Lectures and Workshops

Schedule Version: 1.4

Title Speakers
[531]
Visualisation of statistics in computer games

Michael Zoellner

[532]
TCPA - resistance is possible

Rüdiger Weis

Andreas Bogk

[533]
Cinderella: A Prototype For A Specification-Based Network Intrusion Detection System

Andreas Krennmair

[536]
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2

Paul Wouters

Hugh Daniel

John Gilmore

[537]
Using the GIMP

Simon Budig

[538]
Writing plug-ins for The GIMP

Simon Budig

[544]
PNR - The USG/NSA claim for air flight passenger data

Erich Moechel

[547]
Nazi Ufos and other realities

Heinrich Dubel

[548]
Operation September 11th: Analysing Virtual Reality

Mathias Bröckers

Gerhard Wisnewski

[550]
Opening Event

Tim Pritlove

[551]
Camp Closing Event

Tim Pritlove

[552]
Selinux - the NSAs secure Linux

Tom Vogt

Carsten Grohmann

[553]
OpenCA Project

Massimiliano Pala

[554]
Suing Ashcroft: Anonymity, Right to Travel, Secret Laws

John Gilmore

[556]
Introduction to quantum computing

Stephanie Wehner

[557]
Spam - anatomy of the problem

Paul Wouters

[558]
Presentation of the Bluetooth Tracker Project

Steini

[559]
Navigation Warfare - GPS, Galileo and the limits of trust

Frank Rieger

[562]
Printing On Demand - technology overview

Volker Birk

[564]
Social Engineering Workshop and Practical Training

Javier Real

[565]
Congestion control in IP networks

Sebastian

[567]
LDAP - concepts, applications, practical problems

Peter Gietz

[568]
demoscene - an introduction to the 'electronic art scene'

Black Maiden

[569]
why PKI and digital signatures suck

Christian Mock

[570]
Spam blocking: methods and experiences

Christian Mock

[571]
Winlux & Freedos - Emulators on Unix

Rene Schickbauer

[572]
The Art Of Magic - Technology as viewed from non-hackers

Rene Schickbauer

[573]
NOC review - the network crew explains how the camp network worked

Hannes Mehnert

Cryx

[574]
Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations

Eric Blossom

Matt Ettus

[575]
Open Coding Innovation: A Roadmap to socially - responsible, sustainable economic and technological growth

George Dafermos

[577]
Hacking Biometric Systems

Lisa Thalheim

Jan Krissler

[578]
HeartOfGold'v6

Achim Friedland

[579]
Anonymous Publication Systems

Christian Boesgaard

[581]
Technologies of Political Control - Current state of the art in police technology

Olaf Arndt

Janneke Schönenbach

David Artichouk

[583]
Honey Pots

Davide Del Vecchio

Dante Alighieri

[586]
NetBSD

Stefan Schumacher

[587]
Introduction to STOP1984 and a planned event called "Zuhören statt Abhören"

Bettina Jodda

[588]
Hacking Smart Cards

Andreas Jellinghaus

[589]
Hacker Jeopardy

Stefan `Sec` Zehl

[590]
Biometric Data in Identification Documents

Erich Moechel

[591]
Mapping distributed communities using SVG - Friend of a Friend

Liz Turner

[592]
Cellular Network Security: The New Frontier

Ollie Whitehouse

[593]
Monitoring and Influencing the World Summit on the Information Society

Markus Beckedahl

Ralf Bendrath

[594]
Cisco Vulnerabilities: Yesterday, Today and Tomorrow - Burning Bridges where we can (Phenoelit)

FX of Phenoelit

[595]
Hacking Embedded Systems - from Printers to Mobile Phones (Phenoelit)

FtR

[596]
THC tools - amap and hacker tunnel

van Hauser

[597]
RFID

Andreas Bogk

Volker Birk

Frank Rieger

[599]
Why C and UNIX suck for security, and what alternatives we have

Andreas Bogk

[600]
Strategy Meeting Copyright Law

Volker Grassmuck

[601]
Homegrown WLAN antennas - basic principles and construction

Hacko

[602]
LDAP and Open LDAP - a second opinion

Felix von Leitner

[603]
How to use Single Instruction Multiple Data instructions for code optimization

Felix von Leitner

[604]
Key Signing Party

ths

[605]
THC Olympic Quiz Game

The Hacker´s Choice (THC)

[607]
Software Patents - Overview on the european and international situation, what we still can do

Holger Blasum

Jens Freimann

Andreas Bogk

[608]
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1

Paul Wouters

Hugh Daniel

John Gilmore

[609]
Bluetooth Detailed Introduction

Stefan Jäger

Karsten Aalders

[610]
Deploying Wavesec

Hugh Daniel

Paul Wouters

Archived page - Impressum/Datenschutz