Search for "kay" returned 3681 results
58 min
Cray-1, Ikone des Supercomputing
Wie die Maschine zur Welt kam, und was danach passierte
59 min
Vulnerability markets
What is the economic value of a zero-day exploit?
60 min
The Grand EU Data Protection Reform
A latest battle report by some key actors from Brussels
52 min
The engineering part of social engineering
Why just lying your way in won't get you anywhere
28 min
NSFW: Di[CENSORED]s for privacy
Why not give hackers and agencies something to look at . .
31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future
31 min
The DRM Of Pacman
Copy protection schemes of way back then and how they…
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
61 min
Human body as an electric IO system
Hacking your brain, and other body parts. Debunking myths…
54 min
Hacking Cisco Phones
Just because you are paranoid doesn't mean your phone isn't…
60 min