Parent directory/ | - | - |
26c3-3266-de-hacking_the_universe.mp3 | 28.2 MiB | 2010-01-03 10:20:41 |
26c3-3266-de-hacking_the_universe.mp3.md5 | 72 B | 2010-01-03 10:25:27 |
26c3-3302-en-i_internet.mp3 | 20.5 MiB | 2009-12-30 10:22:40 |
26c3-3302-en-i_internet.mp3.md5 | 62 B | 2010-01-01 21:28:06 |
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp3 | 58.8 MiB | 2009-12-29 23:39:40 |
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon_.mp3.md5 | 110 B | 2010-01-01 21:28:10 |
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp3 | 18.2 MiB | 2010-01-15 08:35:34 |
26c3-3340-de-wolpertinger_ein_verteilter_portscanner.mp3.md5 | 91 B | 2010-01-15 08:41:56 |
26c3-3350-en-milkymist.mp3 | 19.1 MiB | 2010-01-07 08:35:06 |
26c3-3350-en-milkymist.mp3.md5 | 61 B | 2010-01-07 09:14:29 |
26c3-3353-de-reverse-engineering_displaylink_devices.mp3 | 16.9 MiB | 2010-01-08 08:54:28 |
26c3-3353-de-reverse-engineering_displaylink_devices.mp3.md5 | 91 B | 2010-01-08 08:54:48 |
26c3-3452-en-here_be_electric_dragons.mp3 | 27.3 MiB | 2009-12-29 22:24:07 |
26c3-3452-en-here_be_electric_dragons.mp3.md5 | 76 B | 2010-01-01 21:28:12 |
26c3-3464-de-liquid_democracy.mp3 | 28.8 MiB | 2010-01-06 18:33:15 |
26c3-3464-de-liquid_democracy.mp3.md5 | 68 B | 2010-01-06 18:35:40 |
26c3-3468-de-privacy__stylometry.mp3 | 26.6 MiB | 2009-12-29 21:13:21 |
26c3-3468-de-privacy__stylometry.mp3.md5 | 71 B | 2010-01-01 21:28:14 |
26c3-3481-de-leyen-rhetorik.mp3 | 28.0 MiB | 2010-01-07 23:25:35 |
26c3-3481-de-leyen-rhetorik.mp3.md5 | 66 B | 2010-01-08 08:53:03 |
26c3-3490-en-building_a_debugger.mp3 | 25.2 MiB | 2009-12-30 13:57:35 |
26c3-3490-en-building_a_debugger.mp3.md5 | 71 B | 2010-01-01 21:28:18 |
26c3-3494-de-defending_the_poor.mp3 | 32.6 MiB | 2009-12-30 14:10:48 |
26c3-3494-de-defending_the_poor.mp3.md5 | 70 B | 2010-01-01 21:28:20 |
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp3 | 18.7 MiB | 2009-12-30 10:20:00 |
26c3-3496-de-fugngernavigation_mit_augmented_reality.mp3.md5 | 91 B | 2010-01-01 21:28:21 |
26c3-3501-en-why_net_neutrality_matters.mp3 | 26.2 MiB | 2010-01-06 19:19:43 |
26c3-3501-en-why_net_neutrality_matters.mp3.md5 | 78 B | 2010-01-06 19:21:08 |
26c3-3504-en-our_darknet_and_its_bright_spots.mp3 | 23.7 MiB | 2010-01-03 09:42:42 |
26c3-3504-en-our_darknet_and_its_bright_spots.mp3.md5 | 84 B | 2010-01-03 09:47:53 |
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp3 | 18.5 MiB | 2010-01-03 02:15:56 |
26c3-3507-de-fuzzing_the_phone_in_your_phone.mp3.md5 | 83 B | 2010-01-03 02:16:31 |
26c3-3509-de-wofr_offenes_internet.mp3 | 25.1 MiB | 2010-01-16 17:26:52 |
26c3-3509-de-wofr_offenes_internet.mp3.md5 | 73 B | 2010-01-16 17:34:05 |
26c3-3510-de-technik_des_neuen_epa.mp3 | 27.3 MiB | 2009-12-30 11:09:55 |
26c3-3510-de-technik_des_neuen_epa.mp3.md5 | 73 B | 2010-01-01 21:28:24 |
26c3-3515-de-secubt.mp3 | 26.0 MiB | 2009-12-30 14:14:00 |
26c3-3515-de-secubt.mp3.md5 | 58 B | 2010-01-01 21:28:26 |
26c3-3520-en-conlanging_101.mp3 | 33.6 MiB | 2010-01-03 09:44:17 |
26c3-3520-en-conlanging_101.mp3.md5 | 66 B | 2010-01-03 09:47:54 |
26c3-3523-de-eine_zensur_findet_statt.mp3 | 24.7 MiB | 2009-12-29 19:41:38 |
26c3-3523-de-eine_zensur_findet_statt.mp3.md5 | 76 B | 2010-01-01 21:28:30 |
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp3 | 27.2 MiB | 2009-12-30 09:53:20 |
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets.mp3.md5 | 93 B | 2010-01-01 21:28:32 |
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp3 | 24.1 MiB | 2009-12-30 09:46:52 |
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities.mp3.md5 | 101 B | 2010-01-01 21:28:34 |
26c3-3540-en-a_hackers_utopia.mp3 | 29.2 MiB | 2009-12-30 10:46:37 |
26c3-3540-en-a_hackers_utopia.mp3.md5 | 68 B | 2010-01-01 21:28:37 |
26c3-3547-en-after_the_hype.mp3 | 27.5 MiB | 2010-01-03 10:19:39 |
26c3-3547-en-after_the_hype.mp3.md5 | 66 B | 2010-01-03 10:25:35 |
26c3-3550-de-chaos-familien-duell.mp3 | 54.0 MiB | 2010-01-03 10:24:51 |
26c3-3550-de-chaos-familien-duell.mp3.md5 | 72 B | 2010-01-03 10:25:38 |
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp3 | 26.7 MiB | 2009-12-30 17:07:25 |
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography.mp3.md5 | 113 B | 2010-01-01 21:28:42 |
26c3-3554-de-tor_and_censorship_lessons_learned.mp3 | 29.1 MiB | 2009-12-29 20:08:38 |
26c3-3554-de-tor_and_censorship_lessons_learned.mp3.md5 | 86 B | 2010-01-01 21:28:44 |
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp3 | 26.0 MiB | 2009-12-29 23:20:55 |
26c3-3555-en-sccp_hacking_attacking_the_ss7_and_sigtran_applications_one_step_further_and_mapping_the_phone_system.mp3.md5 | 153 B | 2010-01-07 18:17:08 |
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp3 | 27.0 MiB | 2010-01-15 13:25:07 |
26c3-3557-de-vom_kreationismus_zum_kollektivismus.mp3.md5 | 88 B | 2010-01-15 13:32:31 |
26c3-3563-en-lightning_talks_-_day_1.mp3 | 54.1 MiB | 2010-01-06 18:33:23 |
26c3-3563-en-lightning_talks_-_day_1.mp3.md5 | 75 B | 2010-01-06 18:35:44 |
26c3-3567-en-wikileaks_release_10.mp3 | 28.7 MiB | 2009-12-30 09:38:27 |
26c3-3567-en-wikileaks_release_10.mp3.md5 | 72 B | 2010-01-01 21:28:48 |
26c3-3570-en-weaponizing_cultural_viruses.mp3 | 31.0 MiB | 2009-12-30 11:57:58 |
26c3-3570-en-weaponizing_cultural_viruses.mp3.md5 | 80 B | 2010-01-01 21:28:51 |
26c3-3573-en-playing_with_the_built_city.mp3 | 27.6 MiB | 2009-12-30 01:26:35 |
26c3-3573-en-playing_with_the_built_city.mp3.md5 | 79 B | 2010-01-01 21:28:54 |
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp3 | 23.7 MiB | 2009-12-30 09:35:39 |
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem.mp3.md5 | 112 B | 2010-01-01 21:28:56 |
26c3-3577-de-privacy-enhanced_event_scheduling.mp3 | 27.1 MiB | 2009-12-30 11:25:03 |
26c3-3577-de-privacy-enhanced_event_scheduling.mp3.md5 | 85 B | 2010-01-01 21:28:58 |
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp3 | 23.8 MiB | 2010-01-03 09:40:32 |
26c3-3579-en-photography_and_the_art_of_doing_it_wrong.mp3.md5 | 93 B | 2010-01-03 09:47:55 |
26c3-3590-de-europische_biometriestrategien.mp3 | 29.5 MiB | 2009-12-30 10:30:11 |
26c3-3590-de-europische_biometriestrategien.mp3.md5 | 82 B | 2010-01-01 21:29:01 |
26c3-3592-de-cybernetic_cannibalism.mp3 | 28.6 MiB | 2009-12-30 09:36:41 |
26c3-3592-de-cybernetic_cannibalism.mp3.md5 | 74 B | 2010-01-01 21:29:03 |
26c3-3594-de-internetsperren.mp3 | 21.1 MiB | 2009-12-29 19:49:44 |
26c3-3594-de-internetsperren.mp3.md5 | 67 B | 2010-01-01 21:29:05 |
26c3-3596-de-cat_procsysnetipv4fuckups.mp3 | 19.1 MiB | 2009-12-29 20:26:26 |
26c3-3596-de-cat_procsysnetipv4fuckups.mp3.md5 | 77 B | 2010-01-01 21:29:07 |
26c3-3600-de-location_tracking_does_scale_up.mp3 | 26.9 MiB | 2009-12-30 10:37:39 |
26c3-3600-de-location_tracking_does_scale_up.mp3.md5 | 83 B | 2010-01-01 21:29:09 |
26c3-3608-en-playing_with_the_gsm_rf_interface.mp3 | 21.8 MiB | 2010-01-08 13:01:56 |
26c3-3608-en-playing_with_the_gsm_rf_interface.mp3.md5 | 85 B | 2010-01-08 13:04:56 |
26c3-3613-de-fnord-jahresrckblick_2009.mp3 | 35.8 MiB | 2010-01-15 08:50:38 |
26c3-3613-de-fnord-jahresrckblick_2009.mp3.md5 | 77 B | 2010-01-15 08:56:57 |
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp3 | 30.9 MiB | 2009-12-30 14:10:32 |
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd.mp3.md5 | 94 B | 2010-01-01 21:29:11 |
26c3-3631-en-finding_the_key_in_the_haystack.mp3 | 23.0 MiB | 2010-01-06 18:33:32 |
26c3-3631-en-finding_the_key_in_the_haystack.mp3.md5 | 83 B | 2010-01-06 18:35:46 |
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp3 | 19.9 MiB | 2009-12-30 10:29:52 |
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution.mp3.md5 | 99 B | 2010-01-01 21:29:13 |
26c3-3642-en-lightning_talks_-_day_2.mp3 | 60.4 MiB | 2009-12-29 21:12:27 |
26c3-3642-en-lightning_talks_-_day_2.mp3.md5 | 75 B | 2010-01-01 21:29:19 |
26c3-3644-en-lightning_talks_-_day_3.mp3 | 62.2 MiB | 2009-12-30 14:11:11 |
26c3-3644-en-lightning_talks_-_day_3.mp3.md5 | 75 B | 2010-01-01 21:29:28 |
26c3-3645-en-lightning_talks_-_day_4.mp3 | 64.3 MiB | 2010-01-03 10:37:50 |
26c3-3645-en-lightning_talks_-_day_4.mp3.md5 | 75 B | 2010-01-03 10:40:05 |
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp3 | 28.7 MiB | 2009-12-29 23:43:28 |
26c3-3647-de-ckan_apt-get_for_the_debian_of_data.mp3.md5 | 87 B | 2010-01-01 21:29:30 |
26c3-3648-en-dect_part_ii.mp3 | 28.0 MiB | 2009-12-30 09:39:38 |
26c3-3648-en-dect_part_ii.mp3.md5 | 64 B | 2010-01-01 21:29:32 |
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp3 | 22.2 MiB | 2009-12-30 01:08:40 |
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported.mp3.md5 | 120 B | 2010-01-01 21:29:34 |
26c3-3654-en-gsm_srsly.mp3 | 31.6 MiB | 2009-12-29 20:03:49 |
26c3-3654-en-gsm_srsly.mp3.md5 | 61 B | 2010-01-01 21:29:36 |
26c3-3657-en-optimised_to_fail.mp3 | 27.1 MiB | 2010-02-09 18:44:17 |
26c3-3657-en-optimised_to_fail.mp3.md5 | 69 B | 2010-02-09 18:44:20 |
26c3-3658-en-black_ops_of_pki.mp3 | 35.9 MiB | 2010-01-06 19:16:46 |
26c3-3658-en-black_ops_of_pki.mp3.md5 | 68 B | 2010-01-06 19:21:33 |
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp3 | 32.2 MiB | 2010-01-23 20:17:42 |
26c3-3661-de-coreboot_adding_support_for_a_system_near_you.mp3.md5 | 97 B | 2010-01-23 20:18:43 |
26c3-3664-en-homewreckery.mp3 | 19.0 MiB | 2009-12-30 09:35:18 |
26c3-3664-en-homewreckery.mp3.md5 | 64 B | 2010-01-01 21:29:43 |
26c3-3668-en-hacker_jeopardy.mp3 | 58.2 MiB | 2010-01-15 09:20:45 |
26c3-3668-en-hacker_jeopardy.mp3.md5 | 67 B | 2010-01-15 09:27:00 |
26c3-3669-de-hacker_jeopardy.mp3 | 57.8 MiB | 2010-01-03 11:39:45 |
26c3-3669-de-hacker_jeopardy.mp3.md5 | 67 B | 2010-01-03 11:43:45 |
26c3-3670-en-blackbox_jtag_reverse_engineering.mp3 | 25.8 MiB | 2010-01-03 10:54:05 |
26c3-3670-en-blackbox_jtag_reverse_engineering.mp3.md5 | 85 B | 2010-01-03 10:55:33 |
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp3 | 41.6 MiB | 2009-12-30 14:11:24 |
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo.mp3.md5 | 98 B | 2010-01-01 21:29:47 |
26c3-3672-de-advanced_microcontroller_programming.mp3 | 23.5 MiB | 2009-12-29 21:14:07 |
26c3-3672-de-advanced_microcontroller_programming.mp3.md5 | 88 B | 2010-01-01 21:29:49 |
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp3 | 29.2 MiB | 2009-12-29 19:38:40 |
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht.mp3.md5 | 101 B | 2010-01-01 21:29:51 |
26c3-3685-de-im_herz_der_bestie.mp3 | 23.7 MiB | 2010-01-03 10:53:24 |
26c3-3685-de-im_herz_der_bestie.mp3.md5 | 70 B | 2010-01-03 10:55:35 |
26c3-3687-de-security_nightmares.mp3 | 39.1 MiB | 2010-01-02 22:14:58 |
26c3-3687-de-security_nightmares.mp3.md5 | 71 B | 2010-01-02 22:15:23 |
26c3-3688-de-haste_man_netblock.mp3 | 14.7 MiB | 2009-12-30 16:55:11 |
26c3-3688-de-haste_man_netblock.mp3.md5 | 70 B | 2010-01-01 21:29:53 |
26c3-3690-de-ccc-jahresrckblick.mp3 | 40.0 MiB | 2009-12-30 09:36:29 |
26c3-3690-de-ccc-jahresrckblick.mp3.md5 | 70 B | 2010-01-01 21:29:56 |
26c3-3691-de-vier_fuste_fr_ein_halleluja.mp3 | 24.7 MiB | 2010-01-07 09:07:37 |
26c3-3691-de-vier_fuste_fr_ein_halleluja.mp3.md5 | 79 B | 2010-01-07 09:16:04 |
26c3-3696-en-wireless_power_transfer.mp3 | 27.3 MiB | 2009-12-30 09:39:54 |
26c3-3696-en-wireless_power_transfer.mp3.md5 | 75 B | 2010-01-01 21:29:59 |
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp3 | 63.8 MiB | 2010-01-03 10:21:44 |
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht.mp3.md5 | 88 B | 2010-01-03 10:25:58 |
26c3-3700-de-here_be_dragons.mp3 | 22.5 MiB | 2009-12-30 09:35:53 |
26c3-3700-de-here_be_dragons.mp3.md5 | 67 B | 2010-01-01 21:30:01 |
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp3 | 25.4 MiB | 2009-12-30 10:18:30 |
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology.mp3.md5 | 100 B | 2010-01-01 21:30:03 |
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp3 | 20.4 MiB | 2009-12-29 20:01:36 |
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering.mp3.md5 | 100 B | 2010-01-01 21:30:05 |
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp3 | 38.9 MiB | 2010-01-07 09:07:43 |
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen.mp3.md5 | 90 B | 2010-01-07 09:16:23 |
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp3 | 24.4 MiB | 2010-01-07 07:58:47 |
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp3.md5 | 125 B | 2010-01-07 08:01:09 |
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp3 | 27.6 MiB | 2010-01-15 12:54:39 |
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung.mp3.md5 | 95 B | 2010-01-15 13:01:50 |
26c3-3709-en-legic_prime_obscurity_in_depth.mp3 | 28.5 MiB | 2010-01-07 08:37:47 |
26c3-3709-en-legic_prime_obscurity_in_depth.mp3.md5 | 82 B | 2010-01-07 09:16:27 |
26c3-3710-en-the_lost_cosmonauts.mp3 | 22.4 MiB | 2009-12-30 09:42:33 |
26c3-3710-en-the_lost_cosmonauts.mp3.md5 | 71 B | 2010-01-01 21:30:09 |
26c3-3711-de-computerspielepolitik.mp3 | 32.6 MiB | 2009-12-29 19:53:27 |
26c3-3711-de-computerspielepolitik.mp3.md5 | 73 B | 2010-01-01 21:30:11 |
26c3-3713-de-unbild__pictures_and_non-pictures.mp3 | 27.7 MiB | 2009-12-30 16:29:14 |
26c3-3713-de-unbild__pictures_and_non-pictures.mp3.md5 | 85 B | 2010-01-01 21:30:14 |
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp3 | 30.0 MiB | 2009-12-29 22:18:39 |
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes.mp3.md5 | 146 B | 2010-01-01 21:30:16 |
26c3-3717-en-closing_event.mp3 | 15.6 MiB | 2010-01-03 12:30:57 |
26c3-3717-en-closing_event.mp3.md5 | 65 B | 2010-01-03 12:34:38 |
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp3 | 28.7 MiB | 2009-12-30 09:35:29 |
26c3-3721-de-etsi-vorratsdatenspeicherung_2009.mp3.md5 | 85 B | 2010-01-01 21:30:19 |
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp3 | 36.1 MiB | 2010-01-07 07:59:01 |
26c3-3723-en-stream_fnord-jahresrckblick_2009.mp3.md5 | 84 B | 2010-01-07 08:01:23 |
26c3-3725-en-stream_security_nightmares.mp3 | 39.1 MiB | 2010-01-03 09:32:23 |
26c3-3725-en-stream_security_nightmares.mp3.md5 | 78 B | 2010-01-03 09:48:23 |