Search for person "Thorsten Schröder"
next
22 min
Fighting code-abuse by military and intelligence
59 min
Rechtsbrüche beim Export von Überwachungssoftware
60 min
Managed (Linux-)Desktops auf Basis Freier Software
59 min
...or why we need 17 billion Volts to make a picture.
55 min
Analyse einer Wahlsoftware
52 min
A swiss army knife for automatic social investigation
27 min
How to leverage systemd soft-reboot in openSUSE
63 min
Overview of Current Keylogger Threats
23 min
Don't bring your system down
29 min
How to handle updates of config files in /etc
54 min
Transparently and securely use your existing keys to sign…
45 min
Status Quo and Future Threats
55 min
IT Automatisierung und zentrales Management mit SALT
60 min
Stories from the journey of porting a massive c++…
next