Toggle navigation
FeMCI
Recent Productions
LIVE
iSTUFF Livestream
Watch live
Mediathek
Login
Tiles
List
Mediathek
Streaming-Archiv
Vorträge
22c3
Tag 1
Tag 1
Vorträge: Private Investigations,Die BioP-II-Studie des BSI
Videos
Data Retention - what comes next?
Chances and Risks of Data Retention Legislation are currently...
Syscall proxying fun and applications
This talk is about how using syscall proxying technique for...
Writing better code (in Dylan)
An overview of the highly dynamic, object-oriented, functional...
Bad TRIPs
The TRIPS Treaty is one of the most discussed within the WTO. Its...
Media System Deployment using Python
Using Python, a large variety of media-oriented systems can be...
Hacking Data Retention
Data retention is presented as a solution for fighting child...
Lightning Talks Day 1
There are also loads of reasons for attending the lightning talks...
Peer-to-peer under the hood
About p2p-algorithms for fully distributed, totally serverless,...
Videoueberwachung an deutschen Hochschulen
Nach den BigBrotherAwards 2004, bei denen die Universitaet...
Hacking CCTV
CCTV moechte fuer mehr oeffentliche Sicherheit sorgen, bringt aber...
Message generation at the info layer
What have talking to your lover and information warfare in common?...
The grey commons
Piratbyran.org in Sweden has since 2003
Finding and Preventing Buffer Overflows
A talk that will present academic tools, which are designed to find...
Hopalong Casualty
Automated analysis of surveillance videos has seen a lot of...
W3C on Mobile, CSS, Multimodal and more
W3C is developing several new Web technologies and modules for...
Cybercrime Convention
Within the topic of international regulation attempts in the field...
«
1
2
3
»