The Ultimate Galaksija Talk

Everything about a Yugoslavian microcomputer halfway between a TRS-80 and a ZX 80. Galaksija was to be in Yugoslavia what Commodore and Sinclair were in the west. Whether it succeeded […]
Windows Memory Forensics
Aside from further development of traditional forensic techniques which involve post-mortem hard disk analysis, in the last couple of years the field of computer forensics has been marked by significant […]
SCADA Strangelove

How I Learned to Start Worrying and Love Nuclear Plants Modern civilization unconditionally depends on information systems. It is paradoxical but true that ICS/SCADA systems are the most insecure systems […]
Further Hacks on the Calypso Platform
OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]
Securing the Campaign

Security and the 2012 US Presidential Election This talk will go into some of challenges, solutions, and stories from securing a campaign for the 2012 US presidential election. Persons: Ben […]
Hacking Cisco Phones
Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]
Setting Mobile Phones Free

An overview of a mobile telephony market and how a community-driven operator is born In The Netherlands, this year the community-driven mobile telco Limesco has started operations. We’re providing voice, […]
Hanussen’s Mindreading
Experiments of the Historical Psychic This is fun stuff for the late night program, not a serious talk: Is it possible to read sb. others mind? In the late 1920ies/early […]
Smartmeter
A Technological Overview of the German Roll-Out This talk will give an overview on the technology, the laws and the technical guidelines of the smartMeter roll-out in Germany. Persons: Derpeter
Hash-Flooding DOS Reloaded

At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET, Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS attacks. The vulnerability was then often […]