Search for "Sven" returned 1989 results

32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?

72 min
Console Hacking
Breaking the 3DS

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

56 min
WarGames in memory
what is the winning move?

31 min
Sysadmins of the world, unite!
a call to resistance

72 min
State of the Onion
Neuland

64 min
Cory Doctorow – Fireside Chat
Reading and Q&A

32 min
Coding your body
How to decipher the messages of your body

57 min
Quantum Mechanics
A Gentle Introduction

51 min
Funky File Formats
Advanced binary tricks

47 min
Going Deep Underground to Watch the Stars
Neutrino Astronomy with Hyper-Kamiokande

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

58 min
Confessions of a future terrorist
A rough guide to over-regulating free speech with…

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

33 min
The Transhumanist Paradox
Deciding between technological utopias in a liberal state

62 min
To Protect And Infect, Part 2
The militarization of the Internet

36 min
Wheel of Fortune
Analyzing Embedded OS Random Number Generators

39 min
The Eye on the Nile
Egypt's Civil Society Under Attack

58 min
PLC-Blaster
Ein Computerwurm für PLCs

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…

30 min