
85 min
How to find *anything* on the Web
Advanced internet searching strategies & "wizard seeking"…

34 min
XMPP/Jabber
Introducing the 'lingua franca' of Instant Messaging

117 min
Honeypot Forensics
No stone unturned or: logs, what logs?

110 min
SPAM Workshop
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…

52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac

64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…

46 min
Secure Instant Messaging
Suppression of secure communications by governments

45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel

29 min
Mehr Sicherheit für HostAP-WLANs
WLANs mit Wi-Fi Protected Access (WPA) betreiben

45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems

58 min