Search for "Mo" returned 9970 results

God does not play dice!
56 min

God does not play dice!

an introduction to quantum cryptography for sysadmins and…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Privacy by design
74 min

Privacy by design

how to code GDPR and e-privacy regulation safe

Tot sind wir noch lange nicht
56 min

Tot sind wir noch lange nicht

Wo bleiben Kulturwertmark und Cultural Commons Collecting…

Creating printable maps
50 min

Creating printable maps

From OpenStreetMap data to large scale maps on paper

Offshoreleaks - the how and why of a global investigation
53 min

Offshoreleaks - the how and why of a global investigation

How we tried to prove tax evasion and money laundering…

Counterlobbying EU institutions
58 min

Counterlobbying EU institutions

How to attempt to counter the influence of industry…

Security alerting made easy using Python
24 min

Security alerting made easy using Python

Sending real-time notifications to Discord and other…

*sing* %post and %pre and securiteeee
27 min

*sing* %post and %pre and securiteeee

How not to get a CVE assigned while packaging

Honey, let's hack the kitchen:
38 min

Honey, let's hack the kitchen:

Attacks on critical and not-so-critical cyber physical…

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers

The World in 24 Hours Revisited
40 min

The World in 24 Hours Revisited

How to re-enact a 1982 network art performance

Continuous Integration using Travis and Docker
17 min

Continuous Integration using Travis and Docker

There is no excuse for NOT using continuous integration

Open vSwitch and DPDK - Your VMs deserve better
29 min

Open vSwitch and DPDK - Your VMs deserve better

Using OvS + DPDK to boost inter-VM network traffic

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007