-
Russian Subversion Group Communication Leak From Sloviansk, Eastern Ukraine - YouTube
-
Flickr vulnerable to SQL Injection and Remote Code Execution Flaws - The Hacker News
-
First sites admit data loss through Heartbleed attacks - Computerworld
-
"Pers en politici moeten zich afvragen waar ze mee bezig zijn" - Wetstraat - De Morgen
-
Documentaire Infrarouge Koursk, un Sous Marin en Eaux Troubles
-
U Boat War - Documentary On The Submarine Battle Of World War 2
-
" Thumbnail 4:44 Still Report # 215 - Greatest "
-
WW2: AN/UPN-1&2 - Ultra Portable Microwave Radar Beacons (1944) - YouTube
-
Greenwald and Snowden (2014) "The Men Who Leaked The Secrets" - YouTube
-
COLD-WAR AMERICA: Technology 1953 Post-WWII (720p) - YouTube
-
JFK IS ELECTED PRESIDENT (NBC-TV CLIPS) (NOVEMBER 1960) - YouTube
-
The Inner Workings of the FBI: Investigating the Law Enforcement Agency - History (1993) - YouTube
-
Christopher Hitchens and Pat Buchanan on Bill Clinton and the Bosnian Civil War (1993) - YouTube
-
The New Middle East Insurrections & Other Subversions of the Modernist Frame - YouTube
-
The Wrong Enemy: America in Afghanistan 2001 -- 2014 - YouTube
-
TRIPS Conference | Recognition of Public Goods in WTO Dispute Settlement - YouTube
-
TRIPS Conference | Preserving Cultural & Scientific Commons - YouTube
-
TRIPS Conference | Technology Transfer in the 21st Century - YouTube
-
The Boom: How Fracking Ignited the American Energy Revolution and Changed the World - YouTube
-
NSA Secrecy and National Security | Institute of Politics - YouTube
-
Agentschap Telecom blijft bewaarplicht handhaven - Webwereld
-
Netflix flicks to active-active operations - Networking - Technology - News - iTnews.com.au
-
Case Study - Using Spamhaus BGP feed in a Production Environment
-
Australia depending on vulnerable 'cyber' environment: DSTO | ZDNet
-
Bot masters in cut-throat DDoS fight - Security - Technology - News - iTnews.com.au
-
World Review | Break up of Ukraine will mark start of new world order
-
More Belgian companies report spear phishing attacks | www.cert.be
-
The Switchboard: Yes, Heartbleed can be used to get encryption keys.
Monday, 14 April 2014
links of the day 04/15/2014 (a.m.)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment