201. | A roadmap for the Hurd | 2 | |
|
202. | Drawing PCBs with Inkscape Creating printed circuit board designs using Inkscape, SVG2Shenzhen and … | 2 | |
|
203. | NETCONF 20220725 1400 | 2 | |
|
204. | Open Source Hardware for Smart City OSHW LoRaWAN implementation for Parking, Air quality, City ligh… | 2 | |
|
205. | HTTP 3 HTTP over QUIC is the next generation | 2 | |
|
206. | Poul Henning Kamp News from the ESO ELT telescope & The new NerdHouse | 2 | |
|
207. | Asyncio understanding async and await in Python | 2 | |
|
208. | 30C3 2013 eng FPGA 101 | 2 | |
|
209. | Steven Seeley Ghost in the Windows 7 Allocator | 2 | |
|
210. | The Eleventh HOPE 2016 Democratizing Wireless Networks with LimeSDR | 2 | |
|
211. | Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009 | 2 | |
|
212. | Overcoming iOS Data Protection to Re enable iPhone Forensic Andrey Belenko | 2 | |
|
213. | The HammerBlade RISC V Manycore A programmable, scalable RISC V fabric | 2 | |
|
214. | Building Prototypes Dan Gelbart part 6 of 18 Coatings | 2 | |
|
215. | Dismal Code Studying the Evolution of Security Bugs | 2 | |
|
216. | freifunk Access is a human right | 2 | |
|
217. | 33C3 2016 Shining some light on the Amazon Dash button | 2 | |
|
218. | IOTOPS 20210309 1430 | 2 | |
|
219. | HACKATHON 20210301 1600 | 2 | |
|
220. | 507 Real World Attacks VS Check box Security Brent White Tim Roberts DerbyCon 6 | 2 | |
|
221. | Hacking Into Broadband And Broadcast TV Systems C Kasmi, P Barre and T Sabono | 2 | |
|
222. | keegan ryan Hacking Cell Phone Embedded Systems | 2 | |
|
223. | Antivirus Evasion Lessons Learned Thelightcosine | 2 | |
|
224. | The Confidential Consortium Framework A framework to build secure, highly available, and performant… | 2 | | Consortium
|
225. | The Shuttle Columbia Disaster Lessons That Were Not Learned Joel I love it when they call me | 2 | |
|
226. | Hacking on Bug Bounties for Five Years @infosec au | 2 | |
|
227. | The Science Behind Social Engineering And An Effective Security Culture E Nicaise | 2 | |
|
228. | SoK Cyber Insurance Technical Challenges and a System Security Roadmap | 2 | |
|
229. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 2 | |
|
230. | Zink Update OpenGL on Vulkan upstream in mesa | 2 | |
|
231. | Benjamin Bayart Keynote | 2 | |
|
232. | Siemens Simatic S7 PLC Exploitation Dillon Beresford | 2 | |
|
233. | Android security architecture by Nikolay Elenkov | 2 | |
|
234. | Introduction to Reactive Programming with RxPY | 2 | |
|
235. | Building WebGPU with Rust The new foundation for graphics and compute | 2 | |
|
236. | SWIM Protocol to Build a Cluster SWIM gossip protocol, its implementation, and improvements | 2 | |
|
237. | V6OPS 20170720 1330 | 2 | |
|
238. | Paul Sebastian Ziegler Hacking in The Far East | 2 | |
|
239. | The art of the windows kernel fuzz Guangming Liu | 2 | |
|
240. | HOPE 2020 Sex Work as Artistic Practice | 2 | |
|
241. | Our Favorite XSS Filters and How to Attack Them Eduardo Vela Nava, David Lindsay | 2 | Guide |
|
242. | A view into ALPC RPC by Clement Rouault and Thomas Imbert | 2 | |
|
243. | Fuzzing Apache HTTP Server for fun and CVEs Antonio Morales | 2 | |
|
244. | BMP, The BGP Monitoring Protocol | 2 | |
|
245. | Gomobile Android development with Go | 2 | |
|
246. | Keynote Video over the Internet Can we break the Net | 2 | |
|
247. | AV1 Codec Update | 2 | Vlog |
|
248. | Threat Hunting the macOS edition Megan Carney | 2 | |
|
249. | Darshak how to turn your phone into a low cost IMSI catcher device Ravishankar Borgaonkar and Swap | 2 | Guide |
|
250. | Marcel van der Velde Trust Me Im a Social Engineer | 2 | |
|
251. | The Grugq How The Leopard Hides His Spots OS X Anti Forensics Techniques | 2 | |
|
252. | Domonkos Tomcsanyi Hacking in Suit Smartphone, the Swiss Army Knife of Hacker | 2 | |
|
253. | BlueHat IL 2020 Dmitry Vyukov syzkaller Adventures in Continuous Coverage guided Kernel Fuzzing | 2 | Guide |
|
254. | CLOSING KEYNOTE Richard Thieme Conspiracy Theories, Counter Intelligence & K | 2 | |
|
255. | Chris Hadnagy Nonverbal Human Hacking DerbyCon 2 | 2 | |
|
256. | Multiplatform Kotlin Library Development | 2 | |
|
257. | 115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6 | 2 | Guide |
|
258. | Hackers On Planet Earth 1994 Linux | 2 | |
|
259. | LOLBins Nothing to LOL about Oddvar Moe DerbyCon 8 | 2 | |
|
260. | Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité Marc André Bélanger | 2 | |
|
261. | Farah Magrabi, Macquarie University | 2 | |
|
262. | Electro optical Sound Eavesdropping Ben Nassi | 2 | |
|
263. | Quantum Security and Cryptography You Are Probably Doing it Wrong | 2 | |
|
264. | The Heptapod project Bringing Mercurial to GitLab | 2 | |
|
265. | Slack Announcement | 2 | |
|
266. | How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers X Bai & M Zheng | 2 | |
|
267. | Updates from the RISC V TEE Group Working on a Trusted Execution Environment spec for RISC V | 2 | Vlog |
|
268. | OpSec for InfoSec Justin Nordine | 2 | |
|
269. | SAAG 20160721 1400 | 2 | |
|
270. | Claudio Guarnieri Cuckoo Sandbox Automated Malware Analysis | 2 | |
|
271. | Fast QUIC sockets for cloud networking Using vector packet processing for QUIC acceleration and off… | 2 | |
|
272. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 2 | |
|
273. | Richard 'Dickie' George Keynote Life at Both Ends of the Barrel An NSA Targeting Retrospective | 2 | |
|
274. | WebAssembly A New World of Native Exploits on the Browser | 2 | |
|
275. | Black-Box Laser Fault Injection on a Secure Memory | 2 | |
|
276. | State of the Art of DNS Security Bill Woodcock | 2 | |
|
277. | kdevelop | 2 | |
|
278. | The Julia programming language A look at arrays and Trilinos integration | 2 | |
|
279. | CB15 How South Korea Invests in Human Capital for Cyber Security by Seungjoo Gabriel Kim | 2 | |
|
280. | Protecting the BGP Routes to Top Level DNS Servers | 2 | |
|
281. | Grace Nolan Condensed History of Lock Picking CrikeyCon 2017 | 2 | |
|
282. | Hands on composition of basic L4Re components | 2 | |
|
283. | Quantum circuit optimisation, verification, and simulation with PyZX | 2 | |
|
284. | Hacking invisibly and silently with light and sound Matt Wixey | 2 | |
|
285. | 35C3 2018 The Layman's Guide to Zero Day Engineering | 2 | Guide |
|
286. | Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts | 2 | |
|
287. | Morgan Marquis Boire All Your Evidence Is Belong To Us Antiforensics and You | 2 | |
|
288. | OpenDHT make your project distributed Use cases, new and upcoming features | 2 | |
|
289. | BlueHat Seattle 2019 Kubernetes Practical Attack and Defense | 2 | |
|
290. | COMMSEC Blockchain And Smart Contract Attack Vectors Jorden Seet | 2 | |
|
291. | Application of OSINT SOCMINT techniques for the detection and analysis of terrorist profiles Cyber | 2 | |
|
292. | The Eleventh HOPE 2016 Iridium Satellite Hacking | 2 | |
|
293. | KDE on FreeBSD | 2 | |
|
294. | The Conficker Mystery Mikko Hypponen | 2 | |
|
295. | HOPE X A Conversation with Edward Snowden | 2 | |
|
296. | Bufferbloat and Beyond How we reduced delays in the Linux networking stack by order | 2 | |
|
297. | Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets | 2 | |
|
298. | Janus Troelsen Utreexo A dynamic hash based accumulator data structure | 2 | |
|
299. | ActivityPub panel | 2 | |
|
300. | Ian Coldwater Hello World | 2 | |
|