Search for "Jan" returned 8516 results

65 min
The Untold Story of Edward Snowden’s Escape from Hong Kong
and How You Can Help the Refugees Who Saved His Life

62 min
Beginning of the End or End of the Beginning?
An (almost) lifetime in Open Source

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

55 min
The Weakest Link
Wie man mit einem langweiligen Newsletter einen Google oder…

46 min
Objects in the Cloud
How object orientation can be used to solve problems in…

46 min
Signal Intelligence und Electronic Warfare
Wie man nach Hause telefoniert, ohne von einer Rakete…

53 min
Subverting AJAX
Next generation vulnerabilities in 2.0 Web Applications

63 min
Counter-Development
The Accessibility of Technology as an Addendum to…

54 min
Juristische Fragen um die Mitbenutzung fremder WLANs
Zivilrechtliche und strafrechtliche Haftung

68 min
Data Retention Update
News and Perspectives on Implementation and Opposition

53 min
Fuzzing in the corporate world
The use of fuzzing in the corporate world over the years…

62 min
The Story of The Hacker Foundation
Challenges of Organizing a Foundation for Hackers in the USA

57 min
Software Reliability in Aerospace
An overview on design and generation of safe and reliable…

60 min
Faster PwninG Assured
Hardware Hacks and Cracks with FPGAs

58 min
DVB-T - From Pixeldata to COFDM Transmission
How to build a complete FPGA-based DVB-T transmitter

46 min
Automated Exploit Detection in Binaries
Finding exploitable vulnerabilities in binaries

63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem

43 min