Search for "W. Heck" returned 1206 results

43 min
#NoPNR – Let’s kill the next Data Retention Law
How to Stop the Dubious Use of Passenger Name Records by…

30 min
Science is broken
How much can we trust science in light failed replications,…

46 min
Writing secure software
using my blog as example

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)

60 min
Beyond your cable modem
How not to do DOCSIS networks

43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…

59 min
Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?

44 min
So you're interested in social engineering?
The very first steps

42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

61 min
DevOps but for artworks in museums
A look into pipelines ending in museums and not in the cloud

47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows

58 min
A Libyan Militia and the EU - A Love Story?
Open-Source investigating Tareq Ben Zeyad Brigade and their…

40 min
The Great Escape of ESXi
Breaking Out of a Sandboxed Virtual Machine

41 min