Wireless Keystroke Injection via Bluetooth Low Energy
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/62220 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Vulnerability (computing)PlastikkarteKeyboard shortcutWindowVideoconferencingDemo (music)Revision controlDecision tree learningComputer animation
00:44
Keyboard shortcutSoftware protection dongleGraphics tabletConnected spaceRootMaxima and minimaPhysical systemSigma-algebraMultitier architectureKeyboard shortcutWindowCuboidSpacetimeConnected spaceOperating systemDifferent (Kate Ryan album)Flow separationCartesian coordinate systemEncryptionFirmwareMereologyImplementationLink (knot theory)Configuration spaceTelecommunicationGame controllerVideoconferencingMultiplication signProcedural programmingCommunications protocolAssociative propertySoftware protection dongleAttribute grammarComputer-assisted translationOSI modelSet (mathematics)Object (grammar)Descriptive statisticsComputer hardwareExploit (computer security)Order (biology)Theory of relativitySoftwareVirtual machineLatent heatState of matterInformation securityException handlingPoint (geometry)Moment (mathematics)InformationFood energyVulnerability (computing)Presentation of a groupDigital photographyEvent horizonEndliche ModelltheorieNumbering schemeProof theoryComputer animation
08:30
EncryptionMaxima and minimaRegulärer Ausdruck <Textverarbeitung>Division (mathematics)Menu (computing)Gamma functionLink (knot theory)Vector spaceOSI modelControl flowRandom numberField (computer science)Sheaf (mathematics)MereologyLimit (category theory)MathematicsVulnerability (computing)Convex hullLink (knot theory)Message passingAuthenticationKey (cryptography)EncryptionStandard deviationContext awarenessConnected spaceDependent and independent variablesSlide rulePoint (geometry)MereologyState of matterMultiplication signCorrespondence (mathematics)Vulnerability (computing)Vector spacePrice indexOrder (biology)Procedural programmingEvent horizonMathematicsLevel (video gaming)WindowQueue (abstract data type)CASE <Informatik>Communications protocolWritingRandom number generationLatent heatComputer animation
16:00
Control flowFood energyOSI modelFrame problemInformationCommunications protocolAttribute grammarOpcodeEmailAddress spaceConvex hullMessage passingWorld Wide Web ConsortiumDirection (geometry)CodeAddress spaceEncryptionMessage passingOpen sourceConnected spaceLink (knot theory)Direction (geometry)Level (video gaming)MereologyGame controllerNumberCommunications protocolFunctional (mathematics)Multiplication signDependent and independent variablesCausalityObject (grammar)State of matterNormal (geometry)Stack (abstract data type)ImplementationPrice indexPoint (geometry)FirmwareOrder (biology)Greatest elementKeyboard shortcutFood energyMotion captureHoaxTelecommunicationDataflowHookingSoftware frameworkReading (process)Slide ruleAuthenticationDivisorComputer animation
23:30
GEDCOMCommunications protocolDependent and independent variablesReading (process)Game controllerAlgorithmic information theoryVoltmeterFood energyEmailData typeAddress spaceFlagLatent heatLengthBroadcasting (networking)CAN busCyclic redundancy checkFrame problemOSI modelInformationKeyboard shortcutReal-time operating systemConnected spaceOrder (biology)Limit (category theory)Demo (music)Computer file2 (number)ImplementationConfiguration spaceSoftware protection dongleCharacteristic polynomialDirection (geometry)Loop (music)Multiplication signDivisorAsynchronous Transfer ModePrice indexAddress spaceProof theoryRight angleKeyboard shortcutMessage passingElectronic mailing listWindowAttribute grammarType theoryOperator (mathematics)InjektivitätData structureCASE <Informatik>Traffic reportingPlastikkarteDependent and independent variablesGroup actionParameter (computer programming)Scripting languageFood energyComputer programmingCodeWritingComputer configurationSoftware testingVideoconferencingOpcodeSystem identificationFirmwareComputer animation
31:00
VacuumGamma functionKeyboard shortcutConvex hullEvent horizonSoftware protection dongleView (database)File formatProcess (computing)Keyboard shortcutVirtual machineDemo (music)Medical imagingFrequencyPoint (geometry)Message passingMultiplication signWindowConnected spaceProof theoryCASE <Informatik>Power (physics)Software protection dongleMalwareFood energyComputer animation
33:24
Vulnerability (computing)MereologyReal-time operating systemConnected spaceWindowPoint (geometry)CASE <Informatik>Demo (music)BlogPhysical systemPatch (Unix)Computer programmingSquare numberCuboidWeb pageProof theoryFirmwareKeyboard shortcutFile formatSoftware bugMalwareProjective plane2 (number)Vulnerability (computing)Virtual machineMultiplication signComputer animation
Transcript: Englisch(auto-generated)