23C3: Stealth malware - can good guys win?

53:50
23C3: Subverting AJAX

41:57
OHM2013: USE OTR!

52:57
OHM2013: Attitude and Action from KPN Security

21:21
OHM2013: Reverse Engineering of VMFS

49:28
OHM2013: How to rule the Internet (together with everybody else)

23:57
OHM2013: Solar Powered Autonomous Routers

51:39
OHM2013: Real time network forensics using pom-ng

5:17