Search for "Isa" returned 9561 results
98 min
The Grim Meathook Future
How The Tech Culture Can Maintain Relevance In The 21st…
56 min
Applied Research on security of TETRA radio
digital radio technology beyond GSM
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
53 min
WarTracking
Satellite Tracking, harvesting and security
57 min
600k QPS on MySQL Galera cluster
the tale of 600.000 queries per second
63 min
Power gadgets with your own electricity
escape the basement and make the sun work for you
52 min
TLS interception considered harmful
How Man-in-the-Middle filtering solutions harm the security…
47 min
A not so smart card
How bad security decisions can ruin a debit card design
41 min
Pixelflut: Multiplayer canvas
What happens if you give a bunch of hackers the ability to…
64 min
Who can you trust?
A trust metric for the openSUSE buildservice
26 min
for women in "${tech[@]}"; do
Let's talk, share and learn from each other.
39 min
Transmission Control Protocol
TCP/IP basics
30 min
Electroedibles
Open Source Hardware for Smart Candies
50 min
Modern Software Packaging for Developers
Wait, how to install your FOSS project again?
101 min