+ All Categories
Home > Documents > Stefan Marsiske - What would hackers use? part1

Stefan Marsiske - What would hackers use? part1

Date post: 21-Jun-2015
Category:
Upload: fundacja-polak-20
View: 887 times
Download: 0 times
Share this document with a friend
Popular Tags:
39
Transcript
Page 1: Stefan Marsiske - What would hackers use? part1
Page 2: Stefan Marsiske - What would hackers use? part1

what would hackers use

stef

September 5, 2010

Page 3: Stefan Marsiske - What would hackers use? part1
Page 4: Stefan Marsiske - What would hackers use? part1
Page 5: Stefan Marsiske - What would hackers use? part1
Page 6: Stefan Marsiske - What would hackers use? part1
Page 7: Stefan Marsiske - What would hackers use? part1
Page 8: Stefan Marsiske - What would hackers use? part1
Page 9: Stefan Marsiske - What would hackers use? part1
Page 10: Stefan Marsiske - What would hackers use? part1
Page 11: Stefan Marsiske - What would hackers use? part1
Page 12: Stefan Marsiske - What would hackers use? part1
Page 13: Stefan Marsiske - What would hackers use? part1
Page 14: Stefan Marsiske - What would hackers use? part1
Page 15: Stefan Marsiske - What would hackers use? part1
Page 16: Stefan Marsiske - What would hackers use? part1
Page 17: Stefan Marsiske - What would hackers use? part1
Page 18: Stefan Marsiske - What would hackers use? part1
Page 19: Stefan Marsiske - What would hackers use? part1
Page 20: Stefan Marsiske - What would hackers use? part1
Page 21: Stefan Marsiske - What would hackers use? part1
Page 22: Stefan Marsiske - What would hackers use? part1
Page 23: Stefan Marsiske - What would hackers use? part1
Page 24: Stefan Marsiske - What would hackers use? part1
Page 25: Stefan Marsiske - What would hackers use? part1
Page 26: Stefan Marsiske - What would hackers use? part1
Page 27: Stefan Marsiske - What would hackers use? part1
Page 28: Stefan Marsiske - What would hackers use? part1
Page 29: Stefan Marsiske - What would hackers use? part1
Page 30: Stefan Marsiske - What would hackers use? part1
Page 31: Stefan Marsiske - What would hackers use? part1
Page 32: Stefan Marsiske - What would hackers use? part1
Page 33: Stefan Marsiske - What would hackers use? part1
Page 34: Stefan Marsiske - What would hackers use? part1
Page 35: Stefan Marsiske - What would hackers use? part1

cleanternet.�v1

1cleanternet.�v

Page 36: Stefan Marsiske - What would hackers use? part1

Links

I http://wikileaks.org/

I http://www.laquadrature.net/wiki/

I http://euwiki.org/index.php?title=ACTA%2Fdiffs%

2FChapter2%2FSection4&diff=3707&oldid=3706

I http://en.swpat.org/wiki/Software_patents_wiki:

_home_page

I http://werebuild.eu/wiki/index.php/

I http://pad.telecomix.org/bridgecamp2

I http://gplv3.fsf.org/comments/gplv3-draft-2.html

I https://lqdn.co-ment.com/text/ZUEwpvJ9mmd/view/

Page 37: Stefan Marsiske - What would hackers use? part1

Links cont'd

I http://www.status.net / http://identi.ca/stf

I http://www.public-software-group.org/liquid_

feedback_testing/issue/show/37.html

I http://www.europarl.europa.eu/activities/

introduction/home.do?language=en

I http://euwiki.org/Tratten/oeil/Stage_reached_in_

procedure

I http://politicalmemory.eu/

I http://littlesis.org/person/19856/Kira_Alvarez

I http://longstrings.soup.io/

Page 38: Stefan Marsiske - What would hackers use? part1

Credits

I Gutenberg & His Printing Press / CCBYNC by camelot2302

I Open 19 / CCBYND by loop_oh

I INSULAR Technologies / CCBYSANC by pablosanz

I Cisco 7936 IP Conference Station / CCBY by Andres Rueda

I guckes.soup.io/post/19675231/Have-you-read-my-blog-yet

I Irssi IRC client with a Userlist and Highlight Window / CCBYby nixternal

I Live video streaming / CCBYSANC by Pigsaw

Page 39: Stefan Marsiske - What would hackers use? part1

Recommended