Suchergebnisse

Aus LaborWiki
Wechseln zu: Navigation, Suche
  • |tags=IT Security, Internet
    1 KB (151 Wörter) - 04:02, 25. Nov. 2014
  • |tags=IT Security
    818 Bytes (104 Wörter) - 02:08, 27. Nov. 2014
  • * Felix Schuster (tsk at reversing punkt it) …lles vorkommen. Zum Vorbereiten kann ich dieses Paper über Webapplication Security empfehlen, was von einem der Organisatoren geschrieben wurde:
    6 KB (859 Wörter) - 03:43, 18. Jan. 2015
  • …there were highly motivated students from the newly founded faculty for IT-Security at the University Bochum. …s another applicant for the room - an alternative music store. Eventually, it was a coin flip which decided in favour of Labor and against the music stor
    3 KB (574 Wörter) - 01:19, 25. Jul. 2009
  • Trusted Computing ist ein sehr bekannter Begriff in der IT Welt. Immer mehr wird das TPM ("Trusted Platform Module") als Standard in L + Add Security fixes -- working in progress
    20 KB (2.973 Wörter) - 00:17, 17. Okt. 2010
  • |tags=IT Security
    3 KB (484 Wörter) - 04:27, 25. Nov. 2014
  • …as the term "multi media" often refers to fancy graphical eye-candy stuff, it in this case means "connecting different transport media", such as can-bus, …d does, is fork a process (server) that handles incoming data and forwards it to the device or connected clients respectively. If the server is already r
    6 KB (918 Wörter) - 21:26, 2. Jan. 2015
  • 4 Output: 7*U/sek ??? instable output, from hall, don't use it!<br> <b>Wear security goggles !</b><br>
    5 KB (770 Wörter) - 13:07, 5. Apr. 2011
  • …bootloader for AVR Microcontrollers. When installed on the target device, it allows you to flash your AVR with a RFM12 radio transceiver module. …ut its configuration. If it doesn't receive an answer within a given time, it starts the application code as normal.
    3 KB (491 Wörter) - 08:36, 14. Jun. 2011
  • * Was: '''Implementation and Security Analysis of 125kHz RFID Protocols''' …npublished protocol. With the successful realization of this reader board, it is possible to perform side-channel analysis on the transponders.
    966 Bytes (143 Wörter) - 01:39, 8. Apr. 2014
  • …odoco]] onboard decoder for the locos utilizes a radio transmitter anyway, it is possible for a loco to send this piece of information back to the contro …icrocontroller that continuously transmits the same sequence of bits while it is turned on. An infrared LED connected to one of the AVR's output drivers
    5 KB (821 Wörter) - 09:37, 19. Jun. 2012
  • * [https://netzpolitik.org/2014/gi-it-sicherheitsgesetz-schafft-unsicherheit/ IT-Sicherheitsgesetz schafft Unsicherheit] D2ns …e/digital/datenschutz/2014-11/operation-onymous-faq FBI, Europol, Homeland Security lassen Schwarzmarktseit in Tor hochgehen] D2ns
    4 KB (386 Wörter) - 03:53, 30. Jan. 2015
  • |tags=IT Security
    752 Bytes (110 Wörter) - 18:02, 4. Jul. 2017
  • …rbracht hat, hat bestimmt von der Machine-Learning Sau gehört, die durchs IT Dorf getrieben wurde. Ich will hier mal im Schnelldurchlauf erzählen was s 7. Philip: IT-Security (unsicher)
    25 KB (3.374 Wörter) - 19:57, 16. Jan. 2018
  • …world-Anwendungen angedeihen zu lassen. It is still all about application security! Nachdem wir also dieses und letztes Jahr alles in allem sehr viel Spass be
    2 KB (376 Wörter) - 02:02, 26. Jun. 2017
  • ….2007 18:00 bis 01:00 UhrCIPHER is a Capture The Flag-style exercise in IT security for teams of students from universities. The [...] CIPHER is a Capture The Flag-style exercise in IT security for teams of students from universities. The task is to maintain a server r
    1 KB (183 Wörter) - 02:02, 26. Jun. 2017
  • You have a project featuring a microcontroller and want to present it. Or maybe you want to develop together with others a project.<br /> …a or a programming- language. Tho you may not neccessary need to know what it is good for. However you gathered quite some knowled which you are eager to
    5 KB (789 Wörter) - 02:03, 26. Jun. 2017
  • |title=nrw.uniTS: IT-Sicherheits-Workshop im Labor …rund 40 Personen, vor allem aus der Kreativwirtschaft, zusammen, um über IT-Sicherheit und deren Möglichkeiten zu diskutieren. Im Vordergrund stand [.
    2 KB (268 Wörter) - 02:05, 26. Jun. 2017
  • * IT Security * IT-Security
    5 KB (509 Wörter) - 02:17, 24. Feb. 2022
  • |tags=ETIT, ITS, ITSec, Informatik, IT-Sicherheit, IT Security
    1 KB (197 Wörter) - 23:56, 21. Okt. 2017

Zeige (vorherige 20 | nächste 20) (20 | 50 | 100 | 250 | 500)