Taking Bluetooth lockpicking to the next level
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 102 | |
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/43243 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
TelecommunicationChaos (cosmogony)Office suitePerturbation theoryMultiplication signJSONXMLLecture/Conference
00:39
Information securityExecution unitPresentation of a groupHand fanBit rateQuantum stateInformation securityTelecommunicationInsertion lossComputer animation
01:56
Dew pointRevision controlTrailSmart DeviceHacker (term)System programmingFood energyForm (programming)Content (media)Presentation of a groupInternet service providerHacker (term)BuildingBand matrixPlastikkarteVulnerability (computing)Physical systemFood energyComputer animation
02:34
Smart DeviceHacker (term)System programmingFood energyPresentation of a groupExecution unitKey (cryptography)Component-based software engineeringPlastikkarteInternetworkingSmartphoneBitDependent and independent variablesInternetworkingProcess (computing)Vulnerability (computing)SmartphonePhysical systemFood energyPoint (geometry)Key (cryptography)ECosComputer animation
03:20
Computer hardwareVibrationInternetworkingSmartphoneVector graphicsMobile appDew pointVirtual machineVector spaceComputer hardwareTelecommunicationDecision tree learningPower (physics)Physical systemKey (cryptography)Mathematical analysisImplementationConnected spaceMereologyServer (computing)InternetworkingPresentation of a groupPoint (geometry)AuthenticationSurjective functionFlash memoryFront and back endsSmartphoneWeb 2.0Mechanism designWeb serviceVulnerability (computing)Computer animation
04:46
Dew pointVirtual machineVector graphicsInternetworkingSmartphoneMobile appFood energyMereologyTelecommunicationBit ratePersonal digital assistantExecution unitInformation securityOSI modelComputer configurationMusical ensembleVorwärtsfehlerkorrekturAnwendungsschichtTelecommunicationVector spaceVirtual machinePhysical systemPower (physics)Exterior algebraMereologyFood energyPoint (geometry)Classical physicsElliptic curveComputer configurationConnected spaceMeasurementCASE <Informatik>Information securityIP addressCartesian coordinate systemBit rateSmartphoneRoutingCurveMeeting/InterviewJSONXMLUMLComputer animation
06:25
Asynchronous Transfer ModeAndroid (robot)Installation artPublic key certificateDew pointGroup actionComputer configurationSpeech synthesisMobile appFile systemGroup actionMenu (computing)Asynchronous Transfer ModeComputer fileTimestampPublic key certificatePhysical systemCuboidDiscrete element methodMultiplication signMeeting/InterviewComputer animation
07:14
Group actionAttribute grammarCommunications protocolLengthLocal ringDependent and independent variablesFrame problemLie groupProof theorySequenceExecution unitTelecommunicationProof theoryConnected spaceCommunications protocolData streamComputer fileEvent horizonPlug-in (computing)Video gameSequenceMereologyComputer virusSet (mathematics)Computer animation
08:48
FirmwareSpywareBitFirmwareSpywareConnected spaceWhiteboardMultiplication signLecture/ConferenceComputer animation
09:38
Proof theoryQuantum stateExecution unitSoftware frameworkComplex (psychology)Power (physics)MereologyAuthorizationObservational studyComputer animation
10:20
Software frameworkRootTransport Layer SecurityPublic key certificateAndroid (robot)SoftwareAxiom of choicePhysical systemVirtual machineConfiguration spaceRevision controlInternetworkingRootInformation securityPoint (geometry)outputData storage deviceOnline helpHoaxPublic key certificateAndroid (robot)Mobile appSet (mathematics)Different (Kate Ryan album)Computer animation
11:51
Digital signalCodePublic key certificateNumberView (database)Raw image formatChainPeer-to-peerLogic gateAndroid (robot)Revision controlSystem callIntercept theoremMeasurementSign (mathematics)Key (cryptography)Public key certificateMobile appPhysical systemSound effectDigital photographyMathematical analysisCodeRevision controlCartesian coordinate systemObject (grammar)Online helpComputer fileComputer animation
13:31
Run time (program lifecycle phase)Mobile WebExecution unitScripting languageTransport Layer SecuritySequencePublic key certificateMathematical analysisHacker (term)Information securityCommunications protocolMobile WebSoftware developerMobile appServer (computing)Connectivity (graph theory)RoutingObject (grammar)Type theoryRootPersonal identification numberInformation overloadAndroid (robot)MereologyDot productTerm (mathematics)System callException handlingCASE <Informatik>Information securityOnline helpGreatest elementArmSpacetimeLecture/Conference
15:15
Proxy serverSuite (music)Transport Layer SecurityDependent and independent variablesEvent horizonExecution unitVariety (linguistics)Transportation theory (mathematics)Line (geometry)Execution unitProxy serverDataflowRoutingFirmwareEvent horizonMessage passingAndroid (robot)Order (biology)Physical systemControl flowLecture/ConferenceComputer animation
17:11
Inclusion mapElectronic mailing listSequenceAbsolute valueRevision controlAdvanced Encryption StandardData structureEncryptionRandom numberPhysical systemCommunications protocolData transmissionMedical imagingServer (computing)RandomizationEncryptionPasswordFront and back endsBitCartesian coordinate systemKey (cryptography)ArmSmartphoneLecture/Conference
18:55
Dew pointCommunications protocolOrdinary differential equationCodeCloud computingRow (database)Flow separationKey (cryptography)Front and back endsMultiplication signMereologyCASE <Informatik>Communications protocolDependent and independent variablesLecture/ConferenceComputer animation
19:48
MathematicsSoftwareConnected spaceMetropolitan area networkCartesian coordinate systemLibrary (computing)Mixed realityMeeting/Interview
20:33
Formal verificationPhysical systemCommunications protocolWritingLeakKey (cryptography)Dew pointInternetworkingSmartphoneMobile appPhysical lawFuzzy logicTerm (mathematics)Vulnerability (computing)MathematicsCommunications protocolCartesian coordinate systemKey (cryptography)Front and back endsCompilerPhysical systemCASE <Informatik>Source codeComputer animation
21:54
Source codeAndroid (robot)CodeInclusion mapJava appletBinary fileComputer fileArmCodeCartesian coordinate systemJava appletSource codeCryptographyProcess (computing)Helmholtz decompositionArmAndroid (robot)Computer animation
22:39
CryptographyAndroid (robot)Point (geometry)Java appletService (economics)Key (cryptography)Android (robot)Video gameOrder (biology)State of matterHypermediaCartesian coordinate systemSymbol tableComputer animation
23:20
Dew pointJava appletCodeAndroid (robot)Key (cryptography)Symbol tableMobile appWritingComputer animationMeeting/Interview
24:03
Information securityPeer-to-peerCommunications protocolMessage passingMathematical analysisPhysical systemProof theoryAuto mechanicCodeDew pointAttribute grammarHexagonDecimalWindowData transmissionPasswordCodeEncryptionExtreme programmingArchaeological field surveyTablet computerComputer animationXMLUML
24:59
CodeAttribute grammarCommunications protocolHexagonDecimalEmulationDew pointRamsey theoryString (computer science)HexagonDecimalKey (cryptography)CodeMathematical singularityRight angleMobile appPresentation of a groupOpen setVulnerability (computing)RandomizationMessage passingMassComputer animation
25:55
Execution unitRamsey theoryTelecommunicationOpen setBlock (periodic table)
26:34
Ramsey theoryPresentation of a groupProjective planeRevision controlComputer animationMeeting/Interview
27:10
EncryptionInformation securityTerm (mathematics)Key (cryptography)Advanced Encryption StandardElectronic data interchangeRecurrence relationSpeech synthesisOperator (mathematics)Information securityOpen setCommunications protocolKey (cryptography)Different (Kate Ryan album)Multiplication signVulnerability (computing)Mechanism designBitDisassemblerComputer animation
28:01
Heat transferEncryptionExclusive orModulo (jargon)Staff (military)Computer hardwareMobile appSoftware development kitMobile WebBitKey (cryptography)Product (business)MereologyCodeVideo gameCryptographyInformation securityAuthenticationCartesian coordinate systemMechanism designMobile appSequenceNetwork topologyVibrationGroup actionComplex (psychology)Physical systemHeat transferQueue (abstract data type)NumberLink (knot theory)Operator (mathematics)Shared memoryPlastikkarteProxy serverECosSocial engineering (security)Mobile WebComputer animation
30:23
Demo (music)Mobile WebEncryptionAdvanced Encryption StandardPhysical systemReverse engineeringVector spaceCASE <Informatik>Normal (geometry)Proxy serverCryptographyPerspective (visual)Physical systemKey (cryptography)TelecommunicationRevision controlException handlingCommunications protocolDirection (geometry)Front and back endsLoginMobile appVector spacePhysical lawCore dumpSystem callTransport Layer SecurityJSONXMLUMLComputer animation
31:54
Computer clusterPhysical systemMobile WebTransport Layer SecurityFitness functionDependent and independent variablesAttribute grammarCommunications protocolElectronic data interchangeMathematical analysisSocial classStability theoryKey (cryptography)MultiplicationTheoryFigurate numberGoodness of fitComputer animationSource codeXML
33:02
Cyclic redundancy checkMathematical analysisDew pointScripting languagePolynomialExclusive orParameter (computer programming)Message passingCalculationSequenceExecution unitoutputTelecommunicationPointer (computer programming)Mobile WebRow (database)MultiplicationMathematicsLine (geometry)Term (mathematics)ArmMessage passingBitReverse engineeringScripting languageForcing (mathematics)Direction (geometry)Mixed realityCodePolynomialPhysical systemCartesian coordinate systemExclusive orCalculationFront and back endsInitial value problemProjective planeMultiplication signRight angleComputer animation
35:32
Dew pointNumberPeripheralPort scannerRootScripting languageRow (database)LaptopData transmissionTraffic reportingTouchscreenCASE <Informatik>Hecke operatorScripting languageHacker (term)Real numberClassical physicsComputer animationLecture/Conference
36:11
View (database)LaptopScripting languageSuite (music)Lecture/Conference
36:48
Scripting languageTelecommunicationElectronic data interchangeProduct (business)ChainWebsiteCommunications protocolBounded variationCyclic redundancy checkPhysical systemPiScripting languageDigitizingChainNumberCommunications protocolBounded variationMobile appCodeMathematicsNetwork topologyBinary codeReal numberComputer animation
37:58
Address spaceReal numberKey (cryptography)Computer configurationInformation securityFitness functionService (economics)Software testingMeeting/InterviewComputer animation
38:40
Computer clusterSimulationScripting languageComputer hardwareKey (cryptography)Mobile appPhysical lawScripting languageComputer hardwareComputer simulationException handlingLaptopMultiplication signComputer animation
39:25
Execution unitDependent and independent variablesFeasibility studyCodeProof theoryVulnerability (computing)Software development kitSystem identificationTelecommunicationProof theoryPhysical systemEmailLatent heatDifferent (Kate Ryan album)Mobile appCodeVideoconferencingState of matterDependent and independent variablesCASE <Informatik>ECosRight angleOffice suiteComputer animation
40:44
State of matterBitPhysical systemPlastikkarteMobile app2 (number)Lecture/Conference
41:25
Dew pointSoftware development kitSystem identificationMobile appElectric currentOSI modelCommunications protocolBitProcess (computing)Physical systemMeasurementPresentation of a groupCommunications protocolDesign by contractInformationBuildingSlide ruleLink (knot theory)Information securityPoint (geometry)WordOnline helpMobile appField (computer science)Kälteerzeugung2 (number)Computer animation
43:01
2 (number)Multiplication signComputer animationLecture/Conference
43:36
Radio-frequency identificationGroup actionPhysical systemPlastikkarteField (computer science)Different (Kate Ryan album)CloningQuicksortMagnetic stripe cardComputer animation
44:49
QuicksortPhysical systemException handlingInformation securityView (database)Multiplication signDigitizingLink (knot theory)EncryptionCartesian coordinate systemLecture/ConferenceMeeting/Interview
45:35
Finite element methodCASE <Informatik>TouchscreenInternetworkingInternet der DingeLecture/ConferenceComputer animationJSON
46:11
Computer animation
Transcript: English(auto-generated)