Search for "Isa" returned 9095 results

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Test-Driven Web Development
47 min

Test-Driven Web Development

Treating your web application like the grown-up it is

Funkerspuk
52 min

Funkerspuk

radio politics in the USA and Germany in the first half of…

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

Fileserver online
54 min

Fileserver online

Fileserver ausschließlich online? Oder in Kombination mit…

Let's roll out mass encryption!
58 min

Let's roll out mass encryption!

'Cause mass surveillance is there for too long already

Social cooling
33 min

Social cooling

How the reputation economy is turning us into conformists

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

Embracing Post-Privacy
59 min

Embracing Post-Privacy

Optimism towards a future where there is "Nothing to hide"

GPS-Trackers
48 min

GPS-Trackers

How they track you when your mobile is switched off

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

Uyuni: introduction, last year's updates and future
25 min

Uyuni: introduction, last year's updates and future

What is Uyuni? - What's been going on the last year? -…

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

The year of Linux On Desktop^WMobile
53 min

The year of Linux On Desktop^WMobile

How the quest for mainline Linux on mobile phones is faring

Testing software on multiple Linux distributions
39 min

Testing software on multiple Linux distributions

How Cockpit is tested on multiple distributions and…

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…

Vulnerability markets
59 min

Vulnerability markets

What is the economic value of a zero-day exploit?

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Linguistic Hacking
58 min

Linguistic Hacking

How to know what a text in an unknown language is about?

DMX Workshop
41 min

DMX Workshop

Was ist DMX, wozu braucht man das, was macht es, ist es…

News on Colliding Hashes
31 min

News on Colliding Hashes

The ball is rolling: One of the biggest challenges in…