Search for "Mo" returned 9936 results

Enlightenment? What is it? Why should you use it?
30 min

Enlightenment? What is it? Why should you use it?

An Introduction to the most used Linux Desktop*

Cyberpeace and Datalove
64 min

Cyberpeace and Datalove

How do we counter the memes of control?

Stuff you don't see - every day
52 min

Stuff you don't see - every day

GNU Radio Internals - how to use the Framework

Building custom initrd files
47 min

Building custom initrd files

How to create a minimal bootable rescue image

Jumping the Paywall
29 min

Jumping the Paywall

How to freely share research without being arrested

Atmel AVR für Dummies
46 min

Atmel AVR für Dummies

Was ist denn nun eigentlich so ein 'Interrupt'?

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Intelexit
60 min

Intelexit

Calling secret service agents to quit their jobs

Open Emacs Workshop (join anytime)
108 min

Open Emacs Workshop (join anytime)

An introduction to the Lispers' editor of choice

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Write your own K8s operator
48 min

Write your own K8s operator

Using the Operator SDK to develop custom K8s operators

God does not play dice!
56 min

God does not play dice!

an introduction to quantum cryptography for sysadmins and…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Privacy by design
74 min

Privacy by design

how to code GDPR and e-privacy regulation safe

Tot sind wir noch lange nicht
56 min

Tot sind wir noch lange nicht

Wo bleiben Kulturwertmark und Cultural Commons Collecting…

Creating printable maps
50 min

Creating printable maps

From OpenStreetMap data to large scale maps on paper

Live: Rescue and renew a project
29 min

Live: Rescue and renew a project

How to get legacy open source projects unstuck

Tales from Hardware Security Research
45 min

Tales from Hardware Security Research

From Research over Vulnerability Discovery to Public…