Search for "olf" returned 7522 results

Privacy: An Unequally Distributed Resource
45 min

Privacy: An Unequally Distributed Resource

A Study of Privacy as Privilege in Our World

DNF vs ZYpp: Fight!
32 min

DNF vs ZYpp: Fight!

A comparison of the two major RPM package managers

Bridging openSUSE and SLE gap, part deux
28 min

Bridging openSUSE and SLE gap, part deux

Return of the GNOME, part deux aka the revenge

Podjournalism
66 min

Podjournalism

The Role of Podcasting in Critical and Investigative…

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

The Youth Hostel
52 min

The Youth Hostel

An odyssey in the margins of software and paper

Digital Musical Instruments
34 min

Digital Musical Instruments

Evolution and design of new interfaces for musical…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Is this the Mobile Gadget World We Created?
32 min

Is this the Mobile Gadget World We Created?

The story of the world's first socially responsible mobile…

Hybrid rocket engines
52 min

Hybrid rocket engines

Design and implementation of rocket engines with two-phase…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

Remote Attestation in MicroOS
35 min

Remote Attestation in MicroOS

Measuring the health of our system with a TPM

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

Generating uniqueness
45 min

Generating uniqueness

How generative art pushes the boundaries of intellectual…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future