Search for "vater" returned 1207 results

61 min
Email authentication for penetration testers
When SPF is not enough

62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!

34 min
Scuttlebutt
The decentralized P2P gossip protocol

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…

60 min
Shopshifting
The potential for payment system abuse

25 min
»Hard Drive Punch«
Destroying data as a performative act

38 min
Modeling and Simulation of Physical Systems for Hobbyists
Essential Tools for Developing, Testing and Debugging…

30 min
All Our Shared Spectrum Are Belong to Us
Visualizing WLAN Channel Usage on OpenWRT

31 min
JODI - Apache is functioning normally
A net.art collective since 1995. Understanding the browser…

43 min
Forensic Architecture
Forensic Architecture is an independent research agency…

31 min
DPRK Consumer Technology
Facts to fight lore

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption

62 min