| 11:30 |
Marriage From Hell: On the Secret Love Affair Between Dictators and Western Technology Companies
|
|
|
| 11:45 |
|
|
| 12:00 |
|
|
| 12:15 |
|
|
| 12:30 |
|
|
|
| 12:45 |
Sachsen dreht frei
On- und Offline-Überwachung: Weil sie es können
|
What is WhiteIT and what does it aim for?
Why you probably want to be concerned about it and similiar alliances.
|
The Atari 2600 Video Computer System: The Ultimate Talk
The history, the hardware and how to write programs
|
| 13:00 |
| 13:15 |
| 13:30 |
| 13:45 |
|
|
|
| 14:00 |
Datamining for Hackers
Encrypted Traffic Mining
|
r0ket++
The CCC-Badge
|
Can trains be hacked?
Die Technik der Eisenbahnsicherungsanlagen
|
| 14:15 |
| 14:30 |
| 14:45 |
| 15:00 |
|
|
|
| 15:15 |
|
|
|
| 15:30 |
|
|
|
| 15:45 |
|
|
|
| 16:00 |
Der Staatstrojaner
Vom braunen Briefumschlag bis zur Publikation
|
SCADA and PLC Vulnerabilities in Correctional Facilities
Tiffany Rad, Teague Newman, John Strauchs
|
Demokratie auf Sächsisch
|
| 16:15 |
| 16:30 |
| 16:45 |
| 17:00 |
|
|
| 17:15 |
Almighty DNA?
Was die Tatort-Wahrheitsmaschine mit Überwachung zu tun hat
|
Automatic Algorithm Invention with a GPU
Hell Yeah, it's rocket science
|
| 17:30 |
| 17:45 |
| 18:00 |
| 18:15 |
|
|
|
| 18:30 |
802.11 Packets in Packets
A Standard-Compliant Exploit of Layer 1
|
Does Hacktivism Matter?
How the Btx hack changed computer law-making in Germany
|
The movements against state-controlled Internet in Turkey
A short account of its history and future challenges
|
| 18:45 |
| 19:00 |
| 19:15 |
| 19:30 |
|
|
|
| 19:45 |
|
|
|
| 20:00 |
|
|
|
| 20:15 |
|
|
|
| 20:30 |
The coming war on general computation
The copyright war was just the beginning
|
What is in a name?
Identity-Regimes from 1500 to the 2000s
|
BuggedPlanet
Surveillance Industry & Country's Actings
|
| 20:45 |
| 21:00 |
| 21:15 |
| 21:30 |
|
|
|
| 21:45 |
Defending mobile phones
|
EU-Datenschutz und das Internet der Dinge
|
Macro dragnets: Why trawl the river when you can do the whole ocean
What happens when data collection goes awry in the 21st century
|
| 22:00 |
| 22:15 |
| 22:30 |
| 22:45 |
|
|
|
| 23:00 |
Black Ops of TCP/IP 2011
|
|
String Oriented Programming
Circumventing ASLR, DEP, and Other Guards
|
| 23:15 |
|
| 23:30 |
|
| 23:45 |
|
| 00:00 |
|
|
|
| 00:15 |
Pentanews Game Show 2k11/3
42 new questions, new jokers, same concept, more fun than last year!
|
|
|
| 00:30 |
|
|
| 00:45 |
|
|
| 01:00 |
|
|