Search for "Ben" returned 8731 results

47 min
Rebellious Communication and the Federal Flood
My experience and the role of bloggers, podcasters, and…

64 min
Defense is not dead
Why we will have more secure computers - tomorrow

51 min
GPRS Intercept
Wardriving phone networks

49 min
VoIPhreaking
Introduction to SIP Hacking

58 min
22C3: Private Investigations
Opening Show and Keynote Speech

35 min
Learning cryptography through handcyphers
Shaping a digital future with ancient wisdom

43 min
Twisting timing in your favour
Finding and exploiting concurrency issues in software

47 min
Peer-to-peer under the hood
An in-depth look at p2p algorithmics

47 min
RFID - overview of protocols, librfid implementation and passive sniffing
ISO14443, ISO15693, their GPL librfid implementation and…

75 min
Fnord-Jahresrückblick
von Atomendlager bis Zensus

56 min
"The Concert"
a disconcerting moment for free culture

62 min
Relay attacks on card payment: vulnerabilities and defences
Keeping your enemies close

52 min
Military intelligence for terrorists(tm)
A lamer's introduction to retrieving "sensitive"…

51 min
Reverse Engineering the MOS 6502 CPU
3510 transistors in 60 minutes

93 min
Bluetooth Hacking - The State of The Art
A roundup and live demonstrations of all currently known…

34 min
NOC Review
NOC Review about the Camp 2011 and the 28C3

54 min
Contemporary Profiling of Web Users
On Using Anonymizers and Still Get Fucked

54 min
Building an Open Source PKI using OpenXPKI
Take a lot of Perl, add some OpenSSL, sprinkle it with a…

71 min
Estonia and information warfare
What really happened in Estonia, and what does it mean to…

59 min