
53 min
Barrierefreies Internet
Aspekte der Minimierung der Unmöglichkeit

30 min
Closing Event
So long and thanks for all the fish

85 min
How to find *anything* on the Web
Advanced internet searching strategies & "wizard seeking"…

34 min
XMPP/Jabber
Introducing the 'lingua franca' of Instant Messaging

117 min
Honeypot Forensics
No stone unturned or: logs, what logs?

105 min
Fight for your Right to Fileshare
Content Flatrate, not Copyright War

56 min
Information - Wissen - Macht
Dunkle Seiten der Informationsgesellschaft?

67 min
Die Propagandawüste des realen Krieges
Direkte und indirekte Steuerungsmöglichkeiten der Medien im…

52 min
Freedom of expression in new Arab landscape
Spreading of new Arab satellite TV stations: consequences…

43 min
Pirate Radio
Running a Station and Staying on the Air

115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…

42 min
The Incomputable Alan Turing
Ein Audio-Feature

110 min
SPAM Workshop
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

61 min
Siegerehrung Lockpicking
8. Deutsche Meisterschaften im Schlossöffnen

52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac

59 min
State of Emergent Democracy
Where are we today?

64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…

56 min
TKÜV - Das Ohr am Draht
Recht, Regulierung und Realität der…

14 min
Opening Event
Let the games begin...

45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel

58 min
Spam-Politik
Politisch-rechtliche Bekämpfung unerwünschter Information

46 min
Secure Instant Messaging
Suppression of secure communications by governments

29 min
Mehr Sicherheit für HostAP-WLANs
WLANs mit Wi-Fi Protected Access (WPA) betreiben

56 min
Protesting in the new Millenium
The Use of Electronic Communications to Protest

45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems

58 min