2005-12-27 · 2005-12-28 · 2005-12-29 · 2005-12-30 · official schedule
Saal 1 |
Saal 2 |
Saal 3 |
Saal 4 |
|
---|---|---|---|---|
11:00 |
Private Investigations - Opening Show and Keynote SpeechBy Tim Pritlove, Joi Ito URL: 390.html |
|||
12:00 |
Die BioP-II-Studie des BSI - Biometrische Feldtests in EuropaBy starbug, Constanze Kurz Die BioP-II-Studie sollte eigentlich als Entscheidungshilfe für den Gesetzgeber die Einsatztauglichkeit der biometrischen Merkmale von Finger, Gesicht und Iris in Reisedokumenten testen. Leider wurde ihr Erscheinen um mehrere Monate verzögert und die entsprechenden Gesetze in der Zwischenzeit verabschiedet. Resigniert stellen die Macher der Studie fest, daß sie von der politischen Entscheidung überholt und vor vollendete Tatsachen gestellt wurden. Man hätte lieber auf die Ergebisse warten sollen. URL: 1094.html |
Hacking health - Electronic Patient Records in The NetherlandsBy Karin Spaink I have been researching the implementation of electronic patient records (EPR) in NL. The first part of EPRs - a national database of medication that each patient is described - will become mandatory in early 2006. URL: 489.html |
Understanding buffer overflow exploitation - The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshellBy Christiane Ruetten Everything started with Aleph One's paper "Smashing the Stack for Fun and Profit". These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb and how these few tools can be used to understand and write shell-code to turn simple buffer overflows into backdoors that open whole systems to potential attackers. Sure you want to know how to defend against that. We also will tell you about that! URL: 571.html |
Cybercrime Convention - Hacking on its way to become a criminal act?By Marco Gercke Within the topic of international regulation attempts in the field of Cybercrime (CoE Convention on Cybercrime & EU Council Framework Decision on Attacks against Information Systems) a number of Member States is planning to implement "hacking"-provisions in their national criminal law. This development could lead to a criminal sanctions not only for hacking acts committed with criminal intent but also for testing network security. URL: 405.html |
13:00 |
Elektronische Gesundheitskarte und Gesundheitstelematik - 1984 reloaded? - Eine unendliche Geschichte - Kapitel: Die Sümpfe der TraurigkeitBy ThoMaus Wenige Tage noch, dann bricht die schöne, neue Welt der elektronischen Gesundheitskarte an.Alles wird besser -- bloß für wen? Damit will sich dieser Vortrag befassen, und insbesondere mit den Konsequenzen für diejenigen, für die es nicht besser wird. URL: 546.html |
Hopalong Casualty - On automated video analysis of human behaviourBy Ingo Lütkebohle Automated analysis of surveillance videos has seen a lot of research in recent years. Face recognition and person tracking are widely available, more sophisticated behaviour analysis is coming. The aim of the current talk is an overview into the methods used for analysis, their current performance and limitations. URL: 531.html |
Finding and Preventing Buffer Overflows - An overview of static and dynamic approachesBy Martin Johns A talk that will present academic tools, which are designed to find or disarm security problems in C code URL: 556.html |
W3C on Mobile, CSS, Multimodal and more - A look at the upcoming standards by W3CBy Bert Bos W3C is developing several new Web technologies and modules for existing technologies, many of which have to do with the requirements of new, mobile devices. This talk will look at a few of them. URL: 933.html |
14:00 |
Hacking CCTV - Watching the watchers, having fun with cctv cameras, making yourself invisibleBy Martin Slunksy, Adrian Dabrowski CCTV möchte für mehr öffentliche Sicherheit sorgen, bringt aber viel mehr Unsicherheit - sehen wir, was Überwacher sehen, in dem wir uns kurz mit Funkfrequenzen und mit Empfaengern - bzw was sich noch alles dafuer verwenden laesst - befassen. Welche sowieso schon erhältlichen Antennen (zB Wlan) eignen sich dafür? Welche Kameratypen gibt es, und was sind ihre Schwächen? URL: 605.html |
The grey commons - Strategic considerations in the copyfight.By Rasmus Fleischer, Palle Torsson Piratbyran.org in Sweden has since 2003 URL: 1101.html |
Message generation at the info layer - Basic introduction in coding on unvirtual realities.By Ulrich Langer What have talking to your lover and information warfare in common? After building a simple model on human communication and some introductions we begin to play with message construction learning about how to program the matrix. URL: 1102.html |
|
16:00 |
Hacking Data Retention - How bureaucrats fail to fight terrorBy Brenno de Winter Data retention is presented as a solution for fighting child pornography and terror, but in reality the measures will fail. Circumventing is easy and mistakes are waiting to happen. This presentation shows the hard evidence to hack data rentention. URL: 466.html |
Videoüberwachung an deutschen Hochschulen - oder: "Über meine Maßnahmen gebe ich keine Auskunft"By Axel Rüweler Nach den BigBrotherAwards 2004, bei denen die Universität Paderborn einen Preis für ihre Videoüberwachung abgeräumt hat, liefen einige tolle Aktionen an der Universität. Davon motiviert hat der FoeBuD e.V. zusammen mit dem fzs (freier zusammenschluss studentInnenschaften) ein Projekt ins Leben gerufen, bei dem untersucht werden sollte, wie weit Videoüberwachung an deutschen Hochschulen verbreitet ist. URL: 511.html |
Peer-to-peer under the hood - An in-depth look at p2p algorithmicsBy David Göthberg About p2p-algorithms for fully distributed, totally serverless, fully scalable peer-to-peer systems. Not about specific p2p-softwares. This will only be a very brief overview of p2p-algorithms. URL: 461.html |
Lightning Talks Day 1 - Nine five minutes talks by various speakersBy mc.fly There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin. URL: 911.html |
17:00 |
Die Technik im neuen ePassBy starbug Der Vortrag wird sich mit der Technik des neuen ePasses beschäftigen. URL: 550.html |
Der Hammer: x86-64 und das um-schiffen des NX BitsBy Sebastian Krahmer Die X86-64 Architektur bietet neben den bisher bei x86 verfügbaren Page-protection-bits ein neues Bit, welches es erlaubt Seiten als nicht ausführbar zu markieren. Dies soll dazu dienen die weithin bekannten Buffer-overflow-exploits zu verhindern oder zu erschweren. Wie sich das trotzdem anstellen lässt zeigt dieser Vortrag. URL: 802.html |
Media System Deployment using PythonBy Ulrich von Zadow Using Python, a large variety of media-oriented systems can be scripted with very little effort. The talk will explore the available libraries for 2d and 3d graphics, video and sound and describe real-world experiences in deploying these systems. URL: 508.html |
Bad TRIPs - What the WTO Treaty did in Hongkong and what that means for usBy Oliver Moldenhauer, Julian 'hds' Finn The TRIPS Treaty is one of the most discussed within the WTO. Its impact on knowledge and so-called intellectual property rights is huge, not only for developing countries. This talk will give the listener a short introduction on the main principles of TRIPS, who stands behind it and what chances a different treaty could bring. As the WTO meeting in Hong Kong is just two weeks in advance of the 22c3, there will be much news on the progress of the treaty. With Oliver Moldenhauer being an NGO representative at the WTO conference we'll have first-hand experience on the debates amongst NGOs and press in Hong Kong. URL: 781.html |
18:00 |
CCC Jahresrückblick - Ein Überblick über die Aktivitäten des Clubs 2005By Andy Müller-Maguhn, starbug, Lars Weiler Die Sprecher des CCC stellen die Aktivitäten des und Geschehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter fallen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als auch Vorträge und Konferenzen, an denen CCC-Vertreter teilgenommen haben. URL: 483.html |
Syscall proxying fun and applications - Introduction to syscall proxying and applications for in the wild exploitationsBy csk This talk is about how using syscall proxying technique for envolved attacks or other distributed applications. It includes source code examples like shellcodes, tools and a poc rootkit using this technique. This talk will be submited first at 0sec, a private security event we organize in switzerland in october. URL: 553.html |
Writing better code (in Dylan) - Fast development of object-oriented functional programsBy Hannes Mehnert, Andreas Bogk An overview of the highly dynamic, object-oriented, functional programming language Dylan will be given. As an example a web-based network management tool will be demonstrated. URL: 800.html |
Data Retention - what comes next?By Marco Gercke Chances and Risks of Data Retention Legislation are currently discussed in an intensive way without talking a closer look what could be the next legislative steps to increase the investigation authorities possibilities. It is well known, that offenders as well as normal users acting in networks can easily circumvents the "risks" caused by the complete storage of traffic data by using public access points and encryption technology. URL: 504.html |
19:00 |
We lost the war - Welcome to the world of tomorrowBy Rop Gonggrijp, Frank Rieger Come to terms with the imminent loss of privacy and civil rights without going lethargic. We will analyse current events, how we think they will affect the issues we care about and how we can be most effective given the new circumstances. Or possibly how to simply survive the times ahead. URL: 920.html |
Developing Intelligent Search EnginesBy Isabel Drost The presentation will give a short overview of the architecture of search engines and how machine learning can help improving search engines. In addition some projects you can take part in will be briefly introduced. URL: 415.html |
RFID - overview of protocols, librfid implementation and passive sniffing - ISO14443, ISO15693, their GPL librfid implementation and passive sniffing hardwareBy Milosch Meriac, Harald Welte The presentation will cover an introduction into the two popular RFID Standards, ISO14443 and ISO15693, as well as the author's Free Software implementation "librfid" URL: 769.html |
Recent Developments in EU Data Retention proposals - Commission vs. Council - the lesser of two evils?By Klaus Landefeld Presentation and Discussion of the EU proposals for mandatory data retention, proposed individualy by the EU council and the EU comission. URL: 568.html |
21:00 |
On working memory and mental imagery - How does the brain learn to think?By Victor Eliashberg A representation of an untrained human brain, call it B(0), is encoded in the human genome -- its size can hardly exceed a few megabytes. In contrast, a representation of a trained brain, B(t), after big enough time t (say t=20years) must be very long (terabytes?) – it must include a representation of the brain's individual experience. How can a "simple" B(0) change into an extremely complex B(t) in the course of learning? URL: 464.html |
Applied Machine Learning - Brief Introduction into Machine Learning followed by application examples.By Konrad Rieck, Sören Sonnenburg, Timon Schroeter Overview of the current state of research in Machine Learning including the general motivation, setup of learning problems, state-of-the-art learning algorithms and applications like our brain computer interface. URL: 544.html |
Exploring Protocols and Services on Internet Connected Embedded Devices - Looking for InsecuritiesBy Sarbjit Sembhi Embedded devices are set to take centre stage in the coming internet connected revolution where anything and everything will be connected to the internet. But are the Devices, Operating Systems, Protocols and Services mature enough for what the future holds for them? This session looks at the requirements of an internet connected embedded device and the necessary protocols and services required and available, then, it goes into some implications of the currently known vulnerabilities. URL: 602.html |
A guided tour to European IT lobbying - An investigation into intransparencyBy André Rebentisch Information overflow is a general problem of today's open information infrastructures. Everything can be found on the web but unfortunately not by everyone. Getting informed about the European Union and its projects is a task which you cannot leave to the Commission's public relations department. You should better start your own investigation. URL: 591.html |
22:00 |
VoIPhreaking - How to make free phone calls and influence peopleBy Hendrik Scholz The recent explosion in internet telephony has led to the exposure of the (previously) closed Public Service Telephone Network (PSTN) to the wilds of the internet. Voice over IP (VoIP) technology, particularly when coupled with the PSTN, presents new and interesting security challenges, many of which are completely ignored until after deployment. These security issues, such as new avenues for fraud, present serious risks to tradition telephony companies. URL: 565.html |
Covert channels in TCP/IP: attack and defence - The creation and detection of TCP/IP steganography for covert channels and device fingerprintingBy Steven J. Murdoch This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can even be extended to remotely identify the physical machine being used. URL: 798.html |
Rückschau auf die BigBrotherAwards 2005 - Datenkraken beim Kragen packenBy Thomas Bader, Rena Tangens, padeluun "The winner is ..." zumindest "unhappy". Wer einen BigBrotherAward erhält, hat es damit schriftlich bekommen, dass sein Verhalten "evil" ist. In vielen Ländern werden BigBrotherAwards, Datenschutznegativpreise für "Datenkraken", vergeben. Vertreterinnen und Vertreter aus Schweiz und Deutschland präsentieren die Ergebnisse, Hintergründe und Erfolge des Jahres 2005. Im Schnelldurchgang und mit Filmbeiträgen werden Preisträger, Trends und Tendenzen präsentiert. URL: 791.html |
Magnetic Stripe TechnologyBy Joseph Battaglia Find out how magnetic stripe technology works, how it can be hacked, how to build a card reader with parts you can find in your 'junk drawer', and how this reader design can be used to reverse engineer proprietary formats. URL: 765.html |
23:00 |
Hacking into TomTom Go - Reverse-Engineering des Embedded-Linux-Navigationssystems "TomTom Go"By Thomas Kleffel, Christian Daniel TomTom hat mit dem Go ein schickes und flexibles Embedded-Linux-System auf den Markt gebracht, das nur danach schreit, auch für andere Zwecke verwendet zu werden. Leider sind System-Images signiert - und hier soll gezeigt werden, wie diese Signatur geknackt wurde. URL: 603.html |
Hacking OpenWRTBy Felix Fietkau OpenWrt is a Linux distribution for embedded Wireless LAN routers. In this lecture I'm going to introduce OpenWrt and show you how you can use and customize it for your own projects. URL: 1099.html |
Digitale Bürgerrechte unter europäischem BeschussBy Markus Beckedahl, Oliver Passek Die digitale Wissensgesellschaft wird in wesentlichen Punkten von der Europäischen Union bestimmt und häufig haben Richtlinien und andere Maßnahmen der EU direkte Auswirkungen auf unsere digitalen Bürgerrechte. URL: 888.html |
Erste Hilfe für Nerds und Geeks - Wie überlebe ich (ohne nennenswerten Schäden) einen Congress?By SaniFox aka Sven Vößing Wie überlebe ich einen vier Tage langen Chaos Communication Congress ohne nennenswerte Schäden davonzutragen? Dieser Vortrag ist speziell für Nerds und Geeks geeignet. URL: 558.html |
Saal 1 |
Saal 2 |
Saal 3 |
Saal 4 |
|
---|---|---|---|---|
00:00 |
Biometrics in Science FictionBy Constanze Kurz, Roland Kubica Gezeigt und kommentiert werden Ausschnitte und Szenen biometrischer Techniken aus Film und Fernsehen. URL: 882.html |
|||
12:00 |
Software Patenting - Adequate means of protection for software.By Tonnere Lombard, André Rebentisch Patent attorneys and a few large corporations advocate patent law as an appropriate protection tool for software development. Most economists, software professionals and SMEs disagree. They believe patent law does not serve market needs. This year the European Parliament rejected a 'Directive on the patentability of computer-implemented inventions'. However, as the European Patent Offices continues to grant them problems remain. Our expert panel with discuss further developments. URL: 593.html |
Collateral Damage - Consequences of Spam and Virus Filtering for the E-Mail SystemBy Peter Eisentraut This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. URL: 505.html |
VoIP 2005 - Regulierte Revolution - Ansätze für die Regulierung von VoIP und NGN im vergangenen JahrBy Jörg Müller-Kindt Der Vortrag gibt einen Überblick über die Aktivitäten der amerikanischen undeuropäischen Regulierungsbehörden - insbesondere der Bundesnetzagentur (vormals RegTP) im Bereich Voice over IP (VoIP) und Next Generation Networks (NGN). URL: 577.html |
A way to fuzzy democracy - How modern communication can be used to transform the way we think about democracy and make our political decisions.By Svenja Schröder, Christiane Ruetten As we can see by the German voting results in 2005, there is a huge disenchantment with politics in modern democracies. The voting people feel powerless in a governance where the power should originally belong to the people. "Democracy" only tends to be the best compromise among other types of government, but it could be different.Those modern means of communication most of us already use on a daily basis, like internet forums, webs of trust and possibly e-voting systems, can be used as a basis for political discussion and decision making as long as we are aware of their benefits as well as theirlimitations. This talk puts our traditional believes about democracy into question by closely looking at its roots in history. A careful deconstruction of that monolithic term will instantly lead to a very different perspective on the ideals behind it. It then becomes very easy to see how much closer modern technology might take us to the originalidea of democracy.To sum it up: There are much better strategies of mobilizing and informing people than consuming TV ads and then voting the lesser evil every 4 years. URL: 572.html |
13:00 |
InformationsfreiheitsgesetzBy Jörg Tauss In diesem Vortrag geht es um das Informationsfreiheitsgesetz des Bundes, dass am ab 1.1.2006 in Kraft tritt. URL: 1084.html |
3G Investigations - Scanning your GPRS/UMTS IP network for fun and profitBy Daniel 'btk' Kirstenpfad, Achim 'ahzf' Friedland We are giving an overview of ip networks used for >=2.5G technologies. Our main focus is on scanning the overlaying ip network, on different Voice-over-IP filter implementations and the possibilities to circumvent them. URL: 567.html |
Seaside: Agile Web Application Development with SqueakBy Marcus Denker Seaside represents a new generation of web frameworks: It makes web development simple and fun. Using advanced features of Squeak, Seaside is able to provide easy to use abstractions for true agile development. URL: 599.html |
5 Theses on Informational-Cognitive CapitalismBy George N. Dafermos Discussion premised on the intersections of information feudalism, free software and open sources, piracy, cracking, volunteer and unwaged labour, class reconfigurations, and tainted myth. URL: 1083.html |
14:00 |
Das Geheimnis - ReloadedBy Peter Glaser Seit jeher war es das Gegenteil von Information, ihr dunkler Bruder: das Geheimnis. Jetzt ist es wieder mit aller Macht im Kommen. Peter Glaser über den Weg in die Geheimnisgesellschaft. URL: 864.html |
Military intelligence for terrorists(tm) - A lamer's introduction to retrieving "sensitive" intelligence informationBy Andreas Krennmair Since 9/11, the US government is especially picky about which information is to be published. This lecture shows how you can still get some very interesting and "sensitive" geographical information. URL: 513.html |
AJAX Based Web ApplicationsBy mesch Isn't ironic that web applications are now as nice to use as GUI applications were before the web was invented? Well, almost as nice. We review state of the technologies that make this possible, and discuss the ramifications for the architecture of web applications. URL: 418.html |
Hashing Trusted Computing - Der aktuelle StandBy Rüdiger Weis Wir präsentieren ein generisches Angriffs-Framework und zeige exemplarisch neue pratische Angriffe auf digitale Signaturen, die Zertifikats-Infrastruktur und die Bootkontrollsequenzen basierend auf neuen Resultaten zur Hashfunktion SHA-1. Diese Ergebnisse komprimtieren grundlegend die Sicherheit der TCG Architektur. URL: 495.html |
16:00 |
Black Ops Of TCP/IP 2005.5 - New Explorations: Large Graphs, Larger ThreatsBy Dan Kaminsky I will discuss new experiences and potential directions involving scanning massive networks, such as the entire world's DNS infrastructure. URL: 1108.html |
Was ist technisches Wissen? - Philosophische Grundlagen technischer WissenschaftenBy Sandro Gaycken Unter dem steigenden Interesse der Technikphilosophen und der Diversifizierung der philosophischen Wissenschaftstheorie erscheinen erste Untersuchungen über technisches Wissen. Der Vortrag zeigt an, auf welchen Pfaden und mit welchen Fragen die Wissenschaftsphilosophie an die Technik derzeit heran tritt. Davon ausgehend soll auch das gegenwärtige philosophische Bild vom technischen Wissen gezeigt werden. URL: 516.html |
Robots for fun and researchBy Verena In this talk, several examples of cutting-edge research in robotics will be presented, and their implications for the future of robotics will be discussed. URL: 588.html |
Lightning Talks Day 2 - Nine five minutes talks by various speakersBy Florian Holzhauer There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin. URL: 912.html |
17:00 |
Personal experiences bringing technology and new media to disaster areas - Experiences from Iraq and post Katrina New OrleansBy Jacob Appelbaum A discussion about technology, culture, the Creative Commons and the media with regards to disaster areas and warzones. URL: 478.html |
Lawful Interception in VoIP networks - Old Laws and New Technology the German WayBy Hendrik Scholz Lawful Interception (aka voice and signalling sniffing) equipment has been deployed and is in use for both traditional PSTN networks and internet connections. With the advent of Voice over IP applications the governments step-by-step adopted laws to extend PSTN interception to VoIP. The talk gives an introduction to the applying laws, rules of conduct and the basic PSTN setup. URL: 468.html |
PyPy - the new Python implementation on the block - Language/VM R&D, whole program type inference, translation to low level backends, funBy Holger Krekel, Carl Friedrich Bolz, Armin Rigo We present our first self-contained Python virtual machine that uses parts of itself to translate itself to low level languages ("the Muenchhausen approach"). The PyPy approach could solve problems at language/interpreter-level that formerly required complex frameworkish solutions at user-level. URL: 586.html |
Sony BMGs digitaler Hausfriedensbruch - Über die Durchsetzung industrieller Interessen um jeden PreisBy Markus Beckedahl, fukami "Ich glaube, die meisten Menschen wissen gar nicht was ein Rootkit ist, warum sollen sie sich also darum kümmern?" - Thomas Hesse, Präsident Global Digital Business-Abteilung bei Sony BMG URL: 1132.html |
18:00 |
Search Engines - Oracles of the Information Society - The Saga continues: Search Engines, Technology, Politics, Prostitution, Corruption, Privacy and Espionage.By Wolfgang Sander-Beuermann, Hendrik Speck, Frédéric Philipp Thiele The session will focus on the influence of search engines on individuals, societies, education and politics. URL: 1104.html |
Vulnerability markets - What is the economic value of a zero-day exploit?By Rainer Böhme What is the market value of a zero-day exploit? URL: 801.html |
Privaterra - Report from the field - IT Security and Human Rights organizations - The needs, the challenges & recommendationsBy Robert Guerra An overview of the work being done by Privaterra and other organizations to help identify and mitigate security vulnerabilities faced by Human Rights Organizations. URL: 473.html |
Anonymous Data Broadcasting by Misuse of Satellite ISPs - An open-source project to develop a tool for broadband satellite broadcastsBy Sven Löschner The lecture focuses on satellite ISP technology and how to misuse it for anonymously broadcasting to an unlimited number of anonymous users while only one user pays for a standard dial-up connection of a satellite ISP. URL: 589.html |
19:00 |
Old Skewl Hacking - InfraRed updated - MMIrDA - Major Malfunction's InfraRed Discovery ApplicationBy Major Malfunction An updated look at InfraRed hacking, and the state of the art in owning hotel TV systems. URL: 535.html |
Podcasting Explained - The Realtime PodcastBy Tim Pritlove This lecture is more of a live podcast recording session than a traditional talk. So you will be more of an audience in a radio studio while Tim is producing the podcast. In the podcast which is produced in realtime, Tim will lay out the various aspects of podcasting including history, background technology and future directions. URL: 1147.html |
Anonymität im Internet - Rechtliche und technische AspekteBy Julius Mittenzwei, Andreas Lehner, Peter Franck Der Vortrag bietet einen Überblick über die verfügbaren Systeme und Implementierungen, ihre Entwicklungsgeschichte und die technischen Grundlagen. Darüber hinaus schildert er die rechtlichen Rahmenbedingungen und Gesetzgebungsbestrebungen. Es folgt ein kurzer Abriss der Erfahrungen als Betreiber eines Node. URL: 785.html |
Alter Wein in einer neuen Flasche: Rootkits unter dem 2.6 Kernel - Kernel Module unter dem 2.6er Kernel für gut und böse?By newroot, k-mode Bisher war weder möglich rootkits noch Abwehrmassnahmen unter dem 2.6er Kernel zu schreiben, durch unsere Technik ist es nun möglich die System-Calls direkt zu modifizieren. Somit geben wir euch die Technik in die Hand Rootkits zu erstellen, als auch Abwerhmethoden zu implementieren. In unserem Vortrag, erklären wir wie ein Rootkit generel funktioniert und wie man mit Hilfe der antisec-technik Rootkits unter dem 2.6er Kernel erstellen kann. Das ganze wird durch eine live Demo abgerundet. URL: 1129.html |
21:00 |
Technological art off the trodden tracks - Artists (mis)using technologyBy Régine Débatty, Jussi Ängeslevä A review of today's technological art scene, with examples and discussion of their impact on our technology-driven society. URL: 1085.html |
muXTCP - Writing your own flexible Userland TCP/IP Stack - Ninja Style!!!By Paul Böhm This talk will discuss design approaches for writing flexible userland tcp/ip stacks for network hacking tools. URL: 529.html |
Digital Identity and the Ghost in the Machine - "Once I Was Lost But Now I've Been Found"By Max Kilger The demarcation line that used to separate your digital identity from your real world physical identity is rapidly disappearing. More seriously, it is permanently changing the way in which the world sees you and you see yourself. URL: 549.html |
The Cell Processor - Computing of Tomorrow or YesterdayBy Torsten Hoefler The x86 architecture has been the de facto standard for many years. Attempts to take the turn, like Intel tried with the VLIW Itanium Architetcture were desastrous. But the x86 architecture is not able to fulfil the demands of today's market. Several additions have been proposed (MMX,3dNow,SSE1-3), but the Cell approach takes them to the next level. URL: 519.html |
22:00 |
Corp vs. Corp - Profiling Modern EspionageBy Roberto Preatoni, Fabio Ghioni An impressionistic overview of what makes the difference today and in the future (in the digital playground) in the balance of power between economic and military powers. The presentation will also cover a description of the business behind espionage worldwide as well as the asymmetric organizations that are the real master of puppets. URL: 423.html |
Learning cryptography through handcyphers - Shaping a digital future with ancient wisdomBy Brenno de Winter For many people cryptography is something that they consider too complicated. But actually one can understand the principles very well if they only try. By looking at old handcyphers used for coding one can begin to understand modern cryptography. URL: 469.html |
Autodafé: An Act of Software Torture - Presentation of an innovative buffer overflow uncovering technique called "Fuzzing by weighting attacks with markers"By Martin Vuagnoux Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection – i.e. insertion of random data into input files, buffers or protocol packets, combined with a systematic monitoring of memory violations. Even if these tools allow to uncover a lot of vulnerabilities, they are still very primitive; despite their poor efficiency, they are useful because of the very high density of such vulnerabilities in modern software. URL: 606.html |
Lyrical I - Abschluss des CCC-Poesie-WettbewerbsBy Martin Haase, Jens Ohlig, Henriette Fiebig Auf der Abschlußveranstaltung des CCC-Poesie-Wettbewerbs "Lyrical I" werden die schönsten und originellsten Beiträge vorgestellt. URL: 532.html |
23:00 |
Literarisches Code-Quartett - The good, the bad, and the uglyBy Lisa Thalheim, Felix von Leitner, Andreas Bogk, FX of Phenoelit Die Parallelen bei Software und Büchern gehen von dem kreativen Schaffensprozeß über Konsumverhalten, Entlohnung bis zu Fragen wie Lizenzen und Verwertungsmodelle. Wir werden das dieses Jahr noch etwas weiter treiben, indem wir analog zur bekannten Fernsehsendung besonders prägnante Codestücke auf der Bühne mit Publikum kritisieren werden. URL: 598.html |
Geometrie ohne Punkte, Geraden & Ebenen - Buckminster Fullers Theorie und Praxis einer Wissenschaft zum SelberbauenBy Oona Leganovic Über die Prinzipien hinter den geodätischen Domen, einige weitere Erfindungen und die wissenschaftliche Rezeption Fullers. Das Verhältnis von Fuller zur modernen Naturwissenschaft. URL: 520.html |
Community mesh networking - Ubiquitous wireless mesh clouds with olsrd from olsr.orgBy Elektra Wagenrad Olsr.org's improved algorithm (compared to the initial INRIA OLSR draft) and how it may influence the development of ubiquitous free wireless networks. URL: 1103.html |
Capture The FlagBy Lexi Pimendis, mc.fly CTF von 23.00 bis 7.00 URL: 916.html |
Saal 1 |
Saal 2 |
Saal 3 |
Saal 4 |
|
---|---|---|---|---|
00:00 |
Have you hugged your Mac today? - Ein audiovisuelles Live-FeatureBy Jochen Koubek, Ina Kwasniewski, Kai Kittler, Marcus Richter, Jens-Martin Loebel, Constanze Kurz Live-Performance der Hörspielwerkstatt der Humboldt-Universität Berlin in deutscher und englischer Sprache über Apple, Steve Jobs und Steve Wozniak. URL: 867.html |
|||
11:00 |
Transparenz der Verantwortung in BehördenBy Philipp Sonntag Wir brauchen eine neue, gesellschaftlich breit überzeugende Lösung für das Problem mit dem Datenschutz. So wie es jetzt läuft geht die Aushöhlung der Persönlichkeitsrechte durch schrittweise Einschränkung des Datenschutzes immer weiter. Statt dem gläsernen Bürger brauchen wir die gläserne Verwaltung. URL: 521.html |
COMPLETE Hard Disk Encryption with FreeBSD - Learn how to effectively protect not only your data but also your applicationsBy Marc Schiesser Most technologies and techniques intended for securing digital data focus on protection while the machine is turned on – mostly by defending against remote attacks. An attacker with physical access to the machine, however, can easily circumvent these defenses by reading out the contents of the storage medium on a different, fully accessible system or even compromise program code on it in order to leak encrypted information. Especially for mobile users, that threat is real. And for those carrying around sensitive data, the risk is most likely high.This talk will introduce a method of mitigating that particular risk by protecting not only the data through encryption, but also the applications and the operating system from being compromised while the machine is turned off. URL: 1139.html |
||
12:00 |
Data Mining für den WeltfriedenBy Jule Riede-Buechele Wir drehen den Spiess um: Wie die Quintessenz die NSA analysiert hat. Warum die Bedrohung durch schmutzige Bomben eine fiktive ist. Wie zerlegt man systematisch eine Angst und Hysterie schürende Informationspolitik? URL: 490.html |
Academic tools and real-life bug finding in Win32By Rafał Wojtczuk Overview of a few academic program verification/checking tools; their usefulness for practical bug finding (particularly, in Win32 PE binaries); a report on the progress of integer overflow detection tool implementation (with preliminary results). URL: 563.html |
The Right Track - A new approach to copyright in the digital worldBy Nicholas Bentley A discussion of the Intellectual Contributions model and the Rights Office system as an alternative for regulating copyright in a digital environment. URL: 562.html |
|
13:00 |
Private investigations in searching - How to find any book (and many other roadkills) on the Information Super-HighwayBy Fravia You will not need to copy any more nothing on your hard disk. Once you learn some sound searching techniques, you will easily find whatever you want, whenever you want on the fly. URL: 408.html |
e-Voting: The silent decline of public control - Why German voting machines do not meet the requirements of democratic elections.By Ulrich Wiesner The voting machines widely used in Germany's recent elections fail to follow both fundamental democratic principles and German legal requirements. Highlights of a recent Irish report on security issues of these machines will be provided. URL: 1134.html |
The Web according to W3C - How to turn your idea into a standardBy Bert Bos W3C brings together experts, companies and users to define the fundamental formats and protocols of the Web. The challenge is to create a coherent system (the "Semantic Web") without forgettingeverybody's short-term needs. URL: 429.html |
Attacking the IPv6 Protocol SuiteBy van Hauser After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit, which includes all IPv6 attacks as well as a low level packet library for easy crafting packets. URL: 772.html |
14:00 |
I See Airplanes! - How to build your own radar systemBy Eric Blossom The lecture describes how to build your own passive radar system using relatively low-cost hardware and free software. URL: 543.html |
Internet Voting in Estonia - First-ever pan-national official occasion.By Tarvi Martens Tarvi, the project manager for Estonian e-voting, is going to explain how the Internet voting system is built and how the Internet voting was made possible for the Estonian voters. URL: 1098.html |
Open Source, EU funding and Agile Methods - Sprint methodology in funded OSS projectsBy Holger Krekel, Beatrice Düring There is a growing number of open-source developers organized and connected to company and money related work. We report our experiences from the first year of the PyPy project which has a 7 company/university consortium and a 1.3 Million Euro research grant from the European Union. URL: 585.html |
Logical Language Lojban - A Hackers' /Spoken/ Language?!By Sven Moritz Hallberg Lojban is an artificial language for humans. It was designed to be a more powerful means of communication between humans than "legacy" natural languages. Among other attractions, it is based on predicate logic and has an unambiguous grammar. It can be learnt within days. URL: 569.html |
16:00 |
Changing Realities - Innovation, user-creation, activism and entrepreneurship in Second LifeBy Cory Ondrejka The 3D digital world of Second Life has been completely built by its residents. Running on a growing grid of computers, SL's real-time collaborative-creation tools and physical simulation allow for creativity of stunning depth and breadth. URL: 931.html |
Fuzzing - Breaking software in an automated fashionBy Ilja Fuzzing is the art of automatic bug finding. This is done by providing applications with somewhat broken to really broken input. During my talk I'll give an overview of current fuzzers and how to build your own. URL: 537.html |
EvoCell - free software for evolving cellular automata - Exploring the huge space of possible cellular automata by evolutionBy Philipp Tiefenbacher This talk is for everyone who liked to play around with the game of life when he/she was a kid (or older).The goal of this talk is to present EvoCell, a free software project released under the GPL. EvoCell can simulate arbitrarily many cellular automata in parallel with any neigbourhood, any number of states (RAM is the limit) and any transition rules.The really interesting part is that you can evolve the transition rules. By using genetic algorithms EvoCell allows you to explore the huge space of possible cellular automata. Strange worlds of gliders, replicators, blinkers and other cellular machines are awaiting you.In the talk I'll try to explain some fundamental principles of artificial life and demonstrate how the can be seen in cellular automata. URL: 407.html |
Lightning Talks Day 3 - Nine five minutes talks by various speakersBy fukami There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin. URL: 913.html |
17:00 |
Towards the first Free Software GSM Phone - Reverse Engineering the Motorola EZX (A768,A780,E680) series of Linux-based GSM phonesBy Harald Welte This presentation describes the progress of hacking and extending the Motorola series of Linux based Smartphones, with the ultimate goal to replace all proprietary applications with 100% free software. URL: 768.html |
Learning JavaScript with the Google Maps APIBy mesch The web application programming interface (API) that allows to embed google maps in web pages is quite simple, if you speak javascript, yet it employs some of the more sophisticated concepts of the language, such as custom objects and closures. So if you don't speak javascript yet, but want to learn it, using the google maps APIgives you a head start. URL: 417.html |
Esperanto, die internationale Sprache - Eine gut strukturierte Sprache für Geeks und die EUBy pallas Esperanto ist eine leicht erlernbare Sprache, die durch ihre klare Struktur besticht. Sie soll als Zweitsprache weltweite Verständigung ermöglichen. Momentan werden Englisch und dessen Muttersprachler bevorzugt. Bei Esperanto sind alle gleich. URL: 503.html |
|
18:00 |
"Xbox" and "Xbox 360" Hacking - 17 Mistakes Microsoft Made in the Xbox Security System & Xbox 360 HackingBy Felix Domke, Michael Steil A lot about Xbox hacking has been published earlier. This talk summarizes all this, explains some very cool new hacks and analyzes the 15 mistakes Microsoft made in the Xbox security system. It also gives an introduction on the Xbox 360. URL: 559.html |
Disassembler Internals II: Automated Data Structure RecognitionBy Richard Johnson Disassembler Internals II is an advanced look at the power of programmatic disassembly analysis. The talk will focus on data structure recognition for the purposes of reducing time spent reverse engineering protocols and proprietary file formats. URL: 926.html |
Atmel AVR für Dummies - Was ist denn nun eigentlich so ein 'Interrupt'?By fd0 Mikrocontroller sind heutzutage als Embedded Devices kaum noch wegzudenken. Dieser Workshop soll anhand vom Beispiel fnordlicht[1] zeigen, wie ein Atmel AVR Controller funktioniert und programmiert wird. URL: 482.html |
Random Windows Stuff - An introduction to exploitationBy Ollie Whitehouse A random presentation on stuff related to Windows from Terminal Services through to Device Drivers. This talk will discuss some of the functionality and a funky patch or two that can be applied to terminal services to make it a little interesting. In addition Ollie will walk through some of the things he has learned about user land to device driver communications and how these could potentially be exploited. URL: 1133.html |
19:00 |
How to construct Utopia - The relationship between the publication of Moore’s death certificate and hacker cultureBy Lena Elisa Nalbach Projecting the diverse architectures involved in the collaborative construction of Utopia, the event presents the simultaneous stages of the project: Simulating the virtual battleground of the ideal world, ideas will be tested in design prior to actual building of Utopia in reality. URL: 774.html |
WarTracking - Satellite Tracking, harvesting and securityBy Miguel Elias, Thomas B. Rücker - dm8tbr An spiced up introduction into the world of satellite telecommunications. We'll begin at reception setup. Explain theory behind the technical part of satellite telecommunications and finally present the variety of signals flowing down from orbit to the reciever. Several hack-valued topics will be covered. Such as "Be your own satellite broadcaster", fascinating data traffic, "Who else is listening?" and self made recieving/transmitting gear. URL: 580.html |
Hosting a Hacking Challenge - CTF-style - Background information on CIPHER, an international Capture-The-Flag contestBy Lexi Pimendis The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked. URL: 428.html |
|
21:00 |
The truth about Nanotechnology - A concise introduction to what NT is, what it can't do yet and what we should be aware ofBy Niels Boeing Nanotechnology marks the merger of different technologies in structures smaller than 100 nm. While it could yield some powerful applications for sustainability, medicine and electronics, some hazards begin to appear that have to be addressed urgently URL: 336.html |
Intrusion Detection Systems - Elevated to the Next LevelBy Matthias Petermann, Alien8 Currently there exist many different IDS techniques. However, none of them is the superior one. Best results can only be determined by a combination of them. We introduce an approach how to do that efficiently. URL: 561.html |
Free Software and Anarchism - does this compute?By Sandro Gaycken The mode of production in free software development is often being described as anarchical. Despite this attribution seems not initially intended in any fundamental political sense, this sense starts to transfuse the discussions. This invites to a closer look at the reference: what it is, what it's not and what it could be. And once viewed from general anarchist theory and the anarchist theory of technology, any political relation seems to vanish. But despite this first stance, a demonstrative value can still be obtained as soon as some critical remarks are acknowledged and some developmental frames would be changed. URL: 517.html |
Memory allocator securityBy Yves Younan This talk will discuss a variety of memory allocators that are available for C and C++ and how they can be exploited. Afterwards I will describe our modification to one of these memory allocators that makes it more resilient to attacks. URL: 574.html |
22:00 |
Fnord Jahresrückblick - Was wirklich geschahBy Frank Rieger, Felix von Leitner The underreported stories of the year, sorted by bizarreness. URL: 601.html |
Zauberhafte NaturwissenschaftenBy Wolfgang Hahn Zur Anregung, sich mit Naturwissenschaften zu beschäftigen und „einfache, selbstverständliche“ Sachverhalte wieder fragwürdig und problemhaltig zu machen. URL: 778.html |
Honeymonkeys - Chasing hackers with a bunch of monkeysBy Sebastian Wolfgarten, Krisztian Piller As part of their ongoing efforts to secure the use of the web for Windows-based systems Microsoft recently launched a new research initiative called Honeymonkeys. This talk will introduce the basic concepts and ideas behind this initiative and will present the speakers' latest research project to gain more knowledge about implementing client-based honeypots. URL: 871.html |
Unix sanity layer - A class oriented interface to Unix system managementBy Sascha Krissler A language independent class library is presented that provides basic, advanced and unique object-oriented paradigms that ease system management and configuration by providing abstractions as frontends to the myriads of configuration file formats and other system objects. URL: 512.html |
23:00 |
Hacker Jeopardy - The one and only hacker quizshowBy Stefan 'Sec' Zehl, Ray The well known quizshow format, but of course covering topics not usually seen on television URL: 789.html |
Entschwörungstheorie - Verschwörungstheoretiker sind hinter mir her!By Daniel Kulla Anschließend an den letztjährigen Vortrag über die bedauerliche Mangel- und Fehlrezeption Robert Anton Wilsons soll die Gesellschaft, in der sich populäre Verschwörungstheorien über 9/11 und "USrael" befinden, vorgestellt werden. Verschwörungstheorien können ein lustiges Spielzeug sein, wenn sie nicht geglaubt werden. In der bewußtseinserweiternden Tradition von Wilson könnten Hacker für assoziativen Mindfuck werben. Warum jedoch werden Verschwörungstheorien so selten dekonstruiert und so oft gepusht? URL: 426.html |
Hexenbesen und heiliger Gral - Vorläufige und subjektive Gedanken zur inhaltlichen Qualität von Wikipedia-ArtikelnBy Henriette Fiebig Einige vorläufige und ausgesprochen subjektive Gedanken zur Artikelqualität in der Wikipedia aus der Sicht eines Geisteswissenschaftlers. Dabei interessiert weniger die Frage nach den sogenannten „Relevanzkriterien”, als vielmehr die Frage danach, inwieweit die Arbeitsweise in und mit der Wikipedia den Ansprüchen an eine wissenschaftliche Arbeitsweise genügt. Ein Anleitung auch für den, der sich fragt, ob man den Informationen eines Wikipedia-Artikels denn überhaupt trauen kann. URL: 1111.html |
Breaking Down the Web of TrustBy Seth Hardy Even with tutorials on the WoT and good trust policies the concept of "trust" can still be hard to grasp. Here we'll look at trust metrics, ways of using current trust systems better, and some non-crypto applications of trust. URL: 545.html |
Saal 1 |
Saal 2 |
Saal 3 |
Saal 4 |
|
---|---|---|---|---|
12:00 |
WSIS - The Review - Hacking a DictatorshipBy Ralf Bendrath, Robert Guerra, Markus Beckedahl Der zweite World Summit on the Information Society (WSIS) findet im November in Tunis statt. Die beiden beherrschenden Themen Internet Governance und Financing Mechanism sind nicht besonders spannend. Allerdings wird der WSIS2 in Tunesien stattfinden, einem Land mit einer Diktatur, wo Menschenrechte mit Füssen getreten werden und die gesamte ICT-Infrastruktur überwacht und zensiert wird. URL: 470.html |
Urheberrecht - Fakten, Mythen, Geschichte(n) und mögliche ZukünfteBy Julian 'hds' Finn, Jenny-Louise Becker Viel wird erzählt, viel ist auch falsch, anderes wird verschwiegen Jenny-Louise Becker (Autorin des Buches "Sounds Right!" und Julian Finn (Attac, Entropia (CCC Karlsruhe)) führen den Zuhörer auf eine Reise von den Anfängen des Urheberrechtes bis hin zur heutigen Zeit, räumen mit den Mythen auf und bieten Visionen an, wohin es gehen könnte. Natürlich nicht ohne die Gefahren und Abgründe zu erwähnen, die sich auftun oder noch auftun könnten. URL: 782.html |
A discussion about modern disk encryption systemsBy Jacob Appelbaum Jacob Appelbaum will discuss different disk encryption systems in their current implementation. This will include technical as well as legal issues. URL: 1112.html |
The Future of Virtualization - The "anyOS" paradigm and its implications through virtualizationBy Felix Erkinger Modern virtualization technics are changing the point of view used to build software and its infrastructure.Explaining the techniques used in cutting edge virtualization software, this talk gives an introspection how virtualization is solving design issues in heterogenos computing environments. URL: 788.html |
13:00 |
Quantum Entanglement - An introductionBy Stephanie Wehner Entanglement is possibly the most intriguing element of quantum theory. This talk gives a gentle introduction to the phenomenon of entanglement and nonlocality. Uses of entanglement in quantum cryptography and quantum computing are also presented. URL: 1077.html |
Fair Code - Free/Open Source Software and the Digital DivideBy Meike Richter What has software to do with development policy? A lot. Software is not only about code, it is about rights, control, transparency, freedom and power. URL: 479.html |
Paper-Prototyping Workshop - Eine Usability-MethodeBy Ellen Reitmayr, Antenne Springborn Paper Prototyping ist eine schnelle und effiziente Methode, um User Interfaces ohne Programmieraufwand zu modellieren und mit echten Nutzern zu testen. Benötigt werden nur ein paar Blatt Papier, eine Schere und ein Stift. URL: 498.html |
Kochen für NerdsBy Hans Knöll, Christian Jeitler Im Sinne einer humorvollen Kochshow mit parallel getatekten Tips zu Einkauf, Zubereitung und Hardware zeigen wir, dass selbst gekocht nicht mehr Aufwand ist, als in der Mikrowelle aufgewärmt. URL: 790.html |
14:00 |
Covert Communication in a Dark Network - A major new version of freenetBy Oskar Sandberg, Ian Clarke At Defcon 13, we presented our ideas for creating scalable networks where only trusted friends speak directly to each other. In this talk, we will elaborate on this, discussing further experiments and results, as well as our attempts to build such a network for real. URL: 492.html |
Access to Knowledge - Copyright, Patents and Politics at the World Intellectual Property OrganisationBy Karsten Gerloff Your Access to Knowledge is at stake. At the World Intellectual Property Organisation, where international treaties on copyright and patents are decided on, a revolution is taking place. Big rightsholders have been getting their way until now, restricting the free use of ideas. A Treaty on Access to Knowledge is needed to guarantee your rights, and the Free Software Foundation Europe is working on it. URL: 499.html |
Terminator Genes and GURT - Biological Restrictions Management - Five Years after the announcement of a quasi moratoriumBy Oliver Moldenhauer, Julian 'hds' Finn Terminator Technology prevents plants from producing reproducible seeds, acting as a sort of copy protection technology for plants. In this talk we want to talk about the technological background, explaining the bits of genetic code that can switch reproduction on and off. Also we want to focus on the implication of this technology, the parallels to our struggles as hackers, and the resistance to its introduction. URL: 828.html |
|
16:00 |
Bluetooth Hacking - The State of The Art - A roundup and live demonstrations of all currently known Bluetooth vulnerabilities.By Martin Herfurt, Marcel Holtmann, Adam Laurie This talk will provide an overview of all currently know Bluetooth exploits, as well as live demonstrations, including Bluebugging, Snarfing, Dumping, PIN cracking and Car Whispering. URL: 536.html |
WiFi Long Shots - Wireless connections of 20km and moreBy Elektra Wagenrad What you need to know to successfully design and build a wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Polarisation of electromagnetic waves. Tricks to avoid interference. Timeout problems of 802.11abg and how to deal with them. URL: 1078.html |
Secure Code - Why developing Secure Software is like playing Marble MadnessBy Paul Böhm This talk will introduce new strategies for dealing with entire bug classes, and removing bug attractors from development environments. URL: 530.html |
Lightning Talks Day 4 - Nine five minutes talks by various speakersBy prometoys There are also loads of reasons for attending the lightning talks (there is a 1-hour block of those each day at 22C3, with 10 talks in a row). It’s entertaining. You get to learn about a lot of different subjects in a short time. And even if one particular speaker is boring: hey, it will be over in just 5 minutes and a new topic will begin. URL: 915.html |
17:00 |
GNU/Linux für Blinde und Sehbehinderte - Erfahrungen aus der PraxisBy Sebastian Andres, Lars Stetten In diesem Vortrag wird erläutert, wie Blinde und Sehbehinderte Menschen mit dem Computer generell und speziell mit OpenSource-Lösungen arbeiten. Dabei werden sowohl Hard- als auch Softwarelösungen vorgestellt. URL: 1109.html |
The Realtime thing - What the heck is realtime - and what to do with itBy Felix Erkinger, Erwin Erkinger An overview on realtime software design, with explanations of commonly used terms and methods. URL: 575.html |
The very early Computer Game History - How the games have become the first digital mass productBy Andreas Lange Andreas Lange will show the very early computer games before they became a commercial product. If you ever want to know, what was really the first game this session will be the right one for you. URL: 424.html |
|
18:00 |
Blackberry: call to arms, some provided - Teach yourself upper management in 22 daysBy FX of Phenoelit RIM Blackberry devices and servers are hidden behind a curtain of FUD and secrecy. The purpose of this talk is to lift the curtain a little and show what can and could be done. URL: 596.html |
Advanced Buffer Overflow Methods [or] Smack the Stack - Cracking the VA-PatchBy Izik A quick review of the standard buffer overflow exploit structure VA Patch, What it is and what it does to prevent buffer overflows. URL: 491.html |
22C3 Network ReviewBy Stefan Wahl, Sebastian Werner An Introduction into the structure and design of the congress network -featuring a description of hardware setup and focusing on the uplink tothe internet. URL: 496.html |
Wargames - Hacker Spielen - Männliche Identitätskonstruktion und spielerische Herangehensweisen an ComputerBy Francis Hunger In diesem Vortrag unternehme ich den Versuch, einige Aspekte der Konstruktion von Geschlechteridentitäten anhand der Figur des Hackers zu beleuchten. Der Hacker als Identitätskonstruktion interessiert mich in Bezug auf den technikzentrierten Kontext, in dem er spielerisch agiert. URL: 427.html |
19:00 |
Security Nightmares 2006 - Oder: worüber wir nächstes Jahr lachen werdenBy Ron, Frank Rieger Security Nightmares - der jährliche Rückblick auf die IT-Sicherheit und der Security-Glaskugelblick fürs nächste Jahr. URL: 600.html |
|||
20:00 |
22C3 Closing EventBy Julia Lüning, Henriette Fiebig, fukami, Tim Pritlove Please join us as we look back to what happened and look forward to what's next on our agenda. URL: 776.html |