How to Report on a Hack Without Becoming a Puppet
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 234 | |
Author | ||
License | CC Attribution - ShareAlike 3.0 Germany: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this | |
Identifiers | 10.5446/32986 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Right anglePoint (geometry)PlotterCybersexMotherboardComputerTelecommunicationMultiplication signInformationBitMessage passingHacker (term)Group actionOcean currentMeasurementMereologyArmObservational studyInformation securityArithmetic meanEncryptionWebsiteComputer animationJSONXMLUML
02:31
MotherboardMessage passingMultiplication signScaling (geometry)BitPasswordDesign by contractInformationFamilyEmailType theoryInformation securityAngleFigurate numberWebsiteQuicksortHacker (term)Information privacyMeeting/Interview
03:23
WebsiteINTEGRALInformation privacyHacker (term)State of matterCore dumpRight angleAddress spaceFormal verificationHoaxEmailBitMeeting/Interview
04:40
BitAddress spaceFormal verificationMultiplication signEmailInformationReal numberRhombusInternet service providerCASE <Informatik>Design by contractInsertion lossPasswordTraffic reportingGoodness of fitMeeting/Interview
06:11
Maxima and minimaBitCASE <Informatik>Software developerAddress spaceSpywareDigital photographySoftwareMessage passingSystem callIntercept theoremMeeting/Interview
07:01
Dependent and independent variablesPhysical systemFlow separationQuicksortDivisorDigital photographyFormal verificationPhysical lawElectronic mailing listMeeting/Interview
07:55
BitFormal verificationHacker (term)Film editingMeeting/Interview
08:37
InformationMultiplication signCASE <Informatik>Formal verificationSource codeSet (mathematics)Meeting/Interview
09:19
WebsiteRight angleWater vaporPhysical systemGame theoryInternet forumRevision controlGroup actionGoodness of fitMeeting/Interview
10:03
Attribute grammarHacker (term)Condition numberWebsiteCASE <Informatik>PasswordEmailGame theoryMeeting/Interview
11:01
CASE <Informatik>Source codeMultilaterationHacker (term)Core dumpEmailAttribute grammarCondition numberPlastikkarteInformationNumberAddress spaceQuicksortLeakMeeting/Interview
12:05
Content (media)Link (knot theory)LeakFilesharing-SystemTerm (mathematics)EmailWebsiteComputer fileInformationMeeting/Interview
12:49
MotherboardCASE <Informatik>LeakQuicksortMeeting/Interview
13:34
CASE <Informatik>Attribute grammarSound effectGroup actionBuildingMultiplication signFerry CorstenOrder (biology)Forcing (mathematics)IP addressEquivalence relationIntegrated development environmentFlow separationSimilarity (geometry)SoftwarePhysicalismGame controllerIdentity managementLink (knot theory)RhombusLibrary (computing)Instance (computer science)Control flowContent (media)Process (computing)InformationHacker (term)Meeting/Interview
15:46
CASE <Informatik>Physical systemTwitterHacker (term)Medical imagingHypermediaNormal (geometry)WebsiteLikelihood functionAdditionSource codeEmailInformationPoint (geometry)Covering spaceStapeldateiDivisorSpeech synthesisConservation lawNatural numberCore dumpAttribute grammarMaxima and minimaQuicksortMeeting/Interview
18:01
Traffic reportingPairwise comparisonContext awarenessOperator (mathematics)Meeting/Interview
18:55
Hand fanMultilaterationMereologyBitOnline helpEmailContext awarenessInformationLecture/ConferenceMeeting/Interview
19:45
EmailMereologyWage labourScaling (geometry)Public domainHacker (term)InformationMeeting/Interview
20:32
MereologyProcess (computing)Hacker (term)InformationReal numberNumberCASE <Informatik>Operator (mathematics)LeakMeeting/Interview
21:48
Traffic reportingEmailHypermediaInternetworkingCurvatureFile archiverLink (knot theory)Multiplication signSelectivity (electronic)Core dumpMereology2 (number)Meeting/Interview
22:49
Moment (mathematics)HypermediaReal numberHacker (term)EmailScheduling (computing)Right angleCore dumpMeeting/Interview
23:31
QuicksortEntire functionInformationPublic domainLeakSingle-precision floating-point formatHacker (term)Meeting/Interview
24:37
Information privacyChemical equationCore dumpWebsiteInformationInformation securityWave packetEmailHacker (term)QuicksortMeeting/Interview
25:52
Operator (mathematics)Multiplication signSystem callLeakIntercept theoremUniqueness quantificationMeeting/Interview
26:46
ArmInformationOperator (mathematics)TelecommunicationLeakMeeting/Interview
28:29
GenderInformationArithmetic meanSoftware developerLeakEmailStructural loadGroup actionLevel (video gaming)Operator (mathematics)Pattern languageModemRight angleWeb 2.0Core dumpMeeting/Interview
29:52
TwitterCoefficientLine (geometry)Hacker (term)WordMultiplication signMeeting/Interview
30:32
Multiplication signInformationStress (mechanics)CASE <Informatik>State of matterTwitterLie groupQuicksortTraffic reportingMeeting/Interview
31:24
HypermediaLeakTwitterParameter (computer programming)Game controllerOrder of magnitudeService-oriented architectureStress (mechanics)Row (database)Acoustic shadowCycle (graph theory)Hacker (term)ArmInformation securityLecture/ConferenceMeeting/Interview
32:24
Set (mathematics)MotherboardGroup actionService-oriented architectureAcoustic shadowHacker (term)Selectivity (electronic)TwitterPhysical system1 (number)DatabaseWindowIntercept theoremInstance (computer science)Revision controlCybersexMalwareLeakQuicksortInformation securityTransport Layer SecuritySoftware development kitMeeting/Interview
34:27
State observerReal-time operating systemEvent horizonService-oriented architectureAcoustic shadowInstance (computer science)Term (mathematics)Maxima and minimaPhysical systemMultiplication signEquivalence relationSound effectElectronic mailing listVulnerability (computing)Order (biology)InformationArithmetic meanMeeting/Interview
36:11
Service-oriented architectureAttribute grammarAcoustic shadowCASE <Informatik>MereologyComputer forensicsOperator (mathematics)2 (number)SpacetimeState observerOrder (biology)Multiplication signObservational studyLatent heatLeak
37:49
Multiplication signPerspective (visual)MereologyCASE <Informatik>Open set1 (number)Performance appraisalDecision theorySemiconductor memoryQuicksortInterpreter (computing)Right angleContext awarenessDifferent (Kate Ryan album)Table (information)ArmAddress spaceHacker (term)LeakMeeting/Interview
39:41
Sound effectCASE <Informatik>Theory of relativityDegree (graph theory)Multiplication signTelecommunicationSource codeAuthorizationInteractive televisionInformationResultantWebsiteHacker (term)Meeting/Interview
40:36
Regulator geneSystem callBlogInformationHecke operatorPoint (geometry)FamilyDivisorForcing (mathematics)Physical lawAddress spaceHacker (term)Office suiteNumberSource codeMultiplication signInformation securityInternetworkingFigurate numberData conversionWebsiteCASE <Informatik>Goodness of fitPlastikkarteScaling (geometry)Web 2.0CausalitySoftware testingHypermediaCodeLatent heatClient (computing)Server (computing)Bit
45:06
Observational studyCASE <Informatik>AuthorizationPhysical lawInformation securityComputer hardwareNeuroinformatikRadical (chemistry)Group actionMoment (mathematics)Form (programming)SpacetimeLecture/Conference
46:44
Source codeRamificationGroup actionInsertion lossPoint (geometry)Touch typingWordProcess (computing)WebsiteHypermediaLine (geometry)Cellular automatonRight angleRow (database)Hacker (term)BitData conversionGoodness of fitLecture/ConferenceMeeting/Interview
49:29
Multiplication signPoint (geometry)MereologyFormal verificationAttribute grammarProcess (computing)Hacker (term)CASE <Informatik>Speech synthesisSource codeContext awarenessQuicksortRight angleMeeting/Interview
51:01
Ocean currentQuicksortMoment (mathematics)Perspective (visual)Different (Kate Ryan album)Computer clusterLecture/Conference
52:03
TwitterDataflowRobotInstance (computer science)Dependent and independent variablesVolume (thermodynamics)Public domainDatabaseComputing platformHypermediaInternet service providerOperator (mathematics)Information securitySound effectData storage deviceMereologyTrailMultiplication signProduct (business)InformationNoise (electronics)
54:09
Computer animation
Transcript: English(auto-generated)