274 Praktische Anleitung zum Bau eines Radiosenders
Topics: die, und, von, mit, des, den, kann, spannungsregler, mit einer, ist die, die schaltung, der...
136 Hacking Linux-Powered Devices
Topics: root, lrwxrwxrwx, kernel, suspects, usual, linux, cramfs, embedded, firmware, image, root root,...
176 Passive covert channels in the Linux kernel
125 Old Skewl Hacking Infra Red
Topics: codes, garage, irsend, sendjdnce, xxxxxxxx, hidden, discovering, bits, openers, command, sendjdnce...
078 Aspects of Elliptic Curve Cryptography
159 State of Emergent Democracy
018 Computer und Robotik in Entenhausen
015 Sicherheit bei VoIP-Systemen
038 Free Software Usage in South America
037 GNOME Anwendungsentwicklung
244 High Speed Computing with FPGAs
134 Secure Instant Messaging
131 Learning OpenPGP by Example
017 Next Generation Peer to Peer Systems
317 Unsicherheit von Personal Firewalls
Topics: pfw, angrif, vertrauliche, auf, durch, blockieren, angriffe, abwehren, liveupdate, verhindern,...
072 The Reality of Network Address Translators
250 Lightning Talk-NetBSD Status Report
012 Natural Language Steganography
Topics: steganography, primitive, natural, security, language, wendy, midshires, huffman, linguistic,...
250 Lightning Talk-Subnetting in P2P systems
059 Wikipedia Sociographics
110 Applied Data Mining
Topics: mining, data, features, rule, applied, association, introduction, dhcwg, rule mining, data mining,...
216 Hacking The Genome
Topics: berlin, protein, dna, vector, proteins, genome, sequence, synthesis, kernel, ligand, three types,...
027 Biometrie in Ausweisdokumenten
041 Einfuehrung in Kryptographische Methoden
113 Automated Hacking via Google
044 Machine Learning in Science and Engineering
107 Embedded Devices as an attack vector
Topics: embedded, devices, vector, stephen, lewis, conclusions, attack, outline, introduction, study,...
062 Hacking EU funding for a FOSS project
313 Biometrie als datenschutzrechtliches Problem
Topics: elisa, jasinska, und, daten, biometrie, personenbezogene, schutzvorkehrungen, organisatorische,...
151 Side Channel Analysis of Smart Cards
157 Lightning Talks Day 2
289 Mixing VJing and Post-Production
Topics: realtime, post, vjs, greenscreen, era, production, techniques, instrumental, paradigm, loops
164 Barrierefreies Internet
214 Kryptographie in Theorie und Praxis
Topics: schlussel, und, mit, von, mathematische, einfuhrung, gpg, auf, jutta, mathematische einfuhrung,...
21C3 - The Network Equipment Delivery
129 Die Propagandawueste des realen Krieges
045 Internet Censorship in China
108 The Convergence of Anti-Counterfeiting and Computer Security
171 Siegerehrung Lockpicking
( 1 reviews )
157 Lightning Talk-Bags for Cellphones Silvercell
207 Amateurfunk
Topics: sender, ein, mhz, frequency, geradeausempfanger, schall, empfanger, einen, technologien, khz,...
277 Das Programmiersystem Forth
Topics: crossover, carsten, strotmann, overview, summary, extensible, easily, broaden, lean, horizon,...
278 TKUeV-Das Ohr am Draht
218 Practical MacOS X Insecurities
165 Softwarepatente - Der Tag danach
051 Recent features to OpenBSD-ntpd and bgpd
117 Kampagne Fair Sharing
049 Zufallszahlengeneratoren
070 Fnord-Jahresrueckblick
142 Lightning Talk-Shortest C Coding Contest Announcement
130 Physical Security Pt 2
014 Feuriges Hacken
Topics: firewire, mit, aachen, und, rwth, hacken, dornseif, feuriges, forschungsgebiet, maximillian, und...
250 Lightning Talk-IT security magazines in Europe
013 The Art of Fingerprinting
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces
Topics: hacker, sex, community, cock, intimate, women, perspective, hacker community
157 Lightning Talk-Whats hot in Wikilandia
250 Lightning Talk-Stacksmashing Winner
250 Lightning Talk-Mute Magazine and openmute.org
157 Lightning Talk-Piepie
250 Lightning Talk-Introducing Meshdisk single floppy Linux
242 Weird Programming 1
Topics: main, maln, nicht, wie, programming, braucht, welt, cug, die, weird, main main, weird programming,...