Search for "JO" returned 10375 results

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

Flying for free
60 min

Flying for free

Exploiting the weather with unpowered aircraft

Der elektronische Personalausweis
60 min

Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

Neusprech im Überwachungsstaat
70 min

Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

FeTAp 611 unplugged
34 min

FeTAp 611 unplugged

Taking a rotary dial phone to the mobile age

Pluggable CPU schedulers in openSUSE
29 min

Pluggable CPU schedulers in openSUSE

How to write your own CPU scheduler with openSUSE

Android Security
57 min

Android Security

bringing x86 fuckups to dalvik

Rock' em Graphic Cards
56 min

Rock' em Graphic Cards

Introduction to Heterogeneous Parallel Programming

The rad1o
47 min

The rad1o

Listen to all the things