software doing in journalism (and elsewhere)?

We have too much data: Watch. Suggest. Help.

Open source experimental incubator build up
33 min

Open source experimental incubator build up

call for participation in project and product development

Information Centric Networking
45 min

Information Centric Networking

A radically new paradigm for the future internet

Openmoko: 5 years after – What's left behind.
56 min

Openmoko: 5 years after – What's left behind.

Free software and hardware projects for mobile communication

Wrangling Git
50 min

Wrangling Git

Git power tips for the intermediate Git user

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash