Geschiedenis Van öffentlich
[search 0]
Mehr
Download the App!
show episodes
 
Loading …
show series
 
De geschiedenis en toekomst van de nederlandse hackercampsKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/Von Boekenwuurm
  continue reading
 
Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :)Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.Wat is data?Hoe lang duurt een dag?Hoe lang duurt een uur?Hoe lang is een maand?Wat is een jaartal?Wat is een geboortedatum?Wat is een naam?Hoe lang is een pincode?Waaruit…
  continue reading
 
Sociale constructen gebruikt in software context en alles wat daar entertainment mee maakt :)Een interactieve presentatie over waarom beperkingen op je dataset zetten onhandig is.Wat is data?Hoe lang duurt een dag?Hoe lang duurt een uur?Hoe lang is een maand?Wat is een jaartal?Wat is een geboortedatum?Wat is een naam?Hoe lang is een pincode?Waaruit…
  continue reading
 
The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)I wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samp…
  continue reading
 
The summary that's fun for both outsiders and insiders of this gem of a genre. Talk is in Dutch :)I wanted to do another talk, but Hacker Hotel decided to sell branded bomber jacks, which forced my hand as this conference then also needs the talk that goes along with those jackets. During the talk we'll listen to the evolution of a genre using samp…
  continue reading
 
Frank talks about AI, why it all of a sudden is everywhere and what it means.The keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom u…
  continue reading
 
Frank talks about AI, why it all of a sudden is everywhere and what it means.The keynotes of the likes of Microsoft, Google and Apple can all be summarized in 10 words: “A.I., A.I., A.I., Large Language Model, A.I., A.I., GPT, A.I. …“, so no doubt artificial intelligence holds a promise for the future. But what promise? Will A.I. save use or doom u…
  continue reading
 
I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off …
  continue reading
 
In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.But you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The …
  continue reading
 
I spent the past 6 years restoring and upgrading the 2 flights of stairs in my almost 100 years old house in my off time, taking into them into the 21st century while I was at it. The result is a standalone extensible system that supports an unlimited number of sensors and can light up to 256 cheap LED strips on a setup that can run completely off …
  continue reading
 
In The Netherlands, everyone can trust the outcome of elections. That is our mission as The Dutch electoral council.But you don't have to trust us to be able to trust the outcome of elections. Anyone can verify the results and in this presentation, we aim to explain to you which security measures have been taken in the election process here in The …
  continue reading
 
De geschiedenis en toekomst van de nederlandse hackercampsKom mee door deze geschiedenis les ter voorbereiding van het jubuleum kamp, WHY2025!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/NCKS3X/Von Boekenwuurm
  continue reading
 
Meshtastic and LoRa, what is it and what can you do with it?LoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.One of the most…
  continue reading
 
Meshtastic and LoRa, what is it and what can you do with it?LoRa, or Long Range radio, is a technology that operates on freely available frequency bands. Thanks to its unique way of transmitting and receiving signals, it’s not only remarkably resistant to noise but also capable of bridging impressive distances with very little power.One of the most…
  continue reading
 
This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, chall…
  continue reading
 
This talk delves into the technical aspects of the Tanmatsu hardware design, the latest creation by the badge team, set to be released alongside the availability of ESP32-P4 chips. It will also form the foundation for the WHY2025 badge. Topics include an exploration of the PCB's high-level design, cost considerations for producing 4000 units, chall…
  continue reading
 
Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.The IT community in Kharkiv is doing th…
  continue reading
 
CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a p…
  continue reading
 
Since the start of the war, our community has risen to help friends in Ukraine in many different ways. Roman Kniaziev is coming over from Kharkiv to explain how he works with all the volunteers of ETOC to support his country. Even though the news can be overwhelming, everyone can help. This talk shows you how.The IT community in Kharkiv is doing th…
  continue reading
 
CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a platform and why?CubeSats are small satellites comprised of 10x10x10cm "units" and range in size from very small 1U or smaller PocketQubes to 24U beasts. What can be done with such a p…
  continue reading
 
This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff yo…
  continue reading
 
With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclo…
  continue reading
 
This workshop is especially for all attendants who are not Dutch natives. In an exact and logical manner I will guide you through the syntax and semantics of the Dutch language, from sounds (the famous 'ggh' and vowel inventory) to gender of nouns and word order. There will be simple illustrations to help you get a grip on the language and bluff yo…
  continue reading
 
The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intellig…
  continue reading
 
With the support of the Dutch embassy in Tokyo, I have researched Coordinated Vulnerability Disclosure (CVD) in Japan for DIVD. Japan’s governmental policy on CVD dates back to 2004. Although Japanese criminal law and jurisprudence do not allow for large-scale intrusive vulnerability research and disclosure, Japanese institutes help citizens disclo…
  continue reading
 
The total number of vulnerabilities continues to rise. If we had to rely on just CVSS for prioritizing those vulnerabilities, we have an enormous hard time to remediate all of them. In this talk, we’ll explore the critical gaps in CVSS-based prioritization and discuss why factors like exploitability, asset criticality, and real-time threat intellig…
  continue reading
 
This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.I will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.Back in the period 1962 to 1969 the …
  continue reading
 
The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.The Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it wo…
  continue reading
 
"AiTM: Lessons Learned" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like …
  continue reading
 
"AiTM: Lessons Learned" dives into the evolving threat of AiTM attacks. Our presentation highlights the transition from basic phishing tactics to sophisticated methods that compromise organizational security. The presentation outlines the journey from oldschool phishing attacks, to phishing framework like UADMIN, and the introduction of tools like …
  continue reading
 
The Election Council is working on Abacus, the tabulation software for the elections. Come to this workshop to try your hands on the software in a production-like setting and learn more about the choices and concepts behind it.The Election Council is working on Abacus, the tabulation software for the elections. This workshop will show you how it wo…
  continue reading
 
This talk describes the computer and its interfaces the DSKY (DiSplay-KeYboard) on board the Apollo missions that got us to the moon and back.I will point out several modern sources of information about this historical project and how it entertains lots of people to this day, including several emulation projects.Back in the period 1962 to 1969 the …
  continue reading
 
I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.In this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual partic…
  continue reading
 
How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.Other topics are:* Reading and analysing logging* Capture a scrolling text* Query of classes etcLicensed to the public under http://creati…
  continue reading
 
How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.How to use screenreaders to scan the operatingsystem, building blocks of an application or web-enviroment.Other topics are:* Reading and analysing logging* Capture a scrolling text* Query of classes etcLicensed to the public under http://creati…
  continue reading
 
I have been struggling with my weight for over 25 years. After reading the book : The Obesity Code" everything clicked. Since I have lost 13 kg within 6 months. The great thing about this is that it is effortless.In this workshop we start with the theory of gaining and loosing weight. After that we are going to look at recipes for individual partic…
  continue reading
 
De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie,…
  continue reading
 
De opkomst van geavanceerde technologie en kunstmatige intelligentie heeft ongekende mogelijkheden gecreëerd, maar ook een sluimerend probleem blootgelegd: de validatiecrisis. In deze lezing neemt Brenno de Winter, gerenommeerd cybersecurity-expert en auteur van De Validatiecrisis, u mee in de wereld van misleidende aannames, ongeteste technologie,…
  continue reading
 
This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.Books: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and eve…
  continue reading
 
This you really want to know. Huib has been responsibly disclosing the Secret Services, criminals and hackers. Now we turn it around: ask Huib anything. Chris van ‘t Hof will guide the conversation.Books: 2024 “Dit wil je echt niet weten”, 2019 “Het is oorlog en niemand die het ziet”, “There's a War Going On But No One Can See It” - Its war and eve…
  continue reading
 
Openingstalk by Dimitri opening Hackerhotel 2025In this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/…
  continue reading
 
Openingstalk by Dimitri opening Hackerhotel 2025In this openingstalk i will open Hackerhotel 2025 and thank all people that helped me and explain about how this Hackerhotel 2025 organisation went.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/EMVMAX/…
  continue reading
 
You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
  continue reading
 
How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.FrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.This navigation app uses MapLibre to render a map on the Car screen.During this talk, we will discuss how this works and how you can create your own…
  continue reading
 
In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that com…
  continue reading
 
You've maybee seen the raking robot that got a CEH (Certified Estetisch Harker) certificate, the Telex linked to Twitter/Telegram or the ASCII foto booth. They are all made by me. If this talk gets accepted I will do a deep dive on these three contraptions and what I learned building them.Beside Schuberg Philis, DIVD, attending the farm and keeping…
  continue reading
 
How to make an Android App for Android Auto, a demo of the MapLibre sample app, and stories about Flitsmeister.FrankkieNL has worked on the Android Auto (and Automotive) version of the Flitsmeister app.This navigation app uses MapLibre to render a map on the Car screen.During this talk, we will discuss how this works and how you can create your own…
  continue reading
 
In today's rapidly evolving digital landscape, the increasing frequency and the scale of security incidents pose significant challenges for incident response teams. The traditional approach, rooted in digital forensics, is no longer sufficient nor is it efficient enough. It's time for a shift towards an automated incident response strategy that com…
  continue reading
 
A year later, we are back at the wonderful company Acme where nice people make beautiful things.This time we will follow up on that and tell you how the company can improve their own maturity and security levels as explained in the standard.A year later, we are back at the wonderful company Acme where nice people make beautiful things. How did they…
  continue reading
 
A short introduction to cryptography, its past, present and future for the not yet fully initiated.Many talks mentioned cryptography somewhere along the presentation and everybody just nods. But how many people actually know the insights of cryptography? Why some things work and some things don't? During this talk I will explain the difference betw…
  continue reading
 
Loading …

Kurzanleitung

Hören Sie sich diese Show an, während Sie die Gegend erkunden
Abspielen