Search for "Mo" returned 10353 results
49 min
Mining Search Queries
How to discover additional knowledge in the AOL query logs
61 min
SMS-o-Death
From analyzing to attacking mobile phones on a large scale.
60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…
59 min
Ich werde jetzt Embedded-Linux-Entwickler!
“Das kann doch nicht so schwer sein - ist doch auch nur…
61 min
Reducing Carbon in the Digital Realm
How to understand the environmental impact of the digital…
35 min
Understanding millions of gates
Introduction to IC reverse engineering for…
28 min
NSFW: Di[CENSORED]s for privacy
Why not give hackers and agencies something to look at . .
71 min
Caching strategies in Drupal
How Drupal's cache API can lead to blazing fast websites
33 min
Enabling Innovation in Europe
Hacker Spaces, Startups, and a new approach to social…
45 min
Secure Network Server Programming on Unix
Techniques and best practices to securely code your network…
27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency
56 min
Blackbox JTAG Reverse Engineering
Discovering what the hardware architects try to hide from…
60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom
57 min
SageMath Examples from the CrypTool Book
50% Talk 50% Live-Session to try out some code yourself
26 min
MariaDB and MySQL — what statistics optimizer needs
or when and how not to use indexes
45 min
Open Source Firmware
... and I finally had my personal bootsplash screen :)
52 min
WASM in the wild
hot-upgradable runtime in substrate thanks to Rust
52 min
Appearance matters!
Use lights to make your shows look better
59 min
System-Level Transactions with picotm
The Days of Plenty Are Yet to Come
26 min