
117 min
Honeypot Forensics
No stone unturned or: logs, what logs?

85 min
How to find *anything* on the Web
Advanced internet searching strategies & "wizard seeking"…

29 min
Mehr Sicherheit für HostAP-WLANs
WLANs mit Wi-Fi Protected Access (WPA) betreiben

115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…

58 min
Physical Security
The Good, the Bad and the Ugly

52 min
Practical Mac OS X Insecurity
Security Concepts, Problems, and Exploits on Your Mac

46 min
Secure Instant Messaging
Suppression of secure communications by governments

64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…

110 min
SPAM Workshop
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems

45 min
The Kernel Accelerator Device
Reconfigurable computing for the kernel

34 min