Search for "ths" returned 9096 results

Roadrunner: Securing services with LetsEncrypt
34 min

Roadrunner: Securing services with LetsEncrypt

Why you should no longer be afraid of using TLS

Robot Music
33 min

Robot Music

The Robots Play Our Music and What Do We Do?

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

Modular Web
55 min

Modular Web

New ways for free software developers to shape the world.

Does Hacktivism Matter?
49 min

Does Hacktivism Matter?

How the Btx hack changed computer law-making in Germany

Certified programming with dependent types
86 min

Certified programming with dependent types

Because the future of defense is liberal application of math

FabLabs are not Hackerspaces!
45 min

FabLabs are not Hackerspaces!

The story of an art driven 3D printing research facility

openSUSE ALP prototype on AWS, experimental, but fun!
31 min

openSUSE ALP prototype on AWS, experimental, but fun!

Experiences, challenges and how SUSE NeuVector came into…

DevOps but for artworks in museums
61 min

DevOps but for artworks in museums

A look into pipelines ending in museums and not in the cloud

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Mangrove Conservation via Satellite
32 min

Mangrove Conservation via Satellite

using the latest technology to map and monitor mangroves

Music on Mars?
37 min

Music on Mars?

A Musical Adventure for Astronauts and the Space Cadets Who…

Heroes, not Superheroes
27 min

Heroes, not Superheroes

What the Heroes would prefer not to tell you ;-)

Dynamic Malware Analysis on Android Phones
44 min

Dynamic Malware Analysis on Android Phones

Presentation of the DyAnA Framework (Dynamic Android…

Fokussiertes Arbeiten mit Mylyn
48 min

Fokussiertes Arbeiten mit Mylyn

Effectively use the integrated Task-focused UI in Eclipse

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

LibreRouter demo
40 min

LibreRouter demo

Lessons learned developing open source hardware for the…

Legacy Crypto Never Dies
44 min

Legacy Crypto Never Dies

Cracking DES nearly 20 years after the EFF DES Cracker

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Oil Into Digits
48 min

Oil Into Digits

A short exploration of the relation between energy and…

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"
68 min

"Spoilers, Reverse Green, DECEL!" or "What's it doing now?"

Thoughts on the Automation and its Human interfaces on…

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…