Search for "csk" returned 1265 results

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

43 min
#xfilesgdpr
Datenschutz-Mythen aus 5 Jahren DS-GVO

46 min
Writing secure software
using my blog as example

71 min
37C3 Infrastructure Review
Teams presenting how they helped making this awesome event

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

31 min
Buffered Daemons
Sound art performance exploring the concept of translation…

37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…

55 min
YOU’VE JUST BEEN FUCKED BY PSYOPS
UFOS, MAGIC, MIND CONTROL, ELECTRONIC WARFARE, AI, AND THE…

40 min
A year of surveillance in France: a short satirical tale by La Quadrature du Net
From the so-called Country of human rights to a…

44 min
So you're interested in social engineering?
The very first steps

42 min
Vom Darkroom in die Blackbox
Effekte der Digitalisierung auf (schwules) Dating

61 min
DevOps but for artworks in museums
A look into pipelines ending in museums and not in the cloud

95 min