Why You Should Fear Your mundane Office Equipment
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48362 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Office suiteInformation securitySystem programmingPrincipal idealMaizeComputer hardwareEnterprise architectureOffice suitePresentation of a groupInformation securityTwitterInformation technology consultingGroup actionInformationEmailLecture/ConferenceSource code
00:50
SurfaceSoftware testingElectric currentEnterprise architectureVulnerability (computing)Information securityEnterprise architectureSoftware testingType theoryVulnerability (computing)Phase transitionFuzzy logicOcean currentRemote procedure callState of matterInformation securityFigurate numberDifferent (Kate Ryan album)CodeExploit (computer security)Computer animationSource code
01:54
MereologyInformationAcoustic shadowComputer networkInformationDomain nameVirtual LANCycle (graph theory)Different (Kate Ryan album)Patch (Unix)State of matterPasswordOrder (biology)Configuration spacePivot elementSource codeJSON
02:56
Hacker (term)MereologyComputer networkAcoustic shadowVideoconferencingComputerSurfaceReal-time operating systemState of matterOrder (biology)Hacker (term)Statement (computer science)SurfaceOperator (mathematics)Formal languageExploit (computer security)Different (Kate Ryan album)Mathematical analysisOperating systemData managementComputer hardwareLetterpress printingMultiplication signFirmwareService (economics)DistanceServer (computing)Web applicationWeb 2.0Computer fileMobile WebReal-time operating systemSoftware frameworkPhysical systemComputer animation
04:09
SurfaceReal-time operating systemDrum memoryService (economics)Data managementComputer hardwareFirmwareThermal expansionFormal languageFile formatComputer iconInclusion mapGroup actionSoftware testingPresentation of a groupMathematical analysisLetterpress printingSoftware testingDifferent (Kate Ryan album)Surface1 (number)Element (mathematics)Formal languageFile formatComputer fileState of matterOrder (biology)Crash (computing)Communications protocolVulnerability (computing)Fuzzy logicInformationCASE <Informatik>Process (computing)Computer hardwareSoftware frameworkCycle (graph theory)Computer animation
05:15
Hardware-in-the-loop simulationFuzzy logicPlastikkarteImplementationMessage passingCoding theoryPredicate (grammar)Royal NavyVulnerability (computing)QuadrilateralModul <Datentyp>String (computer science)InjektivitätComputer fileResultantMultiplication sign1 (number)Fuzzy logicDifferent (Kate Ryan album)Module (mathematics)Pearson, KarlCodeCommunications protocolSoftware maintenanceString (computer science)State of matterComputer programmingImplementationMathematicsSoftware bugEndliche ModelltheorieLibrary (computing)Array data structureMachine visionInterface (computing)Parameter (computer programming)Service (economics)Computer animation
06:37
Different (Kate Ryan album)Communications protocolModul <Datentyp>Control flowCommon Language InfrastructureModule (mathematics)Multiplication signParameter (computer programming)File formatUsabilityCASE <Informatik>Computer programmingFuzzy logicDifferent (Kate Ryan album)Modal logicInterface (computing)Video game consoleCommunications protocolService (economics)ImplementationCrash (computing)Scripting languageEscape characterComputer animation
07:43
Different (Kate Ryan album)Communications protocolModul <Datentyp>Common Language InfrastructureControl flowFile formatScripting languageCrash (computing)Fuzzy logicMusical ensembleDemo (music)Attribute grammarSoftware testingCASE <Informatik>Data typeCodierung <Programmierung>Default (computer science)InformationString (computer science)Demo (music)Video game consoleCASE <Informatik>Software testingInformationLetterpress printingNumberSource codeJSON
08:18
Row (database)Default (computer science)Communications protocolHecke operatorMessage passingOpen setNetwork socketRepeating decimalFuzzy logicError messageThresholding (image processing)Element (mathematics)Crash (computing)Primitive (album)Graph (mathematics)Computer configurationContent (media)Modul <Datentyp>Address spaceNormal (geometry)Client (computing)TelnetParameter (computer programming)Mountain passPlastikkarteFIESTA <Programm>Dynamic Host Configuration ProtocolUniform resource locatorAttribute grammarInformation managementMeta elementOnline helpComputer configurationModule (mathematics)Attribute grammarCommunications protocolInternetworkingLetterpress printingComputer animationSource codeJSON
09:06
CASE <Informatik>Software testingSimulationLetterpress printingPrice indexContinuum hypothesisElectronic mailing listMaxima and minimaElement (mathematics)Fuzzy logicFunction (mathematics)Default (computer science)Gastropod shellInformationIdentity managementAttribute grammarTerm (mathematics)Row (database)Inheritance (object-oriented programming)String (computer science)Revision controlGroup actionRaster graphicsFirmwareIntelFibonacci numberData typeLengthMiniDiscConnected spaceVideo game consoleCASE <Informatik>Software testingDifferent (Kate Ryan album)Fuzzy logicSimilarity (geometry)JSONSource codeXML
09:45
Software testingCASE <Informatik>Default (computer science)Data typeString (computer science)InformationLengthCodierung <Programmierung>MiniDiscSpecial unitary groupIndian Remote SensingError messageTorusComputer fontGastropod shellTrigonometryPlastikkarteNewton's law of universal gravitationMessage passingModule (mathematics)Video game consoleLetterpress printingSoftware testingCASE <Informatik>CodeFile formatSource codeJSON
10:20
Identity managementSoftware testingInformationMaxima and minimaPlastikkarteCodierung <Programmierung>Content (media)LengthCASE <Informatik>Data typeNetwork socketNormed vector spaceAttribute grammarFormal languageElectronic mailing listFuzzy logicPrice indexWave packetElement (mathematics)MathematicsDefault (computer science)Proof theoryScripting languageSoftware testingExploit (computer security)CASE <Informatik>Crash (computing)Fuzzy logicSource codeXMLJSON
10:58
Fuzzy logicAttribute grammarFormal languageSoftware testingCASE <Informatik>InformationData typeDefault (computer science)String (computer science)Ring (mathematics)Row (database)Back-face cullingElement (mathematics)Perturbation theoryInformation managementCASE <Informatik>Software testingDataflowBuffer solutionComputer fileScripting languageCrash (computing)Identität <Mathematik>Element (mathematics)Multiplication signCodeVulnerability (computing)Demo (music)Source codeJSONXML
11:33
InformationContinuum hypothesisDemo (music)Attribute grammarCASE <Informatik>Software testingData typeCodierung <Programmierung>String (computer science)Default (computer science)Computer hardwareMathematical analysisInterface (computing)Semiconductor memoryPoint (geometry)CodeDemo (music)Computer hardwareFirmwareSemiconductor memoryInformationSerial portExploit (computer security)BitSource codeJSON
12:26
Semiconductor memoryComputer hardwareSerial portSoftware testingBus (computing)FirmwareSemiconductor memoryCommunications protocolCASE <Informatik>Vulnerability (computing)Tracing (software)InformationGastropod shellError messagePosition operatorBackdoor (computing)Computer hardwareComputer animation
13:21
Computer hardwareBackdoor (computing)Default (computer science)Service (economics)WebsiteGUI widgetComputer hardwarePower (physics)Backdoor (computing)Serial portPhysicalismPoint (geometry)Video game consolePasswordData managementConfiguration spaceGame controllerBackupWeb applicationCross-site scriptingFunctional (mathematics)BitDefault (computer science)Information securityVulnerability (computing)Software testingStructural loadWeb 2.0Product (business)Service (economics)Computer animation
14:52
Content (media)Data typeDefault (computer science)InformationError messageExtension (kinesiology)Computer fileForm (programming)AuthenticationNormed vector spaceComputer fileCodeRemote procedure callObject (grammar)Extension (kinesiology)Reverse engineeringGame controllerFunctional (mathematics)Computer animation
15:27
Convex hullMenu (computing)InformationElectronic mailing listInformation securityAuthorizationOperator (mathematics)Virtual machineDifferent (Kate Ryan album)CASE <Informatik>CoprocessorKerberos <Kryptologie>HTTP cookieDirectory serviceLoginProcess (computing)Operating systemVulnerability (computing)Uniform resource locatorFunctional (mathematics)
16:06
Uniform resource locatorAddress spaceRead-only memoryFlash memoryWeb pageFormal languagePhysical systemComputer networkMessage passingLetterpress printingPoint cloudGoogolData bufferParsingBuffer overflowAttribute grammarService (economics)Open setData typeContent (media)EmailDensity of statesNumberHTTP cookieControl flowComputer fileMemory managementAuthenticationQueue (abstract data type)ParsingParameter (computer programming)Moment (mathematics)LeakSemiconductor memoryAuthenticationCrash (computing)Service (economics)Vulnerability (computing)ImplementationTracing (software)Computer animationSource codeJSON
17:07
Read-only memoryCrash (computing)MereologyExploit (computer security)Tracing (software)Interface (computing)Exploit (computer security)Source codeLecture/Conference
17:41
Cache (computing)Buffer overflowStack (abstract data type)ParsingHTTP cookieData typeCodeEmailFormal languageHill differential equationDependent and independent variablesData bufferExploit (computer security)Open setProof theoryComputer fileBuffer overflowSoftware frameworkCASE <Informatik>Letterpress printingHTTP cookieStack (abstract data type)Crash (computing)Web applicationParsingPort scannerMedical imagingBuffer solutionString (computer science)Point (geometry)Boundary value problemFunctional (mathematics)Symbol tableEqualiser (mathematics)Variable (mathematics)Semiconductor memorySoftware developerLine (geometry)MereologyInclusion mapVulnerability (computing)SpacetimeParameter (computer programming)CountingNumberSoftware bugExploit (computer security)Right angleCodeComputer animation
19:23
LeakExploit (computer security)Directed setSheaf (mathematics)Electronic mailing listStack (abstract data type)Real-time operating systemBuffer overflowChainFormal languageVector potentialSemiconductor memoryReverse engineeringSoftwareReal-time operating systemBuffer solutionOrder (biology)LeakFunctional (mathematics)WritingTable (information)Direction (geometry)Software frameworkGastropod shellVulnerability (computing)MathematicsHydraulic jumpPredictabilityMemory managementCodeSpacetimePattern languageCore dumpSerial portChainFirmwareExploit (computer security)Dataflow
20:55
Buffer overflowStack (abstract data type)Reverse engineeringDemo (music)PlanningGastropod shellData managementCodeVirtual machineComputer hardwareNoise (electronics)Exploit (computer security)Computer animation
21:41
Differential equationDemo (music)IP addressSemiconductor memoryExploit (computer security)Reverse engineeringOrder (biology)Virtual machineConnected spaceComputer wormParameter (computer programming)Operator (mathematics)Vulnerability (computing)Computer animation
23:00
outputHill differential equationVirtual machineDifferent (Kate Ryan album)Probability density function
23:35
MereologyExploit (computer security)Letterpress printingExploit (computer security)Computer hardware2 (number)SoftwareBitCASE <Informatik>Computer animation
24:26
Buffer overflowHTTP cookieFormal language9K33 OsaComputer hardwareSoftwareKernel (computing)FirmwareData bufferEmailParsingKey (cryptography)Token ringRead-only memoryCalculationHash functionMathematicsReverse engineeringMereologyHTTP cookieHash functionCASE <Informatik>Functional (mathematics)AreaSource codeVulnerability (computing)Parameter (computer programming)CodeElement (mathematics)Codierung <Programmierung>LengthResultantPointer (computer programming)2 (number)
25:34
HTTP cookieString (computer science)Source codeBuffer overflowEmulatorFunction (mathematics)CodeThumbnailError messageRead-only memoryBuffer overflowBuffer solutionString (computer science)Order (biology)Software frameworkCodierung <Programmierung>Scripting languageFunctional (mathematics)MereologyHTTP cookieInformationDataflowGastropod shellCodeParameter (computer programming)Pointer (computer programming)Point (geometry)
27:24
Buffer overflowHTTP cookieStack (abstract data type)Address spaceFirmwareReal-time operating systemLevel (video gaming)Mobile appTask (computing)Shared memoryData bufferKernel (computing)Data structureImplementationChainHardware-in-the-loop simulationOrder (biology)Drop (liquid)Point (geometry)Kernel (computing)Address spaceFirmwareCodePhysical systemGastropod shellTask (computing)Proper mapMathematicsCoordinate systemDifferent (Kate Ryan album)Multiplication signOperating systemSemiconductor memoryValidity (statistics)Normal (geometry)IdentifiabilityIterationBit rateChainComputer animation
28:33
Buffer overflowHTTP cookieVector potentialKernel (computing)Data structureFluid staticsAddress spaceSystem identificationRead-only memoryCodeReverse engineeringIdentifiabilityFluid staticsOrder (biology)Kernel (computing)Multiplication signLoop (music)InfinityConfiguration spaceVector potentialCodeRandomizationSemiconductor memoryBooting
29:12
InfinityLoop (music)HTTP cookieBuffer overflowData structureVector potentialFluid staticsBootingAddress spaceRead-only memorySystem identificationCodeKernel (computing)FirmwarePersonal identification numberLoop (music)Order (biology)CodeInfinityComputer configurationSemiconductor memoryInformationAddress spaceCrash (computing)FirmwareForcing (mathematics)Set (mathematics)Proper mapArray data structureFigurate numberVector potentialPoint (geometry)Pointer (computer programming)AreaSystem call2 (number)
31:17
HTTP cookieBuffer overflowAddress spaceVector potentialFirmwareSystem identificationTask (computing)Real-time operating systemAddress spaceLoop (music)Kernel (computing)Semiconductor memoryString (computer science)InfinitySet (mathematics)Software frameworkPattern language2 (number)Point (geometry)Sheaf (mathematics)AreaDistanceState of matter
32:35
Task (computing)Real-time operating systemVector potentialHTTP cookieBuffer overflowFirmwareInformationCodeTask (computing)Order (biology)Vector potentialKernel (computing)Exploit (computer security)Gastropod shellAddress spaceMathematicsVulnerability (computing)InformationLeakMedical imagingMoment (mathematics)Functional (mathematics)Semiconductor memoryMobile WebJSONXMLUMLComputer animation
33:45
InformationHill differential equationThumbnailBinary fileComputer iconHTTP cookieBuffer overflowComputer-generated imageryChainRead-only memoryComputer fileCache (computing)Computer configurationArmEntire functionExploit (computer security)Scripting languageCodeOrder (biology)Functional (mathematics)Cache (computing)Computer configurationCommunications protocolSystem callArmSpeicherschutzDifferent (Kate Ryan album)Source codeTable
34:38
Stack (abstract data type)Address spaceVulnerability (computing)Function (mathematics)Tablet computerHTTP cookieBuffer overflowComputer wormFrame problemTask (computing)Bellman equationDifferent (Kate Ryan album)Address spacePointer (computer programming)Code2 (number)Task (computing)Demo (music)Functional (mathematics)Vulnerability (computing)Connected spaceMultiplication signGastropod shellLetterpress printingReverse engineeringStack (abstract data type)Order (biology)MereologySource codeJSON
35:33
HTTP cookieBuffer overflowStack (abstract data type)Hydraulic jumpLocal GroupData bufferDemo (music)Demo (music)Drop (liquid)Different (Kate Ryan album)InformationExploit (computer security)Functional (mathematics)CodeComputer fileReading (process)Semiconductor memoryAddress spaceHydraulic jumpOrder (biology)Medical imaging2 (number)Normal (geometry)Intrusion detection systemGastropod shellEmailSet (mathematics)XMLUML
37:27
InformationMedical imagingPublic key certificateSemiconductor memoryMathematicsDomain nameWritingSensitivity analysisCodeDemo (music)Structural loadCircleFunctional (mathematics)Source code
38:06
Line (geometry)Computer fileWeb portalMedical imagingSoftware development kitSemiconductor memoryOrder (biology)InformationAddress space2 (number)Asynchronous Transfer ModeStructural loadGroup actionFirmwareBitSource codeJSONComputer animation
39:20
Process (computing)Mixed realityDependent and independent variablesInformation securityVulnerability (computing)Patch (Unix)Vulnerability (computing)Dependent and independent variablesExploit (computer security)Information securityProcedural programmingProcess (computing)Patch (Unix)Capability Maturity ModelComputer animationSource codeJSON
40:16
Web serviceCodeService (economics)Vulnerability (computing)WebsiteData storage deviceProxy serverServer (computing)Data bufferInformationReflection (mathematics)GUI widgetBuffer overflowAuthenticationHTTP cookieAttribute grammarMemory managementStack (abstract data type)Letterpress printingGoogolImplementationPoint cloudIntegerNP-hardFile Transfer ProtocolInformation securityProduct (business)Functional (mathematics)SurfaceOffice suiteChemical equationCodeRemote procedure callCASE <Informatik>1 (number)State of matterInformation securityOffice suiteVulnerability (computing)ImplementationNumberSoftware testingCommunications protocolWeb 2.0Proof theorySelf-organizationMultiplication signWebsiteService (economics)Exploit (computer security)Different (Kate Ryan album)Electronic mailing list
42:39
Endliche ModelltheorieRevision controlProduct (business)Information securityVulnerability (computing)Hacker (term)Service (economics)Computer hardwareCodeElectronic mailing listInformation securityModal logicPhase transitionProduct (business)Software developerMultiplication signConfiguration spaceInformationDomain nameField (computer science)SoftwareSensitivity analysisNormal (geometry)Expected value
43:42
InternetworkingCodeService (economics)Local GroupOffice suitePhase transitionWeb applicationCodeServer (computing)MereologyOnline helpPhase transition
44:49
Lecture/Conference
Transcript: Englisch(auto-generated)