Computer Club สาธารณะ
[search 0]
เพิ่มเติม
ดาวน์โหลดแอปเลย!
show episodes
 
Artwork

1
Computer Club

Computer Club - Freddy & Smollie

icon
Unsubscribe
icon
Unsubscribe
รายสัปดาห์
 
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
  continue reading
 
Loading …
show series
 
Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/โดย Dimitri
  continue reading
 
'Gelieve rechts aan te houden. Bij de volgende afrit slaat u rechtsaf en - WHAT THE FUCK WIE HEEFT HIER PLOTS EEN TRAP GEZET? Kijk nu, heel je wagen aan frieten. En je arm is gebroken, zeg je? OK, ik weet dat je me nu niet meer vertrouwt, maar ik ken iemand met een zeer goede zorgverzekering, die je wel kan helpen. Echt waar, hij is zelfs vrienden …
  continue reading
 
Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/โดย Dimitri
  continue reading
 
Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/โดย Dimitri
  continue reading
 
Closing talk of Hackerhotel 2025 with NFIR CTF award ceremony.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.hackerhotel.nl/2025/talk/YBZVUM/โดย Dimitri
  continue reading
 
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of othe…
  continue reading
 
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of othe…
  continue reading
 
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of othe…
  continue reading
 
The internet cleanup foundation publishes the baseline security of 150.000 domains of 10.000 important organizations in the Netherlands. This talk shows what we've done in 2024 and highlights some of the nice things to come in 2025 maybe spoiling one or two things :) - It had a ton of impact and large banks, internet providers and all kinds of othe…
  continue reading
 
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid risin…
  continue reading
 
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid risin…
  continue reading
 
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid risin…
  continue reading
 
Operational Technology (OT) is vital for industrial processes, yet strategic understanding of OT’s security complexity is often lacking at the executive level. This presentation emphasizes the need for organizations to approach OT as a strategic priority, highlighting its unique challenges—such as legacy systems and non-negotiable uptime—amid risin…
  continue reading
 
Our workflow, challenges and other fun thingsFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yi…
  continue reading
 
Our workflow, challenges and other fun thingsFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yi…
  continue reading
 
Our workflow, challenges and other fun thingsFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yi…
  continue reading
 
Our workflow, challenges and other fun thingsFrom the lands where badges and brooches grow on trees, a mythical folk of badge herders live peacefully and in harmony with nature and technology. They love providing humans with their seasonal harvest at Hacker events such as Hacker Hotel. We expect them to show up to tell you all about this seasons yi…
  continue reading
 
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy syst…
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy syst…
  continue reading
 
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy syst…
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
This talk will take you along with a deep dive on how the internet works at its core and how you can participate yourself. You'll learn all about BGP, AS- numbers, IP-prefixes and more.Ever wanted to become sovereign on the internet? Want to know what its like to run an ISP? Are you a sysadmin that wants to learn more about networking? Then you're …
  continue reading
 
The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy syst…
  continue reading
 
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je al…
  continue reading
 
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:- A recap of the physics that makes fusion work- How to build a fusion reactor at home- How nuclei collide and what is needed to the coulomb barrier- Challenges in how to scale it up and make it generate more power - How far a…
  continue reading
 
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.In teams werk je aan een intrigerende zaa…
  continue reading
 
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:- A recap of the physics that makes fusion work- How to build a fusion reactor at home- How nuclei collide and what is needed to the coulomb barrier- Challenges in how to scale it up and make it generate more power - How far a…
  continue reading
 
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je al…
  continue reading
 
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:- A recap of the physics that makes fusion work- How to build a fusion reactor at home- How nuclei collide and what is needed to the coulomb barrier- Challenges in how to scale it up and make it generate more power - How far a…
  continue reading
 
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je al…
  continue reading
 
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.In teams werk je aan een intrigerende zaa…
  continue reading
 
Nuclear fusion is a clean safe energy. Fusing hydrogen nuclei to release an enormous amount of energy. This talk will cover:- A recap of the physics that makes fusion work- How to build a fusion reactor at home- How nuclei collide and what is needed to the coulomb barrier- Challenges in how to scale it up and make it generate more power - How far a…
  continue reading
 
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.In teams werk je aan een intrigerende zaa…
  continue reading
 
Wat je als 𝘏𝘰𝘮𝘰 𝘊𝘺𝘣𝘦𝘳𝘯𝘦𝘵𝘪𝘤𝘶𝘴 altijd al hebt willen weten: hoe krijg je het voor elkaar dat de 𝘏𝘰𝘮𝘰 𝘖𝘳𝘥𝘪𝘯𝘢𝘳𝘪𝘶s (= niet hackende mens) ein-de-lijk het belang van jouw werk inziet en een beetje meewerkt.Strijk neer op je handdoek en leun achterover, want deze zondagmiddag (Don't Panic. Time is an illusion.) nemen Roxane Kortland en ik je mee hoe je al…
  continue reading
 
Tijdens Hacker Hotel krijg je de unieke kans om deel te nemen aan Operation Check Mate, een meeslepende interactieve ervaring waarin je zelf in de schoenen van een rechercheur staat. Deze game is ontwikkeld door experts uit het veld en biedt een fascinerende inkijk in de wereld van strafrechtelijk onderzoek.In teams werk je aan een intrigerende zaa…
  continue reading
 
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speakerParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive fo…
  continue reading
 
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speakerParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive fo…
  continue reading
 
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speakerParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive fo…
  continue reading
 
In this talk I will show you the theory behind parametric arrays what is involved in making your own low-cost directional speakerParametric speakers are extremely directional speakers that produce audible sound by modulating an audible signal on top of an ultrasonic carrier. Commercial options have existed for a long time but are quite expensive fo…
  continue reading
 
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included.This presentat…
  continue reading
 
What is an LLM? Can you run it yourself? Can you hack it?This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself.Key…
  continue reading
 
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included.This presentat…
  continue reading
 
It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people t…
  continue reading
 
It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people t…
  continue reading
 
It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport.It's one thing to plan a vacation trip to Cancun if you have a Dutch passport. It's entirely another to find a way to safety if you have an Egyptian passport. We are experts in moving people t…
  continue reading
 
What is an LLM? Can you run it yourself? Can you hack it?This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself.Key…
  continue reading
 
What is an LLM? Can you run it yourself? Can you hack it?This session will explain high-level how an LLM works, how you can run this yourself (maybe for privacy reasons), Coding with LLMs and the hacking possibilities of these AI systems. Expect many demos and hopefully useful tips and tricks, so you can directly try all this stuff out yourself.Key…
  continue reading
 
The Dutch Tax and Customs Administration deals with criminals claiming to be representatives of the organization and contacting the public with phishing emails daily. In this presentation, we will take you into the world of the criminals sending phishing emails and the recipients of the phishing mail. A live phishing demo is included.This presentat…
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน

ฟังรายการนี้ในขณะที่คุณสำรวจ
เล่น