

53 min
A Case Against C++
Why C++ is bad for the environment, causes global warming…

53 min
Know your compiler
...and what the optimizer does so you don't have to
Security.jpg)
62 min
Antivirus (In)Security
Bugs in Antivirus Software

48 min
Breaking WEP in less than 60 Seconds
the next level

65 min
Practical RFID Attacks
writing, sniffing & emulating 13.56MHz RFID tags with…

46 min
Tits & Bits
pr0n 2.0

61 min
The A5 Cracking Project
Practical attacks on GSM using GNU Radio and FPGAs

48 min
GPS-Trackers
How they track you when your mobile is switched off

47 min
Fun with NFC Mobile Phones
Near Field Communication

44 min
GNU Radio & the Universal Software Radio Peripheral
Current Capabilities and Future Directions

43 min
Twisting timing in your favour
Finding and exploiting concurrency issues in software
_forget_your_secret_crypto_key.jpg)
34 min
How to (really) forget your secret crypto key
What you always wanted to know about Flash memory - but…

36 min
Drohnen züchten
UAVs und andere spannende Dinge

98 min
Hardware Hacking for Software Geeks
Essential Tips and Tricks

65 min
Cryptographic key recovery from Linux memory dumps
Does dm-crypt and cryptoloop provide expected security when…

46 min
Inside Sputnik & OpenBeacon - Smart Dust for the Masses
a hackers guide into homebrewn 2.4GHz hardware & peripherals

65 min