Search for "Andy" returned 7488 results

re:claimID
34 min

re:claimID

A GNUnet Application for Self-sovereign, Decentralised…

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

DRM comes to European digital TV
48 min

DRM comes to European digital TV

How the DVB project is locking down TV standards and…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Zombie Apocalypse vs. International Health Regulations
42 min

Zombie Apocalypse vs. International Health Regulations

Introducing a very important piece of international law and…

IoT ethics
60 min

IoT ethics

what I found out using my home and body as a test lab

Are Whistleblowers safer today than they were at OHM2013?
64 min

Are Whistleblowers safer today than they were at OHM2013?

Current case studies of whistleblowing in Europe, and how…

coreboot: Adding support for a system near you
70 min

coreboot: Adding support for a system near you

Working with the open source BIOS replacement and getting a…

Comparison of WAN IGP protocols
103 min

Comparison of WAN IGP protocols

RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

A Case Against C++
53 min

A Case Against C++

Why C++ is bad for the environment, causes global warming…

The Computer Science behind a modern distributed data store
55 min

The Computer Science behind a modern distributed data store

The science it takes to build a multi-threaded, clustered…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Funkerspuk
52 min

Funkerspuk

radio politics in the USA and Germany in the first half of…

The Precariat: A Disruptive Class for Disruptive Times.
57 min

The Precariat: A Disruptive Class for Disruptive Times.

Why and How the Precariat will define the Global…

Pushing the frontiers of Information Extraction:
63 min

Pushing the frontiers of Information Extraction:

A Strategy for for Identifying Calls for Action in Texts…

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…

A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…