Events for tag "28c3"
51 min
Surveillance Industry & Country's Actings
61 min
How the e-money systems can be made better
52 min
Why every citizen should be concerned
57 min
Part2 - PostScript: Um, you've been hacked
47 min
Circumventing ASLR, DEP, and Other Guards
128 min
Vom braunen Briefumschlag bis zur Publikation
57 min
A Standard-Compliant Exploit of Layer 1
55 min
Building a sniffer for the GMR satphones
57 min
Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
25 min
What's inside your network?
26 min
A new approach of identifying vulnerable web applications
59 min
Hell yeah, it's Rocket Science 3.1415926535897932384626!
56 min
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…
32 min
Einführung in das Thema Antiforensik am Beispiel eines…
28 min
Why auditing proprietary protocols matters
64 min
Die Technik der Eisenbahnsicherungsanlagen
54 min
The copyright war was just the beginning
100 min
Mein Ruby ist besser als dein urxvt!
75 min
von Atomendlager bis Zensus
107 min
42 new questions, new jokers, same concept, more fun than…
67 min
Welchen Wert haben Trackingdaten?
65 min
Transhumanism, Self-Optimization and Neurofeedback for…
53 min
the greatest free/Libre culture show of all times
60 min
The history, the hardware and how to write programs
51 min
Tiffany Rad, Teague Newman, John Strauchs
59 min
Kampagne für Netzneutralität
60 min
Why you probably want to be concerned about it and similiar…
51 min
How you end up being the Victim.
60 min
What happens when data collection goes awry in the 21st…
34 min
NOC Review about the Camp 2011 and the 28C3
63 min
escape the basement and make the sun work for you
56 min
On- und Offline-Überwachung: Weil sie es können
45 min
Freeing Genetic Data from Corporate Vaults
43 min
Reviving a nice summer dream
58 min
How to attempt to counter the influence of industry…
64 min
A proposal for fixing attacks on CAs and DNSSEC
62 min
Introduction into State-of-the-Art Hearing Aid Technology
66 min
Real-time 3D Reconstruction and Interaction Using a Moving…
59 min
How quantum information differs from classical
61 min
Exploiting Timing Side Channel Vulnerabilities on the Web
57 min
Kleine Anleitung zur Nutzung von Sicherheitslücken…
49 min
How the Btx hack changed computer law-making in Germany
64 min
Sprachlicher Nebel in der Politik
53 min
Hackers need satellites. Hackers need internet over…
57 min
Hell Yeah, it's rocket science
55 min
Bachelorarbeit Informatik Uni Kiel SS 2011
62 min
Hell Yeah, it's rocket science
75 min
von Atomendlager bis Zensus
26 min
Insights into a publicly available registry
52 min
Why just lying your way in won't get you anywhere
70 min
when unconditional artistic freedom happens
45 min
A non-copyright circumventing application of the HDCP…
63 min
Firmware Modification Attacks and the Rise of Printer…
62 min
Automating exploitation of invalid memory writes
41 min
Technical defense against data retention law
59 min
Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat
62 min
A short account of its history and future challenges
40 min
Academia, social media data, and privacy
56 min
We are the 99% (CPU usage)
59 min
Tools to Maintain Anonymity Through Writing Style & Current…
62 min
GPRS, EDGE, UMTS, HSPA demystified
28 min
Praktische Informationsfreiheit
56 min
Achieving a permanent stealthy compromise of user accounts…
64 min
Identity-Regimes from 1500 to the 2000s
26 min
Aggregating and Visualizing (lack of) Transparancy Data in…
57 min
Lessons learned from producing a weekly independent podcast…
53 min
What the European Union wants. What the hackerdom can do..
45 min
Telecomix and Geeks without Bounds on Security and Crisis…