Search for "Inc.)" returned 11620 results

Unlocked! Recovering files taken hostage by ransomware
40 min

Unlocked! Recovering files taken hostage by ransomware

Decrypting files hijacked by the "second most used…

The law and leaky abstractions
27 min

The law and leaky abstractions

In what ways can laws influence the security of society.

Der 33 Jahrerückblick
26 min

Der 33 Jahrerückblick

Technology and Politics in Congress Talks, from 1984 to now

Mexican Botnet Dirty Wars
28 min

Mexican Botnet Dirty Wars

Bots are waging a dirty war in Mexican social media.

Does Hacktivism Matter?
49 min

Does Hacktivism Matter?

How the Btx hack changed computer law-making in Germany

The Story of The Hacker Foundation
62 min

The Story of The Hacker Foundation

Challenges of Organizing a Foundation for Hackers in the USA

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

The Renaissance of Perl
58 min

The Renaissance of Perl

Was sich in den letzten Jahren bei Perl5 getan hat

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
58 min

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten

Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…

Remote headless Wayland sessions on GNOME
21 min

Remote headless Wayland sessions on GNOME

Talk about the work I've been doing in the last year

Foreman SCC Manager: Rechenzentrumsautomatisierung von SLES
48 min

Foreman SCC Manager: Rechenzentrumsautomatisierung von SLES

Verwalten Sie Inhalte von SUSE bequem in Foreman und Katello

Life & Complexity
56 min

Life & Complexity

Organisation, information and optimisation in real and…

Mining Search Queries
49 min

Mining Search Queries

How to discover additional knowledge in the AOL query logs

About Gamma-Ray Bursts And Boats
61 min

About Gamma-Ray Bursts And Boats

What We (Don't) Know About the Most Energetic Events in the…

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Drupal as a graphics platform
43 min

Drupal as a graphics platform

Implementing graphic API into Drupal with built-in SVG…

Data Mining Your City
40 min

Data Mining Your City

Early lessons in open city data from Philadelphia, PA, USA

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

Hurra, diese Welt geht unter!?
39 min

Hurra, diese Welt geht unter!?

Welche kollektiven Erzählungen brauchen wir, um in der…

Kybernetik und Kontrolle
60 min

Kybernetik und Kontrolle

Von der autoritären Nutzung von Daten in China und anderswo

CR242: Einmal einschmelzen bitte
119 min

CR242: Einmal einschmelzen bitte

Warum modernes CPU-Design uns jetzt in Teufels Küche bringt

Safecast: DIY and citizen-sensing of radiation
49 min

Safecast: DIY and citizen-sensing of radiation

Empowering citizen in the wake of Fukushima triple-meltdown…