Speakers

Schedule Version: 1.4

Name Lecture / Workshop
FtR

Hacking Embedded Systems - from Printers to Mobile Phones (Phenoelit)

The Hacker´s Choice (THC)

THC Olympic Quiz Game

Karsten Aalders

Presentation of the Bluetooth Tracker Project

Bluetooth Detailed Introduction

Dante Alighieri

Honey Pots

Olaf Arndt

Technologies of Political Control - Current state of the art in police technology

David Artichouk

Technologies of Political Control - Current state of the art in police technology

Markus Beckedahl

Monitoring and Influencing the World Summit on the Information Society

Ralf Bendrath

Monitoring and Influencing the World Summit on the Information Society

Volker Birk

Printing On Demand - technology overview

RFID

Holger Blasum

Software Patents - Overview on the european and international situation, what we still can do

Eric Blossom

Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations

Christian Boesgaard

Anonymous Publication Systems

Andreas Bogk

TCPA - resistance is possible

RFID

Why C and UNIX suck for security, and what alternatives we have

Software Patents - Overview on the european and international situation, what we still can do

Mathias Bröckers

Operation September 11th: Analysing Virtual Reality

Simon Budig

Using the GIMP

Writing plug-ins for The GIMP

George Dafermos

Open Coding Innovation: A Roadmap to socially - responsible, sustainable economic and technological growth

Hugh Daniel

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1

Deploying Wavesec

Davide Del Vecchio

Honey Pots

Heinrich Dubel

Nazi Ufos and other realities

Matt Ettus

Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations

Jens Freimann

Software Patents - Overview on the european and international situation, what we still can do

Achim Friedland

HeartOfGold'v6

Peter Gietz

LDAP - concepts, applications, practical problems

John Gilmore

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2

Suing Ashcroft: Anonymity, Right to Travel, Secret Laws

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1

Volker Grassmuck

Strategy Meeting Copyright Law

Carsten Grohmann

Selinux - the NSAs secure Linux

Andreas Jellinghaus

Hacking Smart Cards

Bettina Jodda

Introduction to STOP1984 and a planned event called "Zuhören statt Abhören"

Stefan Jäger

Bluetooth Detailed Introduction

Andreas Krennmair

Cinderella: A Prototype For A Specification-Based Network Intrusion Detection System

Jan Krissler

Hacking Biometric Systems

Hannes Mehnert

NOC review - the network crew explains how the camp network worked

Christian Mock

why PKI and digital signatures suck

Spam blocking: methods and experiences

Erich Moechel

PNR - The USG/NSA claim for air flight passenger data

Biometric Data in Identification Documents

Massimiliano Pala

OpenCA Project

Black Maiden

demoscene - an introduction to the 'electronic art scene'

Tim Pritlove

Opening Event

Camp Closing Event

Javier Real

Social Engineering Workshop and Practical Training

Frank Rieger

Navigation Warfare - GPS, Galileo and the limits of trust

RFID

Rene Schickbauer

Winlux & Freedos - Emulators on Unix

The Art Of Magic - Technology as viewed from non-hackers

Hacko

Homegrown WLAN antennas - basic principles and construction

ths

Key Signing Party

Stefan Schumacher

NetBSD

Janneke Schönenbach

Technologies of Political Control - Current state of the art in police technology

Steini

Presentation of the Bluetooth Tracker Project

Lisa Thalheim

Hacking Biometric Systems

Liz Turner

Mapping distributed communities using SVG - Friend of a Friend

Tom Vogt

Selinux - the NSAs secure Linux

Stephanie Wehner

Introduction to quantum computing

Rüdiger Weis

TCPA - resistance is possible

Ollie Whitehouse

Cellular Network Security: The New Frontier

Gerhard Wisnewski

Operation September 11th: Analysing Virtual Reality

Paul Wouters

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2

Spam - anatomy of the problem

IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1

Deploying Wavesec

Cryx

NOC review - the network crew explains how the camp network worked

Stefan `Sec` Zehl

Hacker Jeopardy

Sebastian

Congestion control in IP networks

Michael Zoellner

Visualisation of statistics in computer games

FX of Phenoelit

Cisco Vulnerabilities: Yesterday, Today and Tomorrow - Burning Bridges where we can (Phenoelit)

van Hauser

THC tools - amap and hacker tunnel

Felix von Leitner

LDAP and Open LDAP - a second opinion

How to use Single Instruction Multiple Data instructions for code optimization

Archived page - Impressum/Datenschutz