50:55
Gaming in the Glass Safe - Games DRM & Privacy
Mad Science Gaming
52:42
Blitzableiter - the Release
43:08
How to Apply Reverse Engineering Techniques to Cheat at Video Games
48:14
HD Voice - The Overdue Revolution
35:27
An Examination of the Adequacy of the Laws Related to Cyber Warfare
46:10
The Search for Perfect Handcuffs... and the Perfect Handcuff Key
44:28
Resilient Botnet Command and Control with Tor
42:33
Exploiting Internet Surveillance Systems
34:11
How Hackers Won the Zombie Apocalypse
41:56
Searching for Malware: A Review of Attackers' Use of Search Engines to Lure Victims
46:15
A New Approach to Forensic Methodology - !!BUSTED!! case studies
38:31
Powershell...omfg
30:58
Cloud Computing, a Weapon of Mass Destruction?
46:30
Hardware Hacking for Software Guys
25:21
Open Public Sensors and Trend
35:17
How to Hack Millions of Routers
57:51
Black Ops Of Fundamental Defense: Web Edition
43:06
Your ISP and the Government: Best Friends Forever
52:33
Practical Cellphone Spying
46:37
Extreme-Range RFID Tracking