Light, Color, and Perception
SHODAN for Penetration Testers
Examining Costs, Benefits, and Economics in Malware and Carding Markets
Electronic Take Back
Cooking for Geeks
Design of a Wireless EMG
Lisp, The Oldest Language of the Future
Buying Privacy in Digitized Cities
Monkeysphere: Fixing Authentication on the Net
Risk Analysis for Dummies
Detecting and Defending Your Network from Malware Using Nepenthes
Injecting Electromagnetic Pulses into Digital Devices
False Domain Name Billing and Other Scams
Hacking Out a Graphic Novel
For Its Own Sake and to Build Something Better: A Primer on Neuroscience, Bat Echolocation, and Hacker Bio-inspiration
No Free Lunch: Privacy Risks and Issues in Online Gaming
Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources
Surf’s Up! Exploring Cross Site Request Forgery (CSRF) through Social Network Exploitation
Much Ado About Randomness
Why You Should Be an Amateur
Hackers for Human Rights
The Telephone Pioneers of America
PSTN-based Cartography
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us
Hacking Terrorist Networks Logically and Emotionally
Lock Bypass without Lockpicks
Burning and Building Bridges: A Primer to Hacking the Education System
TrackMeNot: Injecting Reasonable Doubt in Everyone’s Queries
The Freedom Box: How to Reclaim Privacy on the Web
Bakeca.it DDoS - How Evil Forces Have Been Defeated
The Black Suit Plan Isn't Working - Now What?