Search for "Hugo" returned 741 results

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

60 min
Beyond your cable modem
How not to do DOCSIS networks

41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

47 min
Jailbreaking iOS
From past to present

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

51 min
How to drift with any car
(without your mom yelling at you)

42 min
Union Busting
What is it and why you should care

52 min
SiliVaccine: North Korea's Weapon of Mass Detection
How I Learned to Stop Worrying and Love the Backdoor

29 min
Blinkenrocket!
How to make a community project fly

32 min