Events for tag "25c3"

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Der elektronische Personalausweis
60 min

Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

Neusprech im Überwachungsstaat
70 min

Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online

Terrorist All-Stars
65 min

Terrorist All-Stars

Some cases of terrorism around the world that are not…

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Fnord News Show
50 min

Fnord News Show

Wir helfen Euch, die Fnords zu sehen

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

Scalable Swarm Robotics
39 min

Scalable Swarm Robotics

Formica: a cheap, open research platform

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

U23
49 min

U23

The Hackerspace's Junior Academy

The Trust Situation
60 min

The Trust Situation

Why the idea of data protection slowly turns out to be…

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Erich Mühsams Tagebücher in der Festungshaft
51 min

Erich Mühsams Tagebücher in der Festungshaft

Ein Idylle aus der Analogsteinzeit der Überwachung

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

Beyond Asimov - Laws for Robots
49 min

Beyond Asimov - Laws for Robots

Developing rules for autonomous systems

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

About Cyborgs and Gargoyles
44 min

About Cyborgs and Gargoyles

State of the Art in Wearable Computing

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Zehn Big Brother Awards in .at
57 min

Zehn Big Brother Awards in .at

Rückblick über eine bewegte Zeit

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Just Estonia and Georgia?
44 min

Just Estonia and Georgia?

Global-scale Incident Response and Responders

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

Solar-powering your Geek Gear
28 min

Solar-powering your Geek Gear

Alternative and mobile power for all your little toys

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Embracing Post-Privacy
59 min

Embracing Post-Privacy

Optimism towards a future where there is "Nothing to hide"

All your base(s) are belong to us
55 min

All your base(s) are belong to us

Dawn of the high-throughput DNA sequencing era

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Wikileaks
58 min

Wikileaks

Wikileaks vs. the World

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

Hacker Jeopardy
103 min

Hacker Jeopardy

Die ultimative Hacker-Quizshow

Flying for free
60 min

Flying for free

Exploiting the weather with unpowered aircraft

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…