Search for "ths" returned 9096 results

Remote Attestation in MicroOS
35 min

Remote Attestation in MicroOS

Measuring the health of our system with a TPM

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

Uyuni: introduction, last year's updates and future
25 min

Uyuni: introduction, last year's updates and future

What is Uyuni? - What's been going on the last year? -…

Generating uniqueness
45 min

Generating uniqueness

How generative art pushes the boundaries of intellectual…

EOS Design System
30 min

EOS Design System

The solution to bring good UX to all OSS

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Singing Mainframes
65 min

Singing Mainframes

An Unofficial History of the Dawn of Computer Music

openSUSE is what you make it
38 min

openSUSE is what you make it

How to change anything you want in the project

Satellite Imagery in Agriculture
30 min

Satellite Imagery in Agriculture

Questioning privacy, data protection, and autonomy in the…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

Buffering sucks!
60 min

Buffering sucks!

An attempt of calculating the economic cost of buffering.

Reverse Engineering a pocket synthesizer
41 min

Reverse Engineering a pocket synthesizer

from nothing to custom firmware on the OP-1

DNF vs ZYpp: Fight!
32 min

DNF vs ZYpp: Fight!

A comparison of the two major RPM package managers

Regulating Autonomous Weapons
25 min

Regulating Autonomous Weapons

The time travelling android isn’t even our biggest problem

Social cooling
33 min

Social cooling

How the reputation economy is turning us into conformists

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Unlocked! Recovering files taken hostage by ransomware
40 min

Unlocked! Recovering files taken hostage by ransomware

Decrypting files hijacked by the "second most used…