Search for "mare" returned 5245 results

57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge

60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…

50 min
coreboot: Beyond The Final Frontier
Open source BIOS replacement with a radical approach to…

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

33 min
institutions for Resolution Disputes
Rosa Menkman investigates video compression, feedback, and…

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away

61 min
Hackers As A High-Risk Population
Harm Reduction Methodology

78 min
Stealth malware - can good guys win?
Challenges in detecting system compromises and why we’re so…

55 min
The DROWN Attack
Breaking TLS using SSLv2

50 min
Fnord News Show (English interpretation)
We help in seeing teh Fnords

48 min
Full-Disk-Encryption Crash-Course
Everything to hide

29 min
AppArmor 3 and beyond
riding the Tumbleweed

44 min