Search for ".uje" returned 3167 results

How not to use OAuth
56 min

How not to use OAuth

New security recommendations for OAuth

Regulating Law Enforcement use of Trojans
49 min

Regulating Law Enforcement use of Trojans

Implementing a Law to juridically, operationally and…

Which network to use when - Socket Intents
39 min

Which network to use when - Socket Intents

Hacking the Socket API for fun and research

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Designing a 3D printed tool for medical use
38 min

Designing a 3D printed tool for medical use

From reverse engineering to iterative design

Enlightenment? What is it? Why should you use it?
30 min

Enlightenment? What is it? Why should you use it?

An Introduction to the most used Linux Desktop*