Search for "Jan" returned 8516 results

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Beginning of the End or End of the Beginning?
62 min

Beginning of the End or End of the Beginning?

An (almost) lifetime in Open Source

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

The Weakest Link
55 min

The Weakest Link

Wie man mit einem langweiligen Newsletter einen Google oder…

Objects in the Cloud
46 min

Objects in the Cloud

How object orientation can be used to solve problems in…

Signal Intelligence und Electronic Warfare
46 min

Signal Intelligence und Electronic Warfare

Wie man nach Hause telefoniert, ohne von einer Rakete…

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

Counter-Development
63 min

Counter-Development

The Accessibility of Technology as an Addendum to…

Juristische Fragen um die Mitbenutzung fremder WLANs
54 min

Juristische Fragen um die Mitbenutzung fremder WLANs

Zivilrechtliche und strafrechtliche Haftung

Data Retention Update
68 min

Data Retention Update

News and Perspectives on Implementation and Opposition

Fuzzing in the corporate world
53 min

Fuzzing in the corporate world

The use of fuzzing in the corporate world over the years…

The Story of The Hacker Foundation
62 min

The Story of The Hacker Foundation

Challenges of Organizing a Foundation for Hackers in the USA

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

DVB-T - From Pixeldata to COFDM Transmission
58 min

DVB-T - From Pixeldata to COFDM Transmission

How to build a complete FPGA-based DVB-T transmitter

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Transparency and Privacy
63 min

Transparency and Privacy

The 7 Laws of Identity and the Identity Metasystem