Search for person "Thorsten Schröder"
next
22 min
Fighting code-abuse by military and intelligence
59 min
Rechtsbrüche beim Export von Überwachungssoftware
59 min
...or why we need 17 billion Volts to make a picture.
60 min
Managed (Linux-)Desktops auf Basis Freier Software
55 min
Analyse einer Wahlsoftware
52 min
A swiss army knife for automatic social investigation
27 min
How to leverage systemd soft-reboot in openSUSE
63 min
Overview of Current Keylogger Threats
23 min
Don't bring your system down
29 min
How to handle updates of config files in /etc
54 min
Transparently and securely use your existing keys to sign…
60 min
Stories from the journey of porting a massive c++…
45 min
Status Quo and Future Threats
55 min
IT Automatisierung und zentrales Management mit SALT
next