Search for "Hugo" returned 747 results

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

27 min
Italy's surveillance toolbox
Research on Monitoring Italian Government Surveillance…

31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future

60 min
The Perl Jam 2
The Camel Strikes Back

60 min
Beyond your cable modem
How not to do DOCSIS networks

42 min
Hacking the Nintendo Game & Watch
Your princess is AES encrypted in another castle

41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

47 min
Jailbreaking iOS
From past to present

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

61 min