Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
47,904 results
david kriesel
36c3
37c3
Ein Demotivationsworkshop zur politischen Lage. Nico Semsrott hat in Zeiten des globalen Rechtsrucks den überflüssigsten Job ...
2,138,413 views
5 years ago
OpSec für Datenreisende Schon Wladimir Wladimirowitsch Putin wusste: "Hacker, das sind freie Menschen, so wie Künstler.
1,156,240 views
https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/10038.html.
46,834 views
HF-Störquellen im Uplink Der Vortrag beleuchtet die Einflüsse auf den geheimnisvollen Teil des Mobilfunks – Störquellen im ...
392,249 views
Welche Daten speichert Amazon über uns? Jeder Nutzer hat das Recht bei seinen Dienstanbietern eine Kopie seiner Daten ...
132,563 views
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen Entwicklungen haben sich ergeben? Welche neuen ...
171,412 views
Praktische Hinweise für den Kontakt mit der Staatsmacht Es ist 6 Uhr und ein Trupp uniformierter Polizisten steht vor deiner ...
310,321 views
Hacking your network likes it's 1980 again We all know what FAX is, and for some strange reason most of us need to use it from ...
25,410 views
Wie der Weg ins digitale Zuhause zum Spaziergang wird GERMAN: Mehr als 10.000 unterschiedliche Device-Hersteller aus aller ...
196,011 views
Verantwortung und Ethik beim schöpferisch-kritischen Umgang mit Technologie Die Hackerethik ist die Grundlage für den ...
69,094 views
Up and to the right: All the statistics about this event you could wish for 35C3 is run by teams of volunteers. In this event, they will ...
5,227 views
Explaining in detail just how those little COM files infected and played with us back in the day It is now 27 years since MS-DOS 5.0 ...
10,909 views
A long way to a vibrant future With great pleasure comes great responsibility. A responsibility, which is not taken enough into ...
20,968 views
A demystification of the exploit development lifecycle There's a certain allure to zero-day exploits. At the apex of the security ...
36,049 views
The world is finally catching on to the urgency of deploying post-quantum cryptography: cryptography designed to survive attacks ...
8,082 views
Enabling students over example-driven teaching Teaching beginners how to program is often hard. We love building programs, ...
5,153 views
An explanation of Inter-Net and everyday protocols This Foundations talk explains the systems and protocols that make up the ...
4,266 views
Hacking the most secure handheld console Since its release in 2012, the PlayStation Vita has remained one of the most secure ...
17,307 views
An Artificial Intelligence Perspective on the Soul Artificial Intelligence gives us a uniquely fascinating and clear perspective at the ...
74,250 views
How I Learned to Stop Worrying and Love the Backdoor Meet SiliVaccine – North Korea's national Anti-Virus solution. SiliVaccine ...
9,323 views