Search for "Ari" returned 5246 results

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

Zombie Apocalypse vs. International Health Regulations
42 min

Zombie Apocalypse vs. International Health Regulations

Introducing a very important piece of international law and…

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Imagine the Future of Money
77 min

Imagine the Future of Money

Economic transformations, hacker culture and why we should…

The Arctic Cold War
58 min

The Arctic Cold War

The silent battle for claiming and controlling the Arctic

Malware Joe Blobs
63 min

Malware Joe Blobs

An overview of stuff that "Malware Joe" puts into his…

Why favour Icinga over Nagios?
57 min

Why favour Icinga over Nagios?

How we think enterprise-grade open source monitoring works

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…

Unusual Web Bugs
44 min

Unusual Web Bugs

A Web Hacker's Bag O' Tricks

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration