Search for "Ben" returned 8731 results

74 min
Legal, illegal, decentral: Post-hacker-ethics cyberwar
Applied loss of control to hacker-ethics?

65 min
Building an international movement: hackerspaces.org
What we did so far. What will happen in the future.

62 min
The Story of The Hacker Foundation
Challenges of Organizing a Foundation for Hackers in the USA

69 min
Financing The Revolution
Secure, private value transactions using digital cash

49 min
Does Hacktivism Matter?
How the Btx hack changed computer law-making in Germany

60 min
The Grand EU Data Protection Reform
A latest battle report by some key actors from Brussels
![Advanced Buffer Overflow Methods [or] Smack the Stack](https://static.media.ccc.de/media/congress/2005/22C3-491-en-advanced_buffer_overflow_methods.jpg)
11 min
Advanced Buffer Overflow Methods [or] Smack the Stack
Cracking the VA-Patch

68 min
The future of protocol reversing and simulation applied on ZeroAccess botnet
Mapping your enemy Botnet with Netzob

52 min
I know who you clicked last summer
A swiss army knife for automatic social investigation

57 min
Software Reliability in Aerospace
An overview on design and generation of safe and reliable…

56 min
WSIS - The Review
Hacking a Dictatorship

59 min
Not your Grandfathers moon landing
Hell yeah, it's Rocket Science 3.1415926535897932384626!

52 min
Privacy and the Car of the Future
Considerations for the Connected Vehicle

54 min
Dining Cryptographers, The Protocol
Even slower than Tor and JAP together!

44 min
GNU Radio & the Universal Software Radio Peripheral
Current Capabilities and Future Directions

63 min
Rootkits as Reversing Tools
An Anonymous Talk

56 min
We are all lawmakers!
How to further transparency by law – the Hamburg example…

48 min
Breaking WEP in less than 60 Seconds
the next level

60 min
Faster PwninG Assured
Hardware Hacks and Cracks with FPGAs

59 min