Search for "Bea" returned 6111 results

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Art against Facebook
40 min

Art against Facebook

Graffiti in the ruins of the feed and the…

Hebocon
36 min

Hebocon

The sumo robot fight for the technically ungifted

the possibility of an army
60 min

the possibility of an army

phone verified accounts bringing the Hessian army back to…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

The Pirate Cinema
29 min

The Pirate Cinema

Creating mash-up movies by hidden activity and geography of…

Structuring open hardware projects
33 min

Structuring open hardware projects

experiences from the “i3 Berlin” 3D printer project with…

“Nabovarme” opensource heating infrastructure in Christiania
30 min

“Nabovarme” opensource heating infrastructure in Christiania

Freetown Christiania´s digitally controlled/surveyed…

Media Coverage and the Public in the Surveillance Society
60 min

Media Coverage and the Public in the Surveillance Society

Findings from a Research Project on Digital Surveillance…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

The Nibbletronic
20 min

The Nibbletronic

A DIY MIDI Controller and a New UI for Wind Instruments

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols