Search for "Ben" returned 9329 results

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

From robot to robot
47 min

From robot to robot

Restoring creativity in school pupils using robotics

Software Patenting
47 min

Software Patenting

Adequate means of protection for software.

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

Rebellious Communication and the Federal Flood
47 min

Rebellious Communication and the Federal Flood

My experience and the role of bloggers, podcasters, and…

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

Hacking Space
37 min

Hacking Space

Cheap access to Space using lighter then air methods

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

Hacking the Bionic Man
47 min

Hacking the Bionic Man

Science fiction or security in 2040?

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

Safecast: DIY and citizen-sensing of radiation
49 min

Safecast: DIY and citizen-sensing of radiation

Empowering citizen in the wake of Fukushima triple-meltdown…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software