Search for "olf" returned 7023 results

60 min
Concepts for global TSCM
getting out of surveillance state mode

50 min
Design Noir
The seedy underbelly of electronic engineering

63 min
Reconstructing narratives
transparency in the service of justice

54 min
Keykeriki V2
Practical Exploitation of Modern Wireless Devices

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes

46 min
Taking Bluetooth lockpicking to the next level
...or the 37th floor of a Hotel

56 min
Protesting in the new Millenium
The Use of Electronic Communications to Protest

45 min
Finding and Preventing Buffer Overflows
An overview of static and dynamic approaches

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

57 min
802.11 Packets in Packets
A Standard-Compliant Exploit of Layer 1

59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor

62 min
Vehicular Communication and VANETs
The future and security of communicating vehicles

21 min