27c3-4142-en-nodejs as a networking tool
27c3-4210-en-lying to the neighbours
27c3-4236-en-international cyber jurisdiction
27c3-4090-en-baseband apocalypse
27c3-4184-de-stanislaw lem weltverbesserer
27c3-4195-de-literarischer abend
27c3-4211-en-chip and pin is broken
27c3-4081-de-netzmedienrecht lobbyismus korruption
27c3-4252-de-von zensursula ueber censilia zum kindernet
27c3-4125-de-spinning the electronic wheel
Console Hacking 2010 PS3 Epic Fail Over 70 million Wiis, over 40 million Xbox 360s and over 35 million Playstation 3s have been sold in the last few years. That makes over 145 million embedded devices out there and most of them are just used to play games. But what can you do with them if you don't like playing games? You hack them to make them run your own code of course! We're going to talk about the various hacks that you can use to gain control of your hardware and make it do what you want...
27c3-3952-en-running your own gsm stack on a phone osmocombb
27c3-4168-en-automated architecture independent gadget search
27c3-4190-en-data retention in the eu
27c3-4055-en-terrorists win exploiting telecommunications data
27c3-4231-en-datenrettung fun with hard drives
27c3-4097-de-identifizierung von netzwerkprotokollen
27c3-4159-en-reverse engineering mos 6502
27c3-4060-en-attacking mobile phones
27c3-4174-en-the hidden nemesis
27c3-4089-de-ich sehe nicht dass wir nicht zustimmen werden
27c3-4017-en-desktop on the linux
27c3-4183-en-safety on open sea
27c3-4265-en-hacking smart phones
27c3-4295-en-high speed high security cryptography
27c3-4149-en-i control your code
27c3-4187-en-your infrastructure will kill you
27c3-4160-en-automatic identification cryptographic primitives
27c3-4338-de-wikileaks und mehr
27c3-4208-en-wideband gsm sniffing
27c3-4209-en-zero sized heap allocations vulnerability analysis
27c3-4140-en-contemporary profiling of web users
27c3-4067-en-data analysis in terabit ethernet traffic
27c3-4046-en-all colours are beautiful
27c3-4070-de-fnord jahresrueckblick
27c3-4201-en-the concert a disconcerting moment for free culture
27c3-4151-en-android geolocation using gsm network
27c3-4176-de-hacking ibuttons
27c3-4096-en-code deobfuscation by optimization
27c3-4114-en-analyzing modern cryptographic rfid stystem
27c3-4245-en-adventures in analyzing stuxnet
27c3-4239-en-lightning talks d3
27c3-4094-de-netzneutralitaet und qos
27c3-4206-en-immi from concept to reality
27c3-3957-en-ipv6 insecurities
27c3-4082-en-sap landscape
27c3-4061-en-building custom disassemblers
27c3-4237-en-indect eu surveillance project
27c3-4296-en-lightning days d2
27c3-4253-en-pentanews game show
27c3-4073-de-logikschaltungen ohne elektronik
27c3-4006-en-diy synthesizers and sound generators
27c3-4036-en-reverse engineering a real word rfid payment system
27c3-4099-en-file print electronics
27c3-4203-en-distributed fpga number crunching for the masses
27c3-4175-en-from robot to robot
27c3-4141-de-hacker jeopardy
27c3-4011-en-embedded reverse engineering
27c3-4297-de-die gesamte technik ist sicher
27c3-4124-en-three jobs that journalists will do in 2050
27c3-4098-en-tor is peace software freedom is slavery
27c3-4121-en-is the ssliverse a safe place
27c3-4298-de-ccc jahresrueckblick 2010
27c3-3983-en-hackers and computer science
27c3-4085-de-digitale spaltung per gesetz
27c3-4003-en-cybernetics for the masses
27c3-4261-en-key recovery attacks rc4
27c3-4263-en-resisting excessive government surveillance
27c3-4111-de-eins zwei drei alle sind dabei
27c3-4185-de-whistleblowing licht ins dunkel
27c3-4143-en-parttimescientists
27c3-4138-en-secure communications below the hearing threshold