Name
|
Lecture / Workshop
|
FtR
|
Hacking Embedded Systems - from Printers to Mobile Phones (Phenoelit)
|
The Hacker´s Choice (THC)
|
THC Olympic Quiz Game
|
Karsten Aalders
|
Presentation of the Bluetooth Tracker Project
Bluetooth Detailed Introduction
|
Dante Alighieri
|
Honey Pots
|
Olaf Arndt
|
Technologies of Political Control - Current state of the art in police technology
|
David Artichouk
|
Technologies of Political Control - Current state of the art in police technology
|
Markus Beckedahl
|
Monitoring and Influencing the World Summit on the Information Society
|
Ralf Bendrath
|
Monitoring and Influencing the World Summit on the Information Society
|
Volker Birk
|
Printing On Demand - technology overview
RFID
|
Holger Blasum
|
Software Patents - Overview on the european and international situation, what we still can do
|
Eric Blossom
|
Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations
|
Christian Boesgaard
|
Anonymous Publication Systems
|
Andreas Bogk
|
TCPA - resistance is possible
RFID
Why C and UNIX suck for security, and what alternatives we have
Software Patents - Overview on the european and international situation, what we still can do
|
Mathias Bröckers
|
Operation September 11th: Analysing Virtual Reality
|
Simon Budig
|
Using the GIMP
Writing plug-ins for The GIMP
|
George Dafermos
|
Open Coding Innovation: A Roadmap to socially - responsible, sustainable economic and technological growth
|
Hugh Daniel
|
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1
Deploying Wavesec
|
Davide Del Vecchio
|
Honey Pots
|
Heinrich Dubel
|
Nazi Ufos and other realities
|
Matt Ettus
|
Hacking the RF Spectrum with GNU Radio - software based high performace receiver for todays digital modulations
|
Jens Freimann
|
Software Patents - Overview on the european and international situation, what we still can do
|
Achim Friedland
|
HeartOfGold'v6
|
Peter Gietz
|
LDAP - concepts, applications, practical problems
|
John Gilmore
|
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2
Suing Ashcroft: Anonymity, Right to Travel, Secret Laws
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1
|
Volker Grassmuck
|
Strategy Meeting Copyright Law
|
Carsten Grohmann
|
Selinux - the NSAs secure Linux
|
Andreas Jellinghaus
|
Hacking Smart Cards
|
Bettina Jodda
|
Introduction to STOP1984 and a planned event called "Zuhören statt Abhören"
|
Stefan Jäger
|
Bluetooth Detailed Introduction
|
Andreas Krennmair
|
Cinderella: A Prototype For A Specification-Based Network Intrusion Detection System
|
Jan Krissler
|
Hacking Biometric Systems
|
Hannes Mehnert
|
NOC review - the network crew explains how the camp network worked
|
Christian Mock
|
why PKI and digital signatures suck
Spam blocking: methods and experiences
|
Erich Moechel
|
PNR - The USG/NSA claim for air flight passenger data
Biometric Data in Identification Documents
|
Massimiliano Pala
|
OpenCA Project
|
Black Maiden
|
demoscene - an introduction to the 'electronic art scene'
|
Tim Pritlove
|
Opening Event
Camp Closing Event
|
Javier Real
|
Social Engineering Workshop and Practical Training
|
Frank Rieger
|
Navigation Warfare - GPS, Galileo and the limits of trust
RFID
|
Rene Schickbauer
|
Winlux & Freedos - Emulators on Unix
The Art Of Magic - Technology as viewed from non-hackers
|
Hacko
|
Homegrown WLAN antennas - basic principles and construction
|
ths
|
Key Signing Party
|
Stefan Schumacher
|
NetBSD
|
Janneke Schönenbach
|
Technologies of Political Control - Current state of the art in police technology
|
Steini
|
Presentation of the Bluetooth Tracker Project
|
Lisa Thalheim
|
Hacking Biometric Systems
|
Liz Turner
|
Mapping distributed communities using SVG - Friend of a Friend
|
Tom Vogt
|
Selinux - the NSAs secure Linux
|
Stephanie Wehner
|
Introduction to quantum computing
|
Rüdiger Weis
|
TCPA - resistance is possible
|
Ollie Whitehouse
|
Cellular Network Security: The New Frontier
|
Gerhard Wisnewski
|
Operation September 11th: Analysing Virtual Reality
|
Paul Wouters
|
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 2
Spam - anatomy of the problem
IPsec: Opportunistic Encryption using DNSSEC & Deploying DNSSEC (plus audience participation: hack my DNS ) - Part 1
Deploying Wavesec
|
Cryx
|
NOC review - the network crew explains how the camp network worked
|
Stefan `Sec` Zehl
|
Hacker Jeopardy
|
Sebastian
|
Congestion control in IP networks
|
Michael Zoellner
|
Visualisation of statistics in computer games
|
FX of Phenoelit
|
Cisco Vulnerabilities: Yesterday, Today and Tomorrow - Burning Bridges where we can (Phenoelit)
|
van Hauser
|
THC tools - amap and hacker tunnel
|
Felix von Leitner
|
LDAP and Open LDAP - a second opinion
How to use Single Instruction Multiple Data instructions for code
optimization
|