Search for "Seth Hardy" returned 899 results
33 min
Beyond Virtual and Augmented Reality
From Superhuman Sports to Amplifying Human Senses
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…
61 min
Email authentication for penetration testers
When SPF is not enough
44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers
61 min
Uncaging Microchips
Techniques for Chip Preparation
42 min
Hacking the Nintendo Game & Watch
Your princess is AES encrypted in another castle
62 min
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Der Protest gegen TTIP und CETA
39 min
The Eye on the Nile
Egypt's Civil Society Under Attack
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
31 min
The Economic Consequences of Internet Censorship
Why Censorship is a Bad Idea for Everyone
58 min
RFID Treehouse of Horror
Hacking City-Wide Access Control Systems
62 min