Events for tag "22c3"
51 min
Elevated to the Next Level
47 min
Electronic Patient Records in The Netherlands
56 min
Rechtliche und technische Aspekte
56 min
Profiling Modern Espionage
43 min
Ein Überblick über die Aktivitäten des Clubs 2005
59 min
The good, the bad, and the ugly
56 min
The Saga continues: Search Engines, Technology, Politics,…
44 min
Eine gut strukturierte Sprache für Geeks und die EU
47 min
Adequate means of protection for software.
63 min
Männliche Identitätskonstruktion und spielerische…
65 min
Nine five minutes talks by various speakers
38 min
Presentation of an innovative buffer overflow uncovering…
69 min
Verschwörungstheoretiker sind hinter mir her!
44 min
What the heck is realtime - and what to do with it
59 min
Why German voting machines do not meet the requirements of…
58 min
Innovation, user-creation, activism and entrepreneurship in…
43 min
An open-source project to develop a tool for broadband…
59 min
The fascinating interplay of CPU, stack, C-compiler and…
53 min
How the games have become the first digital mass product
57 min
Hacking on its way to become a criminal act?
52 min
"Once I Was Lost But Now I've Been Found"
54 min
What the WTO Treaty did in Hongkong and what that means for…
65 min
Philosophische Grundlagen technischer Wissenschaften
66 min
Learn how to effectively protect not only your data but…
54 min
First-ever pan-national official occasion.
42 min
Five Years after the announcement of a quasi moratorium
43 min
Nine five minutes talks by various speakers
67 min
Buckminster Fullers Theorie und Praxis einer Wissenschaft…
61 min
Language/VM R&D, whole program type inference, translation…
47 min
ISO14443, ISO15693, their GPL librfid implementation and…
93 min
A roundup and live demonstrations of all currently known…
59 min
Ansätze für die Regulierung von VoIP und NGN im vergangenen…
55 min
How to turn your idea into a standard
54 min
Ubiquitous wireless mesh clouds with olsrd from olsr.org
51 min
How to build your own radar system
53 min
How to find any book (and many other roadkills) on the…
45 min
Background information on CIPHER, an international…
49 min
Nine five minutes talks by various speakers
49 min
Vorläufige und subjektive Gedanken zur inhaltlichen…
54 min
A look at the upcoming standards by W3C
27 min
Basic introduction in coding on unvirtual realities.
55 min
Artists (mis)using technology
53 min
Biometrische Feldtests in Europa
58 min
A new approach to copyright in the digital world
45 min
An overview of static and dynamic approaches
45 min
On automated video analysis of human behaviour
46 min
Was ist denn nun eigentlich so ein 'Interrupt'?
49 min
Copyright, Patents and Politics at the World Intellectual…
107 min
The one and only hacker quizshow
56 min
Reverse Engineering the Motorola EZX (A768,A780,E680)…
64 min
Computing of Tomorrow or Yesterday
46 min
Chasing hackers with a bunch of monkeys
60 min
How does the brain learn to think?
50 min
oder: "Über meine Maßnahmen gebe ich keine Auskunft"
64 min
Oder: worüber wir nächstes Jahr lachen werden
62 min
Using modern communication to transform the way we make…
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
48 min
Datenkraken beim Kragen packen
47 min
An in-depth look at p2p algorithmics
53 min
A concise introduction to what NT is, what it can't do yet…
49 min
Introduction to SIP Hacking
57 min
Videoüberwachung am Beispiel des Congressgebäudes
49 min
Brief Introduction into Machine Learning followed by…
59 min
A Hackers' /Spoken/ Language?!
49 min
Introduction to syscall proxying and applications for in…
53 min
IT Security and Human Rights organizations - The needs, the…
56 min
Über die Durchsetzung industrieller Interessen um jeden…
107 min
Breaking software in an automated fashion
54 min
Free/Open Source Software and the Digital Divide
35 min
Shaping a digital future with ancient wisdom
52 min
Experiences from Iraq and post Katrina New Orleans
54 min
Consequences of Spam and Virus Filtering for the E-Mail…
49 min
MMIrDA - Major Malfunction's InfraRed Discovery Application
49 min
How bureaucrats fail to fight terror
55 min
The "anyOS" paradigm and its implications through…
53 min
Wie überlebe ich (ohne nennenswerten Schäden) einen…
59 min
Exploring the huge space of possible cellular automata by…
60 min
New Explorations: Large Graphs, Larger Threats
57 min
Why developing Secure Software is like playing Marble…
113 min
17 Mistakes Microsoft Made in the Xbox Security System &…
37 min
Nine five minutes talks by various speakers
59 min
What is the economic value of a zero-day exploit?
53 min
Satellite Tracking, harvesting and security
73 min
Welcome to the world of tomorrow
61 min
Everything you need to know about Podcasting
53 min
Fakten, Mythen, Geschichte(n) und mögliche Zukünfte
52 min
Commission vs. Council - the lesser of two evils?
64 min
An investigation into intransparency
52 min
Wireless connections of 20km and more
64 min
A major new version of freenet
46 min
Ein audiovisuelles Live-Feature
53 min
Erfahrungen aus der Praxis
167 min
Eine unendliche Geschichte - Kapitel: Die Sümpfe der…
42 min
Creation and detection of IP steganography for covert…
52 min
Reverse-Engineering des Embedded-Linux-Navigationssystems
46 min
Abschluss des CCC-Poesie-Wettbewerbs
49 min
Old Laws and New Technology the German Way
58 min
Opening Show and Keynote Speech
56 min
Watching the watchers, having fun with cctv cameras, making…
58 min
Sprint methodology in funded OSS projects
52 min
Scanning your GPRS/UMTS IP network for fun and profit
53 min
Teach yourself upper management in 22 days
60 min
Strategic considerations in the copyfight.
52 min
A lamer's introduction to retrieving "sensitive"…
59 min
Fast development of object-oriented functional programs