Search for "Kay" returned 3844 results

Hacking Cisco Phones
54 min

Hacking Cisco Phones

Just because you are paranoid doesn't mean your phone isn't…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

SHA2017 Closing
29 min

SHA2017 Closing

Five days of hacking, this is what happened. You wouldn't…

Micro Services
59 min

Micro Services

Vertical thinking for a simple architecture!

A Probabilistic Trust Model for GnuPG
55 min

A Probabilistic Trust Model for GnuPG

A new way of evaluating a PGP web of trust by using a…

Learning from embedded: less is more
26 min

Learning from embedded: less is more

...or how to use any existing SUSE OS variant to meet all…

MISP threat sharing platform
49 min

MISP threat sharing platform

The MISP threat sharing platform is a free and open source…