Search for "Inc.)" returned 11620 results

BGP und OSPF
5 min

BGP und OSPF

Redistribute BGP in OSPF mit BIRD, externe OSPF Routen,…

Responsible Disclosure; How to make your school a safer place.
24 min

Responsible Disclosure; How to make your school a safer place.

Story of a 15 year old hacker in collaboration with his…

The JPEG is dead! Long live the JPEG!
51 min

The JPEG is dead! Long live the JPEG!

A tour de force of major developments in open source image…

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

Linguistic Hacking
58 min

Linguistic Hacking

How to know what a text in an unknown language is about?

AppArmor Crashkurs
29 min

AppArmor Crashkurs

Lerne in unter einer Stunde, AppArmor-Profile zu erstellen…

Sourcery: a multi-architecture root file system that is mostly source
30 min

Sourcery: a multi-architecture root file system that is mostly source

Build images that boot on multiple architectures, and that…

OPENCOIL – A Roaming Speedshow
87 min

OPENCOIL – A Roaming Speedshow

or the fine art of appropriating inductive charging pads in…

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

YaST – Yet another SUSE Talk?
18 min

YaST – Yet another SUSE Talk?

Or how are SUSE and the openSUSE community interacting…

OpenSolaris für Linuxer
57 min

OpenSolaris für Linuxer

Eine Einführung in das Sun-Betriebssystem aus der Sicht…

"Xbox" and "Xbox 360" Hacking
113 min

"Xbox" and "Xbox 360" Hacking

17 Mistakes Microsoft Made in the Xbox Security System &…

AppArmor Crashkurs
45 min

AppArmor Crashkurs

Lerne in unter einer Stunde, AppArmor-Profile zu erstellen…

3 Years After Snowden: Is Germany fighting State Surveillance?
64 min

3 Years After Snowden: Is Germany fighting State Surveillance?

A Closer Look at the Political Reactions to Mass…

Estonia and information warfare
71 min

Estonia and information warfare

What really happened in Estonia, and what does it mean to…

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Medical Security Nightmares
62 min

Medical Security Nightmares

Things Hackers don't want to see as a patient in a hospital

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

BOLSONARO IS AN ENVIRONMENTAL CATASTROPH!
66 min

BOLSONARO IS AN ENVIRONMENTAL CATASTROPH!

How the rise of bolsonsarism culminate in the Burning of…

Attacking IoT Telemetry
70 min

Attacking IoT Telemetry

A study of weaknesses in the pipeline of rapidly advancing…

Sim Gishel
36 min

Sim Gishel

A singing and dancing robot build to take part in casting…

PDF 101 & PDF Secrets
55 min

PDF 101 & PDF Secrets

Learning the PDF basics, applying it to hide/reveal…