Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/cdn.media.ccc.de/congress/2002/lectures/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
MD5SUM3.9 KiB2003-08-31 13:08:04
19C3-429-abschlussveranstaltung.mp311.8 MiB2003-08-31 13:05:46
19C3-481-raketen-basteln.mp312.4 MiB2003-08-31 13:04:21
19C3-449-smartcards-sosse.mp314.1 MiB2003-08-31 13:05:00
19C3-478-ipv6.mp314.3 MiB2003-08-31 13:04:32
19C3-428-eroeffnung.mp314.5 MiB2003-08-31 13:05:49
19C3-518-angriff-der-mensch-maschine-schnittstelle.mp314.6 MiB2003-08-31 13:03:35
19C3-463-rsa-padding-angriffe.mp315.0 MiB2003-08-31 13:04:44
19C3-408-next-generation-operations-support-systems.mp315.6 MiB2003-08-31 13:06:44
19C3-414-kuenstliche-unintelligenz.mp315.7 MiB2003-08-31 13:06:08
19C3-445-forensik-schluesselspuren.mp315.7 MiB2003-08-31 13:05:07
19C3-461-noc-review.mp315.8 MiB2003-08-31 13:04:47
19C3-396-videorendering-cluster.mp316.0 MiB2003-08-31 13:07:20
19C3-440-pop-culture-and-media-hacking.mp316.7 MiB2003-08-31 13:05:25
19C3-404-unscharfe-kryptografische-fingerabdruecke.mp317.5 MiB2003-08-31 13:06:53
19C3-489-big-brother-awards.mp318.8 MiB2003-08-31 13:04:05
19C3-506-detecting-ddos-attacks.mp318.8 MiB2003-08-31 13:03:43
19C3-521-big-brother-awards-discussion.mp318.8 MiB2003-08-31 13:03:34
19C3-413-aes-attacks.mp319.0 MiB2003-08-31 13:06:13
19C3-386-spam-prevention.mp319.6 MiB2003-08-31 13:07:42
19C3-464-stego-analyse.mp319.6 MiB2003-08-31 13:04:41
19C3-467-buergernetze.mp319.8 MiB2003-08-31 13:04:37
19C3-381-blinkenlights-arcade.mp319.8 MiB2003-08-31 13:07:53
19C3-415-biometrie.mp319.9 MiB2003-08-31 13:06:05
19C3-500-c-optimizations.mp320.3 MiB2003-08-31 13:03:48
19C3-495-sctp.mp320.4 MiB2003-08-31 13:03:57
19C3-412-lockpicking.mp320.5 MiB2003-08-31 13:06:19
19C3-480-one-time-crypto.mp320.7 MiB2003-08-31 13:04:25
19C3-494-x86_64-ia64-architecture.mp320.9 MiB2003-08-31 13:04:01
19C3-400-ipv6-rapid-deployment.mp321.0 MiB2003-08-31 13:07:09
19C3-391-wikipedia.mp321.0 MiB2003-08-31 13:07:31
19C3-374-ccc-geschichte.mp321.0 MiB2003-08-31 13:08:04
19C3-448-zero-tool-hacking.mp322.0 MiB2003-08-31 13:05:05
19C3-488-symbolics-lisp-machines.mp322.1 MiB2003-08-31 13:04:10
19C3-401-network-hijacking.mp322.2 MiB2003-08-31 13:07:03
19C3-430-icann-status-quo.mp322.4 MiB2003-08-31 13:05:44
19C3-498-freedom-cpu.mp322.4 MiB2003-08-31 13:03:53
19C3-508-amateurfunk.mp322.5 MiB2003-08-31 13:03:39
19C3-452-perl.mp322.5 MiB2003-08-31 13:04:57
19C3-442-lawful-interception-europe.mp323.7 MiB2003-08-31 13:05:21
19C3-433-tcp-ip-fuer-anfaenger.mp324.3 MiB2003-08-31 13:05:35
19C3-434-security-nightmares.mp324.8 MiB2003-08-31 13:05:30
19C3-409-call-center.mp324.9 MiB2003-08-31 13:06:40
19C3-426-ec-karten-unsicherheit.mp325.3 MiB2003-08-31 13:05:54
19C3-479-eu-urheberrechtslinie.mp325.4 MiB2003-08-31 13:04:30
19C3-483-bsi-zertifizierung.mp325.5 MiB2003-08-31 13:04:17
19C3-432-sicherheit-zeitliche-dimension.mp328.0 MiB2003-08-31 13:05:40
19C3-406-chipkarten-und-ueberwachung.mp329.8 MiB2003-08-31 13:06:49
19C3-453-die-fuenf-pforten-der-manipulation.mp330.7 MiB2003-08-31 13:04:53
19C3-402-network-hijacking-workshop.mp335.2 MiB2003-08-31 13:06:59
19C3-388-attacking-networked-embedded-systems.mp335.8 MiB2003-08-31 13:07:38
19C3-380-computer-und-videogame-producer.mp336.6 MiB2003-08-31 13:08:00
19C3-392-codeflow-analyse.mp339.2 MiB2003-08-31 13:07:28
19C3-424-beopardy.mp340.1 MiB2003-08-31 13:06:01
19C3-382-quantenkryptographie.mp341.9 MiB2003-08-31 13:07:50
19C3-443-how-to-find-anything-on-the-web.mp344.8 MiB2003-08-31 13:05:16
19C3-366-tcpa.mp346.6 MiB2003-08-31 13:03:33
19C3-517-eu-data-retention.mp347.0 MiB2003-08-31 13:03:37
19C3-399-xbox-linux.mp349.4 MiB2003-08-31 13:07:18
19C3-411-patent-party.mp363.1 MiB2003-08-31 13:06:35