Search for "kay" returned 3838 results
30 min
Mobile devices and openSUSE, is it posible?
It is time to check if we can use a mobile device with a…
37 min
Self-documenting computation
What is the best way to present programs to non-programmers?
76 min
Linux - warum wechseln?
Wie ich zu Linux kam - und warum ich dabei bleibe
45 min
Implementation of MITM Attack on HDCP-Secured Links
A non-copyright circumventing application of the HDCP…
60 min
The Grand EU Data Protection Reform
A latest battle report by some key actors from Brussels
52 min
The engineering part of social engineering
Why just lying your way in won't get you anywhere
58 min
Cray-1, Ikone des Supercomputing
Wie die Maschine zur Welt kam, und was danach passierte
59 min
Vulnerability markets
What is the economic value of a zero-day exploit?
32 min
Live: Avahi / Zeroconf: Some magic sauce that's about more than files and printers
Hand editing config files for local deployment? Say hi to…
31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future
28 min
NSFW: Di[CENSORED]s for privacy
Why not give hackers and agencies something to look at . .
61 min
Human body as an electric IO system
Hacking your brain, and other body parts. Debunking myths…
31 min
The DRM Of Pacman
Copy protection schemes of way back then and how they…
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
60 min