101. | Simon Munnery Adventures In Undertent Heating | 1 | |
|
102. | The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2 | 1 | |
|
103. | Breaches Are Everywhere What's A Good Security Leader To Do Richard Greenberg | 1 | |
|
104. | Rage against the kiosk Paul James Craig | 1 | |
|
105. | Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes Farshad Abasi | 1 | |
|
106. | Hacking the Federal Aviation Administration | 1 | |
|
107. | Caroline Sinders AI is More Than Math | 1 | |
|
108. | PWA caching strategies How to obtain maximum performance from your Progressive web app | 1 | Guide |
|
109. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
110. | Sam Patterson OPENBAZAAR 2 0 NOW IS THE TIME TO SHIFT TO A DECENTRALIZED MARKETPLACE | 1 | |
|
111. | RFID Chip Inside the Body Reflecting the Current State of Usage, Triggers, and Ethical Issues DeepS | 1 | |
|
112. | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 1 | |
|
113. | David Jorm AusCERT 2020 | 1 | |
|
114. | Smalltalk Zerooverhead | 1 | |
|
115. | 30C3 2013 eng HbbTV Security | 1 | |
|
116. | Redox OS A safety first microkernel developed in Rust | 1 | |
|
117. | NixOS, a functional GNU Linux distro | 1 | |
|
118. | 26C3 2009 eng wikileaks release 10 | 1 | |
|
119. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
120. | 35C3 2018 Mind the Trap Die Netzpolitik der AfD im Bundestag | 1 | |
|
121. | Hacking invisibly and silently with light and sound Matt Wixey | 1 | |
|
122. | Lightning talks Marian Marinov & Yana Petrova OpenFest | 1 | |
|
123. | eBPF and XDP walkthrough and recent updates | 1 | Walkthrough |
|
124. | My Ticks Don't Lie New Timing Attacks for Hypervisor Detection | 1 | |
|
125. | FluxBB | 1 | |
|
126. | From Gtk to Qt An Strange Journey, part 2 The continuation of the original talk from Dirk Hohndel | 1 | |
|
127. | OpenBSD as house alarm system Openbsd is not only good for network related projects | 1 | |
|
128. | Designing an ultra low overhead multithreading runtime for Nim Exposing fine grained parallelism fo… | 1 | |
|
129. | Gerd Leonhard IAPP Data Protection Congress 2016 | 1 | |
|
130. | Kristy Roschke, News Co Lab at Arizona State University | 1 | |
|
131. | 99 Reasons Your Perimeter Is Leaking Evolution of CC John Askew DerbyCon 8 | 1 | |
|
132. | HOPE X A Beautiful Mosaic Using FOIA to Fight Secrecy and Explore History | 1 | |
|
133. | Writing Asynchronous SNMP Agents From a MIB file to a fully fledged Python application | 1 | |
|
134. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 1 | |
|
135. | 34C3 2017 Designing PCBs with code deutsche Ubersetzung | 1 | |
|
136. | Panel More Cyber Security through Digital Sovereignty | 1 | |
|
137. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
138. | Открытие форума PHDays 11 | 1 | |
|
139. | Olivier Thomas Hardware reverse engineering tools | 1 | |
|
140. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
141. | Easterhegg 2015 deu SDR for non noobs | 1 | |
|
142. | DuckDB An Embeddable Analytical Database | 1 | |
|
143. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
144. | SSL And The Future of Authenticity Moxie Marlinspike | 1 | |
|
145. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 1 | |
|
146. | MODERN 20171115 0930 | 1 | |
|
147. | Embedded systems, the road to Linux Early boot, comparing and explaining different systems | 1 | |
|
148. | TRAILER PART 1 FOR THE GLORY OF THE STATE MACHINE | 1 | |
|
149. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|
150. | Igniting the Open Hardware Ecosystem with RISC V SiFive's Freedom U500 is the World's First Linux c… | 1 | |
|
151. | Patrik Tjokorda BITCOIN PEER BANKING | 1 | |
|
152. | Php And Friends Rofilingphpapplications | 1 | |
|
153. | Higher Level Malware Christopher Truncer and Evan Pena | 1 | |
|
154. | Black Hat USA 1999 Jeffrey Hunker Keynote Protecting Americas Cyberspace Version 1 0 of the Nati | 1 | |
|
155. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
156. | What the Hell is Inside There Chris Tarnovsky | 1 | |
|
157. | Max Hillebrand TIME TRAVELING THE TIMECHAIN WITH SCRIPTLESS SCRIPT ATOMIC UTXO SWAPS | 1 | |
|
158. | The Bug Hunter's Methodology v4 0 Recon Edition by @jhaddix NahamCon2020 | 1 | Vlog |
|
159. | Godot 3, libre gamedev for everyone The 2D and 3D game engine you've waited for | 1 | |
|
160. | [CB20]Apk medit memory search and patch tool for APK without root & android NDK | 1 | |
|
161. | Human Rights Commissioners Unite from the Region | 1 | |
|
162. | V6OPS 20201119 0900 | 1 | |
|
163. | Security of GPS INS based On road Location Tracking Systems | 1 | |
|
164. | Let's play a game challenges Konrad Antonowicz, Bartosz Dzirba, Dom Storey | 1 | |
|
165. | tragedy oss quality 20 | 1 | |
|
166. | Camilo Galdos | 1 | |
|
167. | Breaches Are Everywhere What's a Good Security Leader to Do Richard Greenberg | 1 | |
|
168. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 0 | |
|
169. | HRPC 20220323 0900 | 0 | |
|
170. | BFD 20210311 1430 | 0 | |
|
171. | IETF CBOR 20210714 1400 | 0 | |
|
172. | RAW 20210727 1900 | 0 | |
|
173. | STIR 20191118 1330 | 0 | |
|
174. | Temporal The future is simple introducing the CRE Rob van der Veer • Spyros Gasteratos | 0 | |
|
175. | multimedia | 0 | |
|
176. | IDR 20220322 1330 | 0 | |
|
177. | Joe Gray Social Engineering Your Metrics Using Data Science To Provide Value In Reporting | 0 | |
|
178. | KeynoteHelpful Hackers Astrid Oosenbrug | 0 | |
|
179. | Team Cymru Bogon Route Servers | 0 | |
|
180. | SEDATE 20210727 1900 | 0 | |
|
181. | TEEP 20181107 0900 | 0 | |
|
182. | Choosing The Right Static Code Analyzers Based On Hard Data Chris Horn | 0 | |
|
183. | Sinking Your Hooks in Applications Richard Meester & Joe Rozner | 0 | |
|
184. | RMCAT 20170719 0930 | 0 | |
|
185. | TEAS 20170718 0930 | 0 | |
|
186. | SECDISPATCH 20190722 1330 | 0 | |
|
187. | NSX T Architecture & Benefits by Erik Bussink, VMware | 0 | |
|
188. | How private is your period A systematic analysis of menstrual app privacy policies | 0 | |
|
189. | Wikipedia Tips on Communicating with the Hive Mind Elonka Dunin | 0 | |
|
190. | NETCONF WG Interim Meeting, 2020 04 06 | 0 | |
|
191. | WEBTRANS 20220726 1400 | 0 | |
|
192. | Влияние привычных проблем безопасности веба 2 0 на безопасность блокчейн сетей | 0 | |
|
193. | OWASP CRS and AppSensor Project | 0 | |
|
194. | Quantum Internet Proposed Research Group | 0 | |
|
195. | SECDISPATCH 20210726 2300 | 0 | |
|
196. | Chenxi Wang Protect Containerized Applications With System Call Profiling | 0 | |
|
197. | The Security We Need Designing Usable IoT Security Damilare D Fagbemi | 0 | |
|
198. | Keynote Bill Cheswic 2 3 | 0 | |
|
199. | ICNRG 20210310 1200 | 0 | |
|
200. | BGP Convergence in much less than a second | 0 | |
|