Search for "JO" returned 10046 results
68 min
Rocket propulsion basics
An introduction to rocket engines and their application for…
49 min
Syscall proxying fun and applications
Introduction to syscall proxying and applications for in…
26 min
Technomonopolies
How technology is used to subvert and circumvent…
38 min
Content take-downs: Who cleans the internet?
EU plans to swipe our freedom of expression under the carpet
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
54 min
Eine Zensur findet statt
Eine Rundreise durch die Welt der Zensur – Wo, Was und Wie?
40 min
Handsfree assistive technology
My technology portfolio to enable work, life, smart home…
30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…
32 min
Freedom from the web's monopolies
A better architecture for the web, beneficial to both…
59 min
Deceiving Authorship Detection
Tools to Maintain Anonymity Through Writing Style & Current…
60 min
What is WhiteIT and what does it aim for?
Why you probably want to be concerned about it and similiar…
58 min
Linguistic Hacking
How to know what a text in an unknown language is about?
29 min
openSUSE's different shades of green
a view on openSUSE from two benevolent ex-SUSE guys
49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?
52 min
SiliVaccine: North Korea's Weapon of Mass Detection
How I Learned to Stop Worrying and Love the Backdoor
31 min
The Clash of Digitalizations
The Devolution of Arab Men from Humans to Digital Fodder
62 min
GUERRILLA.COM
How to mess with media, the market and life itself
60 min
Profiling (In)justice
Disaggregating Data by Race and Ethnicity to Curb…
53 min
Automated Botnet Detection and Mitigation
How to find, invade and kill botnets automated and…
55 min