Title
|
Speakers
|
[531] Visualisation of statistics in computer games
|
Michael Zoellner
|
[532] TCPA - resistance is possible
|
Rüdiger Weis
Andreas Bogk
|
[533] Cinderella: A Prototype For A Specification-Based Network Intrusion Detection System
|
Andreas Krennmair
|
[536] IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2
|
Paul Wouters
Hugh Daniel
John Gilmore
|
[537] Using the GIMP
|
Simon Budig
|
[538] Writing plug-ins for The GIMP
|
Simon Budig
|
[544] PNR - The USG/NSA claim for air flight passenger data
|
Erich Moechel
|
[547] Nazi Ufos and other realities
|
Heinrich Dubel
|
[548] Operation September 11th: Analysing Virtual Reality
|
Mathias Bröckers
Gerhard Wisnewski
|
[550] Opening Event
|
Tim Pritlove
|
[551] Camp Closing Event
|
Tim Pritlove
|
[552] Selinux - the NSAs secure Linux
|
Tom Vogt
Carsten Grohmann
|
[553] OpenCA Project
|
Massimiliano Pala
|
[554] Suing Ashcroft: Anonymity, Right to Travel, Secret Laws
|
John Gilmore
|
[556] Introduction to quantum computing
|
Stephanie Wehner
|
[557] Spam - anatomy of the problem
|
Paul Wouters
|
[558] Presentation of the Bluetooth Tracker Project
|
Steini
|
[559] Navigation Warfare - GPS, Galileo and the limits of trust
|
Frank Rieger
|
[562] Printing On Demand - technology overview
|
Volker Birk
|
[564] Social Engineering Workshop and Practical Training
|
Javier Real
|
[565] Congestion control in IP networks
|
Sebastian
|
[567] LDAP - concepts, applications, practical problems
|
Peter Gietz
|
[568] demoscene - an introduction to the 'electronic art scene'
|
Black Maiden
|
[569] why PKI and digital signatures suck
|
Christian Mock
|
[570] Spam blocking: methods and experiences
|
Christian Mock
|
[571] Winlux & Freedos - Emulators on Unix
|
Rene Schickbauer
|
[572] The Art Of Magic - Technology as viewed from non-hackers
|
Rene Schickbauer
|
[573] NOC review - the network crew explains how the camp network worked
|
Hannes Mehnert
Cryx
|
[574] Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations
|
Eric Blossom
Matt Ettus
|
[575] Open Coding Innovation: A Roadmap to socially - responsible, sustainable economic and technological growth
|
George Dafermos
|
[577] Hacking Biometric Systems
|
Lisa Thalheim
Jan Krissler
|
[578] HeartOfGold'v6
|
Achim Friedland
|
[579] Anonymous Publication Systems
|
Christian Boesgaard
|
[581] Technologies of Political Control - Current state of the art in police technology
|
Olaf Arndt
Janneke Schönenbach
David Artichouk
|
[583] Honey Pots
|
Davide Del Vecchio
Dante Alighieri
|
[586] NetBSD
|
Stefan Schumacher
|
[587] Introduction to STOP1984 and a planned event called "Zuhören statt Abhören"
|
Bettina Jodda
|
[588] Hacking Smart Cards
|
Andreas Jellinghaus
|
[589] Hacker Jeopardy
|
Stefan `Sec` Zehl
|
[590] Biometric Data in Identification Documents
|
Erich Moechel
|
[591] Mapping distributed communities using SVG - Friend of a Friend
|
Liz Turner
|
[592] Cellular Network Security: The New Frontier
|
Ollie Whitehouse
|
[593] Monitoring and Influencing the World Summit on the Information Society
|
Markus Beckedahl
Ralf Bendrath
|
[594] Cisco Vulnerabilities: Yesterday, Today and Tomorrow - Burning Bridges where we can (Phenoelit)
|
FX of Phenoelit
|
[595] Hacking Embedded Systems - from Printers to Mobile Phones (Phenoelit)
|
FtR
|
[596] THC tools - amap and hacker tunnel
|
van Hauser
|
[597] RFID
|
Andreas Bogk
Volker Birk
Frank Rieger
|
[599] Why C and UNIX suck for security, and what alternatives we have
|
Andreas Bogk
|
[600] Strategy Meeting Copyright Law
|
Volker Grassmuck
|
[601] Homegrown WLAN antennas - basic principles and construction
|
Hacko
|
[602] LDAP and Open LDAP - a second opinion
|
Felix von Leitner
|
[603] How to use Single Instruction Multiple Data instructions for code
optimization
|
Felix von Leitner
|
[604] Key Signing Party
|
ths
|
[605] THC Olympic Quiz Game
|
The Hacker´s Choice (THC)
|
[607] Software Patents - Overview on the european and international situation, what we still can do
|
Holger Blasum
Jens Freimann
Andreas Bogk
|
[608] IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1
|
Paul Wouters
Hugh Daniel
John Gilmore
|
[609] Bluetooth Detailed Introduction
|
Stefan Jäger
Karsten Aalders
|
[610] Deploying Wavesec
|
Hugh Daniel
Paul Wouters
|