Search for person "Paul van Genuchten"
prev
next
58 min
Export controls and exploit regulations: braindead and…
29 min
Several failure modes of the hacker scene
61 min
Internet reengineering session
58 min
An overview of a mobile telephony market and how a…
55 min
The key elements of policy hacking
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
69 min
Secure, private value transactions using digital cash
51 min
A look at the security of 3rd party iOS applications
73 min
expanding the attack surface and then some
44 min
If technology is the solution, politicians are the problem
53 min
An analysis of targeted attacks from 2005 to 2007
33 min
Hacker Spaces, Startups, and a new approach to social…
69 min
Encrypting (GSM) mobile phone calls over VPN with an…
56 min
How we built ours - How you can build yours
57 min
Why developing Secure Software is like playing Marble…
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
prev
next