Search for "fake" returned 2640 results

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

The Cell Processor
64 min

The Cell Processor

Computing of Tomorrow or Yesterday

A way to fuzzy democracy
62 min

A way to fuzzy democracy

Using modern communication to transform the way we make…

We don't trust voting computers
138 min

We don't trust voting computers

The story of the dutch campaign against black-box voting to…

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

Vehicular Communication and VANETs
62 min

Vehicular Communication and VANETs

The future and security of communicating vehicles

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

Trust Your Eyes
36 min

Trust Your Eyes

Grundlagen der Visualisierung und wie man mit…

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…