Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/cdn.media.ccc.de/congress/2008/audio_only/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
25c3-2596-en-swf_and_the_malware_tragedy.mp322.1 MiB2009-01-11 21:42:11
25c3-2596-en-swf_and_the_malware_tragedy.mp3.md579 B2009-01-11 21:42:07
25c3-2596-en-swf_and_the_malware_tragedy.ogg19.7 MiB2009-01-11 21:42:40
25c3-2596-en-swf_and_the_malware_tragedy.ogg.md579 B2009-01-11 21:42:07
25c3-2639-en-attacking_nfc_mobile_phones.mp337.5 MiB2009-01-12 01:38:53
25c3-2639-en-attacking_nfc_mobile_phones.mp3.md579 B2009-01-12 01:38:50
25c3-2639-en-attacking_nfc_mobile_phones.ogg33.5 MiB2009-01-12 01:39:35
25c3-2639-en-attacking_nfc_mobile_phones.ogg.md579 B2009-01-12 01:38:50
25c3-2665-en-the_trust_situation.mp327.7 MiB2008-12-29 12:25:58
25c3-2665-en-the_trust_situation.mp3.md571 B2009-01-06 20:21:10
25c3-2665-en-the_trust_situation.ogg24.7 MiB2008-12-29 15:36:19
25c3-2665-en-the_trust_situation.ogg.md571 B2009-01-06 20:21:10
25c3-2669-en-collapsing_the_european_security_architecture.mp326.7 MiB2009-01-12 01:38:55
25c3-2669-en-collapsing_the_european_security_architecture.mp3.md597 B2009-01-12 01:38:50
25c3-2669-en-collapsing_the_european_security_architecture.ogg23.8 MiB2009-01-12 01:39:38
25c3-2669-en-collapsing_the_european_security_architecture.ogg.md597 B2009-01-12 01:38:50
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp327.4 MiB2008-12-29 02:11:38
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3.md5119 B2009-01-06 20:21:10
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg24.4 MiB2008-12-29 13:53:39
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg.md5119 B2009-01-06 20:21:10
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp321.9 MiB2009-01-06 20:42:09
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp3.md5138 B2009-01-06 20:41:52
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg19.5 MiB2009-01-06 20:46:15
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg.md5138 B2009-01-06 20:41:53
25c3-2681-en-repurposing_the_ti_ez430u.mp315.2 MiB2008-12-29 23:06:15
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md577 B2009-01-06 20:21:10
25c3-2681-en-repurposing_the_ti_ez430u.ogg13.6 MiB2008-12-30 01:51:05
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md577 B2009-01-06 20:21:10
25c3-2734-en-short_attention_span_security.mp324.4 MiB2009-01-12 01:38:58
25c3-2734-en-short_attention_span_security.mp3.md581 B2009-01-12 01:38:50
25c3-2734-en-short_attention_span_security.ogg21.8 MiB2009-01-12 01:39:39
25c3-2734-en-short_attention_span_security.ogg.md581 B2009-01-12 01:38:50
25c3-2773-en-soviet_unterzoegersdorf.mp335.8 MiB2008-12-29 23:20:16
25c3-2773-en-soviet_unterzoegersdorf.mp3.md575 B2009-01-06 20:21:10
25c3-2773-en-soviet_unterzoegersdorf.ogg31.9 MiB2008-12-30 01:47:37
25c3-2773-en-soviet_unterzoegersdorf.ogg.md575 B2009-01-06 20:21:10
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp316.4 MiB2009-01-12 01:38:59
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp3.md591 B2009-01-12 01:38:50
25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg14.6 MiB2009-01-12 01:39:41
25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg.md591 B2009-01-12 01:38:50
25c3-2781-en-objects_as_software_the_coming_revolution.mp323.7 MiB2009-01-11 21:42:13
25c3-2781-en-objects_as_software_the_coming_revolution.mp3.md593 B2009-01-11 21:42:07
25c3-2781-en-objects_as_software_the_coming_revolution.ogg21.1 MiB2009-01-11 21:42:42
25c3-2781-en-objects_as_software_the_coming_revolution.ogg.md593 B2009-01-11 21:42:07
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp330.2 MiB2009-01-06 20:42:19
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp3.md5106 B2009-01-06 20:41:53
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg26.9 MiB2009-01-06 20:46:22
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg.md5106 B2009-01-06 20:41:53
25c3-2799-en-console_hacking_2008_wii_fail.mp325.8 MiB2008-12-29 15:38:20
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md581 B2009-01-06 20:21:10
25c3-2799-en-console_hacking_2008_wii_fail.ogg23.0 MiB2008-12-29 13:53:30
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md581 B2009-01-06 20:21:10
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp329.9 MiB2008-12-29 13:16:03
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3.md5102 B2009-01-06 20:21:10
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg26.7 MiB2008-12-29 13:16:14
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg.md5102 B2009-01-06 20:21:10
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp323.6 MiB2009-01-22 23:28:47
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3.md598 B2009-01-22 23:28:46
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg21.0 MiB2009-01-22 23:28:50
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg.md598 B2009-01-22 23:28:46
25c3-2812-de-fnord_news_show.mp322.9 MiB2008-12-29 22:08:57
25c3-2812-de-fnord_news_show.mp3.md567 B2009-01-06 20:21:10
25c3-2812-de-fnord_news_show.ogg20.4 MiB2008-12-29 22:08:48
25c3-2812-de-fnord_news_show.ogg.md567 B2009-01-06 20:21:10
25c3-2814-de-datenpannen.mp324.1 MiB2008-12-29 15:12:20
25c3-2814-de-datenpannen.mp3.md563 B2009-01-06 20:21:10
25c3-2814-de-datenpannen.ogg21.5 MiB2008-12-29 15:16:49
25c3-2814-de-datenpannen.ogg.md563 B2009-01-06 20:21:10
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp322.5 MiB2008-12-29 15:10:27
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3.md583 B2009-01-06 20:21:10
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg20.0 MiB2008-12-29 15:21:29
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg.md583 B2009-01-06 20:21:10
25c3-2816-en-cisco_ios_attack_and_defense.mp330.2 MiB2009-01-06 20:42:32
25c3-2816-en-cisco_ios_attack_and_defense.mp3.md580 B2009-01-06 20:41:53
25c3-2816-en-cisco_ios_attack_and_defense.ogg25.0 MiB2009-01-06 20:46:30
25c3-2816-en-cisco_ios_attack_and_defense.ogg.md580 B2009-01-06 20:41:53
25c3-2827-de-u23.mp322.7 MiB2008-12-29 23:19:55
25c3-2827-de-u23.mp3.md555 B2009-01-06 20:21:10
25c3-2827-de-u23.ogg20.3 MiB2008-12-30 01:46:21
25c3-2827-de-u23.ogg.md555 B2009-01-06 20:21:10
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp320.1 MiB2009-01-07 23:08:58
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp3.md586 B2009-01-07 23:08:42
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg17.9 MiB2009-01-07 23:09:59
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg.md586 B2009-01-07 23:08:42
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp316.8 MiB2009-01-06 20:42:41
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp3.md599 B2009-01-06 20:41:53
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg15.0 MiB2009-01-06 20:46:35
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg.md599 B2009-01-06 20:41:53
25c3-2832-en-exploiting_symbian.mp328.7 MiB2008-12-29 14:22:38
25c3-2832-en-exploiting_symbian.mp3.md570 B2009-01-06 20:21:10
25c3-2832-en-exploiting_symbian.ogg25.6 MiB2008-12-29 14:22:50
25c3-2832-en-exploiting_symbian.ogg.md570 B2009-01-06 20:21:10
25c3-2839-en-cracking_the_msp430_bsl.mp317.0 MiB2008-12-29 15:08:57
25c3-2839-en-cracking_the_msp430_bsl.mp3.md575 B2009-01-06 20:21:10
25c3-2839-en-cracking_the_msp430_bsl.ogg15.2 MiB2008-12-29 13:24:17
25c3-2839-en-cracking_the_msp430_bsl.ogg.md575 B2009-01-06 20:21:10
25c3-2843-en-algorithmic_music_in_a_box.mp323.3 MiB2009-01-07 23:09:12
25c3-2843-en-algorithmic_music_in_a_box.mp3.md578 B2009-01-07 23:08:43
25c3-2843-en-algorithmic_music_in_a_box.ogg20.8 MiB2009-01-07 23:10:08
25c3-2843-en-algorithmic_music_in_a_box.ogg.md578 B2009-01-07 23:08:43
25c3-2845-en-rf_fingerprinting_of_rfid.mp320.3 MiB2008-12-29 14:34:16
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md577 B2009-01-06 20:21:10
25c3-2845-en-rf_fingerprinting_of_rfid.ogg18.1 MiB2008-12-29 13:21:18
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md577 B2009-01-06 20:21:10
25c3-2860-de-neusprech_im_berwachungsstaat.mp332.0 MiB2008-12-30 01:47:14
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md581 B2009-01-06 20:21:10
25c3-2860-de-neusprech_im_berwachungsstaat.ogg28.5 MiB2008-12-30 01:48:05
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md581 B2009-01-06 20:21:10
25c3-2863-en-climate_change_-_state_of_the_science.mp329.5 MiB2009-01-13 16:59:03
25c3-2863-en-climate_change_-_state_of_the_science.mp3.md589 B2009-01-13 16:59:00
25c3-2863-en-climate_change_-_state_of_the_science.ogg26.4 MiB2009-01-13 16:59:17
25c3-2863-en-climate_change_-_state_of_the_science.ogg.md589 B2009-01-13 16:59:00
25c3-2872-en-the_privacy_workshop_project.mp322.0 MiB2008-12-29 23:20:05
25c3-2872-en-the_privacy_workshop_project.mp3.md580 B2009-01-06 20:21:10
25c3-2872-en-the_privacy_workshop_project.ogg19.6 MiB2008-12-30 01:50:51
25c3-2872-en-the_privacy_workshop_project.ogg.md580 B2009-01-06 20:21:10
25c3-2873-en-privacy_in_the_social_semantic_web.mp320.9 MiB2008-12-29 23:02:27
25c3-2873-en-privacy_in_the_social_semantic_web.mp3.md586 B2009-01-06 20:21:10
25c3-2873-en-privacy_in_the_social_semantic_web.ogg18.6 MiB2008-12-30 01:45:27
25c3-2873-en-privacy_in_the_social_semantic_web.ogg.md586 B2009-01-06 20:21:10
25c3-2874-en-the_ultimate_commodore_64_talk.mp327.9 MiB2009-01-11 21:42:15
25c3-2874-en-the_ultimate_commodore_64_talk.mp3.md582 B2009-01-11 21:42:07
25c3-2874-en-the_ultimate_commodore_64_talk.ogg24.9 MiB2009-01-11 21:42:44
25c3-2874-en-the_ultimate_commodore_64_talk.ogg.md582 B2009-01-11 21:42:07
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp321.3 MiB2009-01-07 23:09:26
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp3.md596 B2009-01-07 23:08:43
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg19.0 MiB2009-01-07 23:10:21
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg.md596 B2009-01-07 23:08:43
25c3-2882-en-full-disk-encryption_crash-course.mp321.9 MiB2008-12-29 13:54:29
25c3-2882-en-full-disk-encryption_crash-course.mp3.md585 B2009-01-06 20:21:10
25c3-2882-en-full-disk-encryption_crash-course.ogg19.5 MiB2008-12-29 14:01:42
25c3-2882-en-full-disk-encryption_crash-course.ogg.md585 B2009-01-06 20:21:10
25c3-2890-en-scalable_swarm_robotics.mp317.8 MiB2008-12-29 14:28:26
25c3-2890-en-scalable_swarm_robotics.mp3.md575 B2009-01-06 20:21:11
25c3-2890-en-scalable_swarm_robotics.ogg15.9 MiB2008-12-29 13:19:06
25c3-2890-en-scalable_swarm_robotics.ogg.md575 B2009-01-06 20:21:11
25c3-2892-en-about_cyborgs_and_gargoyles_.mp320.5 MiB2008-12-29 14:11:07
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md580 B2009-01-06 20:21:11
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg18.5 MiB2008-12-29 14:11:17
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md580 B2009-01-06 20:21:11
25c3-2893-en-attacking_rich_internet_applications.mp328.1 MiB2009-01-06 20:42:53
25c3-2893-en-attacking_rich_internet_applications.mp3.md588 B2009-01-06 20:41:53
25c3-2893-en-attacking_rich_internet_applications.ogg25.1 MiB2009-01-06 20:46:44
25c3-2893-en-attacking_rich_internet_applications.ogg.md588 B2009-01-06 20:41:53
25c3-2895-de-der_elektronische_personalausweis.mp327.5 MiB2009-01-11 21:42:18
25c3-2895-de-der_elektronische_personalausweis.mp3.md585 B2009-01-11 21:42:07
25c3-2895-de-der_elektronische_personalausweis.ogg24.5 MiB2009-01-11 21:42:47
25c3-2895-de-der_elektronische_personalausweis.ogg.md585 B2009-01-11 21:42:07
25c3-2896-en-chip_reverse_engineering.mp320.4 MiB2008-12-29 12:17:59
25c3-2896-en-chip_reverse_engineering.mp3.md576 B2009-01-06 20:21:11
25c3-2896-en-chip_reverse_engineering.ogg18.2 MiB2008-12-29 13:07:38
25c3-2896-en-chip_reverse_engineering.ogg.md576 B2009-01-06 20:21:11
25c3-2899-en-mining_social_contacts_with_active_rfid.mp327.0 MiB2009-01-06 20:43:12
25c3-2899-en-mining_social_contacts_with_active_rfid.mp3.md591 B2009-01-06 20:41:53
25c3-2899-en-mining_social_contacts_with_active_rfid.ogg24.0 MiB2009-01-06 20:46:57
25c3-2899-en-mining_social_contacts_with_active_rfid.ogg.md591 B2009-01-06 20:41:53
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp322.8 MiB2008-12-29 12:55:25
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3.md586 B2009-01-06 20:21:11
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg20.3 MiB2008-12-29 15:29:55
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg.md586 B2009-01-06 20:21:11
25c3-2904-en-solar-powering_your_geek_gear.mp313.1 MiB2008-12-29 12:05:14
25c3-2904-en-solar-powering_your_geek_gear.mp3.md581 B2009-01-06 20:21:11
25c3-2904-en-solar-powering_your_geek_gear.ogg11.9 MiB2008-12-29 18:27:00
25c3-2904-en-solar-powering_your_geek_gear.ogg.md581 B2009-01-06 20:21:11
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp333.2 MiB2009-01-12 01:39:03
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp3.md5102 B2009-01-12 01:38:50
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg29.6 MiB2009-01-12 01:39:44
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg.md5102 B2009-01-12 01:38:50
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp313.8 MiB2008-12-29 15:11:17
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3.md589 B2009-01-06 20:21:11
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg12.3 MiB2008-12-29 13:12:49
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg.md589 B2009-01-06 20:21:11
25c3-2916-en-wikileaks.mp326.7 MiB2009-01-11 21:42:21
25c3-2916-en-wikileaks.mp3.md561 B2009-01-11 21:42:07
25c3-2916-en-wikileaks.ogg23.8 MiB2009-01-11 21:42:49
25c3-2916-en-wikileaks.ogg.md561 B2009-01-11 21:42:07
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp326.7 MiB2008-12-29 15:13:41
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3.md599 B2009-01-06 20:21:11
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg23.8 MiB2008-12-29 15:22:18
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg.md599 B2009-01-06 20:21:11
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp325.2 MiB2009-01-06 20:43:29
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp3.md592 B2009-01-06 20:41:53
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg22.4 MiB2009-01-06 20:47:27
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg.md592 B2009-01-06 20:41:53
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg29.2 MiB2008-12-29 13:16:24
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg.md590 B2009-01-06 20:21:11
25c3-2934-en-blinkenlights_stereoscope.mp329.7 MiB2009-01-06 20:43:42
25c3-2934-en-blinkenlights_stereoscope.mp3.md577 B2009-01-06 20:41:53
25c3-2934-en-blinkenlights_stereoscope.ogg26.4 MiB2009-01-06 20:47:42
25c3-2934-en-blinkenlights_stereoscope.ogg.md577 B2009-01-06 20:41:55
25c3-2937-en-dect.mp330.5 MiB2009-01-06 20:43:53
25c3-2937-en-dect.mp3.md556 B2009-01-06 20:41:56
25c3-2937-en-dect.ogg27.2 MiB2009-01-06 20:47:53
25c3-2937-en-dect.ogg.md556 B2009-01-06 20:41:56
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp323.3 MiB2009-01-06 20:44:01
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3.md5116 B2009-01-06 20:41:56
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg20.7 MiB2009-01-06 20:48:03
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg.md5116 B2009-01-06 20:41:56
25c3-2940-en-flying_for_free.mp327.6 MiB2009-01-22 23:28:48
25c3-2940-en-flying_for_free.mp3.md567 B2009-01-22 23:28:46
25c3-2940-en-flying_for_free.ogg24.6 MiB2009-01-22 23:28:51
25c3-2940-en-flying_for_free.ogg.md567 B2009-01-22 23:28:46
25c3-2942-de-vertex_hacking.mp322.3 MiB2009-01-06 20:44:10
25c3-2942-de-vertex_hacking.mp3.md566 B2009-01-06 20:41:56
25c3-2942-de-vertex_hacking.ogg19.8 MiB2009-01-06 20:48:09
25c3-2942-de-vertex_hacking.ogg.md566 B2009-01-06 20:41:56
25c3-2952-de-pflanzenhacken.mp324.8 MiB2009-01-11 21:42:23
25c3-2952-de-pflanzenhacken.mp3.md566 B2009-01-11 21:42:07
25c3-2952-de-pflanzenhacken.ogg22.1 MiB2009-01-11 21:42:52
25c3-2952-de-pflanzenhacken.ogg.md566 B2009-01-11 21:42:07
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp328.1 MiB2008-12-29 15:08:17
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3.md599 B2009-01-06 20:21:11
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg25.1 MiB2008-12-29 15:06:24
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg.md599 B2009-01-06 20:21:11
25c3-2958-de-hacker_jeopardy.mp347.1 MiB2009-01-12 01:39:07
25c3-2958-de-hacker_jeopardy.mp3.md567 B2009-01-12 01:38:50
25c3-2958-de-hacker_jeopardy.ogg42.0 MiB2009-01-12 01:39:51
25c3-2958-de-hacker_jeopardy.ogg.md567 B2009-01-12 01:38:50
25c3-2963-de-handschellen_hacken.mp328.0 MiB2009-01-26 11:39:53
25c3-2963-de-handschellen_hacken.mp3.md571 B2009-01-26 11:39:52
25c3-2963-de-handschellen_hacken.ogg25.0 MiB2009-01-26 11:39:54
25c3-2963-de-handschellen_hacken.ogg.md571 B2009-01-26 11:39:52
25c3-2970-en-coreboot_beyond_the_final_frontier.mp323.1 MiB2008-12-29 00:52:35
25c3-2970-en-coreboot_beyond_the_final_frontier.mp3.md586 B2009-01-06 20:21:11
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg20.6 MiB2008-12-29 15:23:16
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg.md586 B2009-01-06 20:21:11
25c3-2973-en-lightning_talks_day4.mp327.9 MiB2009-01-11 21:42:26
25c3-2973-en-lightning_talks_day4.mp3.md572 B2009-01-11 21:42:07
25c3-2973-en-lightning_talks_day4.ogg24.9 MiB2009-01-11 21:42:56
25c3-2973-en-lightning_talks_day4.ogg.md572 B2009-01-11 21:42:07
25c3-2975-de-zehn_big_brother_awards_in_at.mp326.2 MiB2009-01-06 20:44:21
25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md581 B2009-01-06 20:41:56
25c3-2975-de-zehn_big_brother_awards_in_at.ogg23.4 MiB2009-01-06 20:48:19
25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md581 B2009-01-06 20:41:56
25c3-2976-en-hacking_the_iphone.mp326.6 MiB2008-12-29 12:59:11
25c3-2976-en-hacking_the_iphone.mp3.md570 B2009-01-06 20:21:11
25c3-2976-en-hacking_the_iphone.ogg23.7 MiB2008-12-29 15:24:21
25c3-2976-en-hacking_the_iphone.ogg.md570 B2009-01-06 20:21:11
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp328.4 MiB2009-01-06 20:44:35
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3.md597 B2009-01-06 20:41:56
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg25.3 MiB2009-01-06 20:48:31
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg.md597 B2009-01-06 20:41:57
25c3-2979-en-embracing_post-privacy.mp327.1 MiB2009-01-06 20:44:52
25c3-2979-en-embracing_post-privacy.mp3.md574 B2009-01-06 20:41:57
25c3-2979-en-embracing_post-privacy.ogg24.2 MiB2009-01-06 20:48:39
25c3-2979-en-embracing_post-privacy.ogg.md574 B2009-01-06 20:41:57
25c3-2980-en-the_infinite_library.mp326.7 MiB2009-01-06 22:25:53
25c3-2980-en-the_infinite_library.mp3.md572 B2009-01-06 22:25:52
25c3-2980-en-the_infinite_library.ogg23.8 MiB2009-01-07 23:10:37
25c3-2980-en-the_infinite_library.ogg.md572 B2009-01-07 23:08:44
25c3-2988-en-just_estonia_and_georgia.mp320.3 MiB2009-01-06 20:45:03
25c3-2988-en-just_estonia_and_georgia.mp3.md576 B2009-01-06 20:41:57
25c3-2988-en-just_estonia_and_georgia.ogg18.1 MiB2009-01-06 20:48:47
25c3-2988-en-just_estonia_and_georgia.ogg.md576 B2009-01-06 20:41:58
25c3-2991-en-terrorist_all-stars.mp329.8 MiB2009-01-06 20:45:20
25c3-2991-en-terrorist_all-stars.mp3.md571 B2009-01-06 20:41:58
25c3-2991-en-terrorist_all-stars.ogg26.6 MiB2009-01-06 20:48:59
25c3-2991-en-terrorist_all-stars.ogg.md571 B2009-01-06 20:41:58
25c3-2992-en-tricks_makes_you_smile.mp316.2 MiB2009-01-07 23:09:37
25c3-2992-en-tricks_makes_you_smile.mp3.md574 B2009-01-07 23:08:44
25c3-2992-en-tricks_makes_you_smile.ogg14.5 MiB2009-01-07 23:10:44
25c3-2992-en-tricks_makes_you_smile.ogg.md574 B2009-01-07 23:08:44
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp323.1 MiB2009-01-06 20:45:27
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp3.md5108 B2009-01-06 20:41:58
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg20.6 MiB2009-01-06 20:49:10
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg.md5108 B2009-01-06 20:41:58
25c3-2997-en-locating_mobile_phones_using_ss7.mp322.1 MiB2008-12-29 15:15:29
25c3-2997-en-locating_mobile_phones_using_ss7.mp3.md584 B2009-01-06 20:21:11
25c3-2997-en-locating_mobile_phones_using_ss7.ogg19.7 MiB2008-12-29 15:18:04
25c3-2997-en-locating_mobile_phones_using_ss7.ogg.md584 B2009-01-06 20:21:11
25c3-2999-en-closing_ceremony.mp322.8 MiB2009-01-11 21:42:28
25c3-2999-en-closing_ceremony.mp3.md568 B2009-01-11 21:42:07
25c3-2999-en-closing_ceremony.ogg20.4 MiB2009-01-11 21:42:58
25c3-2999-en-closing_ceremony.ogg.md568 B2009-01-11 21:42:07
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp336.9 MiB2009-01-12 01:39:10
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp3.md587 B2009-01-12 01:38:50
25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg32.9 MiB2009-01-12 01:39:57
25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg.md587 B2009-01-12 01:38:50
25c3-3002-en-squeezing_attack_traces.mp317.3 MiB2009-01-11 21:42:30
25c3-3002-en-squeezing_attack_traces.mp3.md575 B2009-01-11 21:42:07
25c3-3002-en-squeezing_attack_traces.ogg15.4 MiB2009-01-11 21:43:00
25c3-3002-en-squeezing_attack_traces.ogg.md575 B2009-01-11 21:42:07
25c3-3004-en-why_technology_sucks.mp320.3 MiB2009-01-06 20:45:43
25c3-3004-en-why_technology_sucks.mp3.md572 B2009-01-06 20:41:59
25c3-3004-en-why_technology_sucks.ogg18.1 MiB2009-01-06 20:49:37
25c3-3004-en-why_technology_sucks.ogg.md572 B2009-01-06 20:42:00
25c3-3007-en-running_your_own_gsm_network.mp320.4 MiB2008-12-30 17:16:36
25c3-3007-en-running_your_own_gsm_network.mp3.md580 B2009-01-06 20:21:11
25c3-3007-en-running_your_own_gsm_network.ogg18.2 MiB2008-12-30 17:16:17
25c3-3007-en-running_your_own_gsm_network.ogg.md580 B2009-01-06 20:21:11
25c3-3008-en-anatomy_of_smartphone_hardware.mp325.9 MiB2009-01-06 20:45:52
25c3-3008-en-anatomy_of_smartphone_hardware.mp3.md582 B2009-01-06 20:42:00
25c3-3008-en-anatomy_of_smartphone_hardware.ogg23.2 MiB2009-01-06 20:49:46
25c3-3008-en-anatomy_of_smartphone_hardware.ogg.md582 B2009-01-06 20:42:00
25c3-3015-en-rapid_prototype_your_life.mp326.0 MiB2008-12-29 13:10:56
25c3-3015-en-rapid_prototype_your_life.mp3.md577 B2009-01-06 20:21:11
25c3-3015-en-rapid_prototype_your_life.ogg23.2 MiB2008-12-29 13:09:41
25c3-3015-en-rapid_prototype_your_life.ogg.md577 B2009-01-06 20:21:11
25c3-3016-en-life_is_a_holodeck.mp330.7 MiB2009-01-11 21:42:34
25c3-3016-en-life_is_a_holodeck.mp3.md570 B2009-01-11 21:42:07
25c3-3016-en-life_is_a_holodeck.ogg27.4 MiB2009-01-11 21:43:05
25c3-3016-en-life_is_a_holodeck.ogg.md570 B2009-01-11 21:42:07
25c3-3020-en-banking_malware_101.mp328.9 MiB2009-01-12 01:39:13
25c3-3020-en-banking_malware_101.mp3.md571 B2009-01-12 01:38:50
25c3-3020-en-banking_malware_101.ogg25.7 MiB2009-01-12 01:40:01
25c3-3020-en-banking_malware_101.ogg.md571 B2009-01-12 01:38:50
25c3-3021-de-security_nightmares_2009.mp343.1 MiB2009-01-12 01:39:17
25c3-3021-de-security_nightmares_2009.mp3.md576 B2009-01-12 01:38:50
25c3-3021-de-security_nightmares_2009.ogg38.4 MiB2009-01-12 01:40:07
25c3-3021-de-security_nightmares_2009.ogg.md576 B2009-01-12 01:38:50
25c3-3023-en-making_the_theoretical_possible.mp328.2 MiB2009-01-06 20:46:00
25c3-3023-en-making_the_theoretical_possible.mp3.md583 B2009-01-06 20:42:00
25c3-3023-en-making_the_theoretical_possible.ogg25.2 MiB2009-01-06 20:49:59
25c3-3023-en-making_the_theoretical_possible.ogg.md583 B2009-01-06 20:42:00
25c3-3024-de-jahresrueckblick.mp357.1 MiB2009-01-12 01:39:24
25c3-3024-de-jahresrueckblick.mp3.md568 B2009-01-12 01:38:50
25c3-3024-de-jahresrueckblick.ogg50.9 MiB2009-01-12 01:40:16
25c3-3024-de-jahresrueckblick.ogg.md568 B2009-01-12 01:38:50
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp335.7 MiB2009-01-22 23:28:49
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp3.md587 B2009-01-22 23:28:46
25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg31.9 MiB2009-01-22 23:28:52
25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg.md587 B2009-01-22 23:28:46
25c3-3028-de-der_hackerparagraph_202c_stgb.mp327.9 MiB2008-12-29 15:14:42
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md581 B2009-01-06 20:21:11
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg24.9 MiB2008-12-29 15:19:58
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md581 B2009-01-06 20:21:11
25c3-3030-en-messing_around_with_garage_doors.mp335.0 MiB2009-01-12 01:39:28
25c3-3030-en-messing_around_with_garage_doors.mp3.md584 B2009-01-12 01:38:50
25c3-3030-en-messing_around_with_garage_doors.ogg31.1 MiB2009-01-12 01:40:20
25c3-3030-en-messing_around_with_garage_doors.ogg.md584 B2009-01-12 01:38:50
25c3-3032-en-analyzing_rfid_security.mp324.6 MiB2009-01-06 20:46:09
25c3-3032-en-analyzing_rfid_security.mp3.md575 B2009-01-06 20:42:00
25c3-3032-en-analyzing_rfid_security.ogg21.9 MiB2009-01-06 20:50:07
25c3-3032-en-analyzing_rfid_security.ogg.md575 B2009-01-06 20:42:00
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp329.7 MiB2008-12-29 23:00:47
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3.md587 B2009-01-06 20:21:11
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg26.5 MiB2008-12-30 01:45:58
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg.md587 B2009-01-06 20:21:11
25c3-3044-en-all_your_bases_are_belong_to_us.mp325.3 MiB2008-12-29 11:53:18
25c3-3044-en-all_your_bases_are_belong_to_us.mp3.md583 B2009-01-06 20:21:11
25c3-3044-en-all_your_bases_are_belong_to_us.ogg22.5 MiB2008-12-29 12:27:42
25c3-3044-en-all_your_bases_are_belong_to_us.ogg.md583 B2009-01-06 20:21:11
25c3-3047-en-lightning_talks_day3_morning.mp327.1 MiB2008-12-29 22:56:03
25c3-3047-en-lightning_talks_day3_morning.mp3.md580 B2009-01-06 20:21:11
25c3-3047-en-lightning_talks_day3_morning.ogg24.1 MiB2008-12-29 23:05:35
25c3-3047-en-lightning_talks_day3_morning.ogg.md580 B2009-01-06 20:21:11
25c3-3048-en-lightning_talks_day2.mp323.4 MiB2008-12-29 15:25:21
25c3-3048-en-lightning_talks_day2.mp3.md572 B2009-01-06 20:21:11
25c3-3048-en-lightning_talks_day2.ogg20.8 MiB2008-12-29 15:35:06
25c3-3048-en-lightning_talks_day2.ogg.md572 B2009-01-06 20:21:11
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp321.7 MiB2009-01-11 21:42:36
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp3.md596 B2009-01-11 21:42:07
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg19.3 MiB2009-01-11 21:43:08
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg.md596 B2009-01-11 21:42:07
25c3-3053-en-lightning_talks_day3_-_evening.mp325.1 MiB2009-01-07 23:09:49
25c3-3053-en-lightning_talks_day3_-_evening.mp3.md582 B2009-01-07 23:08:44
25c3-3053-en-lightning_talks_day3_-_evening.ogg22.4 MiB2009-01-07 23:10:57
25c3-3053-en-lightning_talks_day3_-_evening.ogg.md582 B2009-01-07 23:08:44
25c3-3056-en-fnord_news_show_english_interpretation.mp322.9 MiB2009-01-13 16:59:07
25c3-3056-en-fnord_news_show_english_interpretation.mp3.md590 B2009-01-13 16:59:00
25c3-3056-en-fnord_news_show_english_interpretation.ogg20.4 MiB2009-01-13 16:59:19
25c3-3056-en-fnord_news_show_english_interpretation.ogg.md590 B2009-01-13 16:59:00
25c3-3057-en-hacker_jeopardy_english_interpretation.mp347.0 MiB2009-01-13 16:59:11
25c3-3057-en-hacker_jeopardy_english_interpretation.mp3.md590 B2009-01-13 16:59:00
25c3-3057-en-hacker_jeopardy_english_interpretation.ogg41.8 MiB2009-01-13 16:59:22
25c3-3057-en-hacker_jeopardy_english_interpretation.ogg.md590 B2009-01-13 16:59:01
25c3-3058-en-security_nightmares_2009_english_interpretation.mp342.3 MiB2009-01-13 16:59:15
25c3-3058-en-security_nightmares_2009_english_interpretation.mp3.md599 B2009-01-13 16:59:01
25c3-3058-en-security_nightmares_2009_english_interpretation.ogg37.8 MiB2009-01-13 16:59:26
25c3-3058-en-security_nightmares_2009_english_interpretation.ogg.md599 B2009-01-13 16:59:01