Search for "JO" returned 10053 results
23 min
Using BPF in Kubernetes
Linux superpowers in the cloud
23 min
Securing Home Automation with Tor
Be Safe. Be Secure
38 min
Squeezing Attack Traces
How to get useable information out of your honeypot
58 min
Collapsing the European security architecture
More security-critical behaviour in Europe!
65 min
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent…
63 min
Exploiting Symbian
Symbian Exploit and Shellcode Development
82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones
67 min
Life is a Holodeck!
An overview of holographic techniques
48 min
SWF and the Malware Tragedy
Hide and Seek in A. Flash
51 min
Lightning Talks Day2
4 minutes of fame
45 min
Privacy in the social semantic web
Social networks based on XMPP
55 min
Das Grundrecht auf digitale Intimsphäre
Festplattenbeschlagnahme in neuem Licht
51 min
Algorithmic Music in a Box
Doing music with microcontrollers
60 min
Flying for free
Exploiting the weather with unpowered aircraft
52 min