Search for "mh" returned 3041 results

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Ecstasy 10x yellow Twitter 120mg Mdma
29 min

Ecstasy 10x yellow Twitter 120mg Mdma

Shipped from Germany for 0.1412554 Bitcoins

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Quantenphysik und  Kosmologie
61 min

Quantenphysik und Kosmologie

Eine Einführung für blutige Anfänger

lasers in space
29 min

lasers in space

more than just pew pew!

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…

What is Good Technology?
55 min

What is Good Technology?

Answers & practical guidelines for engineers.

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity