Events for tag "25c3"

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

Scalable Swarm Robotics
39 min

Scalable Swarm Robotics

Formica: a cheap, open research platform

Just Estonia and Georgia?
44 min

Just Estonia and Georgia?

Global-scale Incident Response and Responders

All your base(s) are belong to us
55 min

All your base(s) are belong to us

Dawn of the high-throughput DNA sequencing era

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Zehn Big Brother Awards in .at
57 min

Zehn Big Brother Awards in .at

Rückblick über eine bewegte Zeit

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

Erich Mühsams Tagebücher in der Festungshaft
51 min

Erich Mühsams Tagebücher in der Festungshaft

Ein Idylle aus der Analogsteinzeit der Überwachung

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

U23
49 min

U23

The Hackerspace's Junior Academy

Hacker Jeopardy
103 min

Hacker Jeopardy

Die ultimative Hacker-Quizshow

Embracing Post-Privacy
59 min

Embracing Post-Privacy

Optimism towards a future where there is "Nothing to hide"

Flying for free
60 min

Flying for free

Exploiting the weather with unpowered aircraft

Rapid Prototype Your Life
57 min

Rapid Prototype Your Life

The time is now to make anything you can imagine

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

The Trust Situation
60 min

The Trust Situation

Why the idea of data protection slowly turns out to be…

Wikileaks
58 min

Wikileaks

Wikileaks vs. the World

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

The Infinite Library
58 min

The Infinite Library

Storage and Access of Pornographic Information

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

Der elektronische Personalausweis
60 min

Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Neusprech im Überwachungsstaat
70 min

Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

Fnord News Show
50 min

Fnord News Show

Wir helfen Euch, die Fnords zu sehen

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Repurposing the TI EZ430U
33 min

Repurposing the TI EZ430U

with msp430static, solder, and syringe

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Solar-powering your Geek Gear
28 min

Solar-powering your Geek Gear

Alternative and mobile power for all your little toys

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Terrorist All-Stars
65 min

Terrorist All-Stars

Some cases of terrorism around the world that are not…

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

About Cyborgs and Gargoyles
44 min

About Cyborgs and Gargoyles

State of the Art in Wearable Computing

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Beyond Asimov - Laws for Robots
49 min

Beyond Asimov - Laws for Robots

Developing rules for autonomous systems

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers