Search for "Mo" returned 10385 results
41 min
privacyIDEA
Die Open Source Alternative zu RSA SecurID & Co.
43 min
Artist Talk
We Show You What You Want To See
50 min
Modern Software Packaging for Developers
Wait, how to install your FOSS project again?
35 min
Weaponized Social
Understanding and tools to mitigate network-scale violences
20 min
Next Generation Storage for YaST
Why Users should look forward to the Redesign.
30 min
Closing Event
So long and thanks for all the fish
48 min
Testing a LiveCD? Igor is doing it.
or: How to make testing a distribution fun.
62 min
Public Library/Memory of the World
Access to knowledge for every member of society
28 min
Hardware attacks: hacking chips on the (very) cheap
How to retrieve secret keys without going bankrupt
62 min
Wie man einen Blackout verursacht
und warum das gar nicht so einfach ist.
24 min
Security alerting made easy using Python
Sending real-time notifications to Discord and other…
27 min
*sing* %post and %pre and securiteeee
How not to get a CVE assigned while packaging
37 min
Eliminating the database bottleneck for proper horizontal scalability
Using embeddable databases to allow true and simple…
36 min
Artistic PCB Design and Fabrication
From doodle to manufacture: how I make mechanically…
53 min
Towards a Single Secure European Cyberspace?
What the European Union wants. What the hackerdom can do..
49 min
Mining Search Queries
How to discover additional knowledge in the AOL query logs
61 min
SMS-o-Death
From analyzing to attacking mobile phones on a large scale.
60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…
31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers
40 min
The World in 24 Hours Revisited
How to re-enact a 1982 network art performance
17 min
Continuous Integration using Travis and Docker
There is no excuse for NOT using continuous integration
29 min
Open vSwitch and DPDK - Your VMs deserve better
Using OvS + DPDK to boost inter-VM network traffic
59 min
10GE monitoring live!
How to find that special one out of millions
53 min
Crouching Powerpoint, Hidden Trojan
An analysis of targeted attacks from 2005 to 2007
59 min