Search for "Ben" returned 8729 results

138 min
Enemies of the State: What Happens When Telling the Truth about Secret US Government…
Blowing the Whistle on Spying, Lying & Illegalities in the…

62 min
I Control Your Code
Attack Vectors Through the Eyes of Software-based Fault…

61 min
Attacking Rich Internet Applications
Not your mother's XSS bugs

58 min
Advanced memory forensics: The Cold Boot Attacks
Recovering keys and other secrets after power off

56 min
Anatomy of smartphone hardware
Dissecting contemporary cellphone hardware

52 min
3G Investigations
Scanning your GPRS/UMTS IP network for fun and profit

47 min
String Oriented Programming
Circumventing ASLR, DEP, and Other Guards

56 min
JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
a dump of simple tools for embedded analysis at many layers

56 min
The importance of resisting Excessive Government Surveillance
Join me in exposing and challenging the constant violations…

49 min
A short political history of acoustics
For whom, and to do what, the science of sound was…

55 min
Desktop on the Linux... (and BSD, of course)
you're doing it confused? weird? strange? wrong?

26 min
ChokePointProject - Quis custodiet ipsos custodes?
Aggregating and Visualizing (lack of) Transparancy Data in…

59 min
Logical Language Lojban
A Hackers' /Spoken/ Language?!

45 min
Finding and Preventing Buffer Overflows
An overview of static and dynamic approaches

51 min
I See Airplanes!
How to build your own radar system

27 min
Romantic Hackers
Keats, Wordsworth and Total Surveillance

30 min
Open source photovoltaics
power for off-grid devices

63 min
Print Me If You Dare
Firmware Modification Attacks and the Rise of Printer…

53 min
A Case Against C++
Why C++ is bad for the environment, causes global warming…

54 min