Search for "JO" returned 9213 results

Putting your money on locales
28 min

Putting your money on locales

Du hast 5 Geld in der Schweiz – wo ist dein Währungssymbol?

Taming the Chaos: Can we build systems that actually work?
58 min

Taming the Chaos: Can we build systems that actually work?

Possible paths from today's ghastly hackery to what…

MySQL Multi-Master Replication Failover - A step-by-step explanation
49 min

MySQL Multi-Master Replication Failover - A step-by-step explanation

How to setup a MySQL cluster with Automatic failover for HA

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

NSFW: Di[CENSORED]s for privacy
28 min

NSFW: Di[CENSORED]s for privacy

Why not give hackers and agencies something to look at . .

Enabling Innovation in Europe
33 min

Enabling Innovation in Europe

Hacker Spaces, Startups, and a new approach to social…

This is why you can’t make nice stuff
49 min

This is why you can’t make nice stuff

… or the joy of disposing of 5 tons of refrigerators

Caching strategies in Drupal
71 min

Caching strategies in Drupal

How Drupal's cache API can lead to blazing fast websites

One year of securitarian drift in France
27 min

One year of securitarian drift in France

From the Bill on Intelligence to the State of Emergency

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…