Search for person "Walter van Holst (Vrijschrift)" returned 122 results

53 min
Smart, safe & happy
ensuring civil rights in the digital era

60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…

53 min
TBM: Trusted boot module
NLNet sponsored (open hardware) trusted boot module

60 min
Windows drivers attack surface
some 'new' insights

82 min
Maker-Board meets Chiptunes
8-Bit-Rechner als Musikinstrumente

45 min
Time affects
Human-computer-synchronizations

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

61 min
X Security
It's worse than it looks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

38 min
Der Inhalt dieses Vortrags ist in deinem Land leider nicht verfügbar.
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…

51 min
iOS application security
A look at the security of 3rd party iOS applications

73 min
hacking smart phones
expanding the attack surface and then some

49 min
MySQL Multi-Master Replication Failover - A step-by-step explanation
How to setup a MySQL cluster with Automatic failover for HA

44 min
Why technology sucks
If technology is the solution, politicians are the problem

53 min