Search for "Ben" returned 8980 results

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

From Ring Zero to UID Zero
42 min

From Ring Zero to UID Zero

A couple of stories about kernel exploiting

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

OMG! OER!
40 min

OMG! OER!

How big business fights open education in Poland, and how…

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view