Show filters Hide filters

Refine your search

Publication Year
Organisation found in the video
1-8 out of 8 results
Change view
  • Sort by:
30:46 Berkeley System Distribution (BSD), Andrea Ross English 2014

BSDCan 2014 Keynote, FlightAware

  • Published: 2014
  • Publisher: Berkeley System Distribution (BSD), Andrea Ross
  • Language: English
2:21:24 Technische Universität Braunschweig, Institut für Informationssysteme English 2011

Support vector machines (8.6.2011)

This lecture provides an introduction to the fields of information retrieval and web search. We will discuss how relevant information can be found in very large and mostly unstructured data collections; this is particularly interesting in cases where users cannot provide a clear formulation of their current information need. Web search engines like Google are a typical application of the techniques covered by this course.
  • Published: 2011
  • Publisher: Technische Universität Braunschweig, Institut für Informationssysteme
  • Language: English
25:37 DjangoCon US English 2015

Making Django Really, Really, Ridiculously Secure (CW)

Callisto is an online reporting system designed to provide a more empowering, transparent, and confidential reporting experience for college sexual assault survivors. It's absolutely essential that we keep our user's data secure. So essential, in fact, that we couldn't leave it up to developers alone. We'll go over what Django settings, libraries and practices we used to ensure that on the development end. Then we'll walk through the process of obtaining, undergoing, and acting on a formal security audit from a professional security firm. You'll find out what they were looking for, what we missed, and how we fixed it, and how you might approach similar challenges for your companies and applications.
  • Published: 2015
  • Publisher: DjangoCon US
  • Language: English
17:05 REcon English 2017


The presentation will show how easy it can be to crack not just Mifare Classic but the new Mifare Plus which have an improved PRNG which nullifies MFCUK/MFOC which currently crack Mifare Classic. I have taken portions of code from the Proxmark3 and LibNFC to combine into one tool that works with a 30 usb reader which looks just like a usb thumbdrive, and requires no arguments whatsoever. Simply place a card on the reader, run: ./miLazyCracker And the script will talk to the card, determine if the PRNG is vulnerable or not, and select the proper attack. From there it will iterate through any missing keys and finally dump the card so it can be cloned. The talk also shows how to create cards with open source tools (this part is not new but it’s easily explained). I am a Masters student in Computer Science and have worked with embedded devices for about 10 years and most recently worked in cyber security research. I love everything smart card related, wireless (zigbee, zwave, 6LoPAN), hardware hacking, reversing .NET and patching programs to do crazy stuff. I think this is cool because anyone can clone a card (or see if its clonable) with no prior knowledge of smart cards, no learning about sector layouts and what arguments to give to the script whatsoever, and it only a 30 part which looks like a usb thumb drive. This makes it very possible to sit on a bus or subway next to the lady who has her badge in her purse and potentially clone her card, follow her to work and gain access to a building. Its not necessarily the most novel reverse engineering feat but it bring smart card cloning (and attacks as recent as 6 months old) to the masses. this isn’t so more people can break in, but so companies can be aware of how easy this is and to move away from anything with the name Mifare.
  • Published: 2017
  • Publisher: REcon
  • Language: English
24:38 FOSDEM VZW English 2014

OpenTRV: resource-constained computing: less is more

A talk about work so far on OpenTRV. OpenTRV sets out to make it easy to save lots of energy by not heating rooms that you're not in, and by no longer trying to use a single thermostat to get your whole house comfortable. OpenTRV also allows a simple schedule to be set (no complex displays though!) and tries to anticipate when you'll need heating to improve comfort while boosting efficiency. OpenTRV is designed to be simple to (retro-)fit to existing UK housing stock with radiator central heating. OpenTRV runs on PICAXE and AVR/ATMega microcontrollers drawing micro-watts to run for a year or two on AA cells while saving you kilowatts in space heating and is completely open source (Apache/SolderPad), software and hardware. We like to call it FOSSH - "free open source software and hardware". We've been working on a combination of open hardware and software projects this year to prove the concept that retrofitted programmable thermostatic radiator valves can reduce the energy required to heat a house and thereby reduce carbon emissions. Along the way we've encountered and solved problems with developing open hardware and software devices and commenced testing in conjunction with a local university. The talk highlights the lessons learned and maps out the current state and future plans. We've designed a PCB, got it manufactured, populated it ourselves and via a manufacturer, sourced components, 3D printed boxes, written software, entered competitions, are in the process of testing it with real end users in conjunction with a local university and generally sweated, got frustrated and elated at various times. Now we'd like to share the lessons learned, let people know what the project is about, outline the future plans and hopefully inspire some talented people to help the project out with reducing carbon emissions significantly.
  • Published: 2014
  • Publisher: FOSDEM VZW
  • Language: English
20:45 DEF CON English 2018

barcOwned Popping Shells with Your Cereal Box

Barcodes and barcode scanners are ubiquitous in many industries and work with untrusted data on labels, boxes, and even phone screens. Most scanners also allow programming via barcodes to manipulate and inject keystrokes. See the problem? By scanning a few programming barcodes, you can infect a scanner and access the keyboard of the host device, letting you type commands just like a Rubber Ducky. This culminates in barcOwned—a small web app that allows you to program scanners and execute complex, device-agnostic payloads in seconds. Possible applications include keystroke injection (including special keys), infiltration and exfiltration of data on air-gapped systems, and good ol' denial of service attacks.
  • Published: 2018
  • Publisher: DEF CON
  • Language: English
1:26:39 Chaos Computer Club e.V. English 2015

Chaos Communication Camp 2015: Lightning Talks: Day 2

Bring your infectious enthusiasm to an audience with a short attention span! Discuss a program, system or technique! Pitch your projects and ideas or try to rally a crew of people to your party or assembly! Whatever you bring, make it quick!
  • Published: 2015
  • Publisher: Chaos Computer Club e.V.
  • Language: English
27:57 Heidelberg Laureate Forum Foundation English 2017

The HLF Portraits: Charles William Bachman

The Heidelberg Laureate Forum Foundation presents the HLF Portraits: Charles William Bachman; ACM A.M. Turing Award, 1973 Recipients of the ACM A.M. Turing Award and the Abel Prize in discussion with Marc Pachter, Director Emeritus National Portrait Gallery, Smithsonian Institute, about their lives, their research, their careers and the circumstances that led to the awards. Video interviews produced for the Heidelberg Laureate Forum Foundation by the Berlin photographer Peter Badge. The opinions expressed in this video do not necessarily reflect the views of the Heidelberg Laureate Forum Foundation or any other person or associated institution involved in the making and distribution of the video. Background: The Heidelberg Laureate Forum Foundation (HLFF) annually organizes the Heidelberg Laureate Forum (HLF), which is a networking event for mathematicians and computer scientists from all over the world. The HLFF was established and is funded by the German foundation the Klaus Tschira Stiftung (KTS), which promotes natural sciences, mathematics and computer science. The HLF is strongly supported by the award-granting institutions, the Association for Computing Machinery (ACM: ACM A.M. Turing Award, ACM Prize in Computing), the International Mathematical Union (IMU: Fields Medal, Nevanlinna Prize), and the Norwegian Academy of Science and Letters (DNVA: Abel Prize). The Scientific Partners of the HLFF are the Heidelberg Institute for Theoretical Studies (HITS) and Heidelberg University.
  • Published: 2017
  • Publisher: Heidelberg Laureate Forum Foundation
  • Language: English
out of 1 pages


   91 ms - page object
   54 ms - search
    3 ms - highlighting
    0 ms - highlighting/39754
    1 ms - highlighting/32780
    2 ms - highlighting/357
    1 ms - highlighting/15332
    0 ms - highlighting/32395
    0 ms - highlighting/40199
    0 ms - highlighting/32595
    3 ms - highlighting/38132


AV-Portal 3.8.0 (dec2fe8b0ce2e718d55d6f23ab68f0b2424a1f3f)