Search for "Andi" returned 7044 results

59 min
The Ultimate SPC700 Talk
The hardware behind the music of Super Mario World, Chrono…

61 min
Human body as an electric IO system
Hacking your brain, and other body parts. Debunking myths…

33 min
Space making/space shaping
How mapping creates space, shapes cities and our view of…

32 min
Freedom from the web's monopolies
A better architecture for the web, beneficial to both…

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…

51 min
Open Source in the WSN Research
Experiences made with free and open source software in…

32 min
Fuck Dutch mass-surveillance: let's have a referendum!
Forcing the Netherlands to publicly debate privacy and the…

20 min
The Nibbletronic
A DIY MIDI Controller and a New UI for Wind Instruments

53 min
Privaterra - Report from the field
IT Security and Human Rights organizations - The needs, the…

68 min
Rocket propulsion basics
An introduction to rocket engines and their application for…

60 min
Glass Hacks
Fun and frightening uses of always-on camera enabled…

50 min
Data Analysis in Terabit Ethernet Traffic
Solutions for monitoring and lawful interception within a…

57 min
The Small Device C Compiler for 8-bit firmware development
The current state and near-future plans for a central part…

43 min
The ecosystem is moving
Challenges for distributed and decentralized technology…

58 min
Es gibt keinen Löffel? Dann druck doch einen neuen aus!
How the internet, open source and fabbing are making…

56 min
Search Engines - Oracles of the Information Society
The Saga continues: Search Engines, Technology, Politics,…

29 min
Basics of hydroponics
A need to know on soilless growing before building,…

62 min
Tell no-one
A century of secret deals between the NSA and the telecom…

53 min
Fuzzing in the corporate world
The use of fuzzing in the corporate world over the years…

26 min
Web asset security
and how to verify that Javascript before you trust your…

46 min
Etherify - bringing the ether back to ethernet
Primitive soft tempest demos: exfiltrating data via leakage…

55 min
Vehicle immobilization revisited
Uncovering and assessing a second authentication mechanism…

51 min