Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/cdn.media.ccc.de/congress/2010/mp3-audio-only/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp327.9 MiB2010-12-30 11:20:36
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.md589 B2011-01-02 20:25:18
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.sha197 B2011-01-02 20:25:19
27c3-3957-en-ipv6_insecurities.mp324.2 MiB2011-01-02 18:46:17
27c3-3957-en-ipv6_insecurities.mp3.md569 B2011-01-02 19:34:08
27c3-3957-en-ipv6_insecurities.mp3.sha177 B2011-01-02 19:34:10
27c3-3983-en-hackers_and_computer_science.mp315.5 MiB2011-01-04 10:07:25
27c3-3983-en-hackers_and_computer_science.mp3.md580 B2011-01-05 00:12:14
27c3-3983-en-hackers_and_computer_science.mp3.sha188 B2011-01-05 00:12:15
27c3-4003-en-cybernetics_for_the_masses.mp318.0 MiB2011-01-04 20:53:03
27c3-4003-en-cybernetics_for_the_masses.mp3.md578 B2011-01-05 00:12:16
27c3-4003-en-cybernetics_for_the_masses.mp3.sha186 B2011-01-05 00:12:17
27c3-4006-en-diy_synthesizers_and_sound_generators.mp311.3 MiB2010-12-30 13:10:26
27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.md589 B2011-01-02 20:25:19
27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.sha197 B2011-01-02 20:25:20
27c3-4011-en-embedded_reverse_engineering.mp325.5 MiB2010-12-30 17:32:54
27c3-4011-en-embedded_reverse_engineering.mp3.md580 B2011-01-02 20:25:20
27c3-4011-en-embedded_reverse_engineering.mp3.sha188 B2011-01-02 20:25:21
27c3-4017-en-desktop_on_the_linux.mp325.3 MiB2010-12-30 17:06:23
27c3-4017-en-desktop_on_the_linux.mp3.md572 B2011-01-02 20:25:21
27c3-4017-en-desktop_on_the_linux.mp3.sha180 B2011-01-02 20:25:22
27c3-4018-en-frozencache.mp325.1 MiB2010-12-30 17:06:32
27c3-4018-en-frozencache.mp3.md563 B2011-01-02 20:25:23
27c3-4018-en-frozencache.mp3.sha171 B2011-01-02 20:25:23
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp326.7 MiB2010-12-30 13:12:28
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.md5104 B2011-01-02 20:25:24
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.sha1112 B2011-01-02 20:25:24
27c3-4046-en-all_colours_are_beautiful.mp316.1 MiB2011-01-02 18:33:40
27c3-4046-en-all_colours_are_beautiful.mp3.md577 B2011-01-02 19:34:43
27c3-4046-en-all_colours_are_beautiful.mp3.sha185 B2011-01-02 19:34:43
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp329.2 MiB2010-12-30 13:14:56
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.md5113 B2011-01-02 20:25:25
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.sha1121 B2011-01-02 20:25:26
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp323.8 MiB2010-12-30 13:16:39
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.md595 B2011-01-02 20:25:26
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.sha1103 B2011-01-02 20:25:27
27c3-4060-en-attacking_mobile_phones.mp328.1 MiB2011-01-13 23:15:36
27c3-4060-en-attacking_mobile_phones.mp3.md575 B2011-01-14 09:24:14
27c3-4060-en-attacking_mobile_phones.mp3.sha183 B2011-01-14 09:24:14
27c3-4061-en-building_custom_disassemblers.mp333.1 MiB2011-01-12 12:05:21
27c3-4061-en-building_custom_disassemblers.mp3.md581 B2011-01-12 12:27:05
27c3-4061-en-building_custom_disassemblers.mp3.sha189 B2011-01-12 12:27:06
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp322.8 MiB2011-01-04 11:40:49
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.md593 B2011-01-05 00:12:17
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.sha1101 B2011-01-05 00:12:18
27c3-4070-de-fnord_jahresrueckblick.mp338.0 MiB2011-01-02 19:19:01
27c3-4070-de-fnord_jahresrueckblick.mp3.md574 B2011-01-02 19:38:48
27c3-4070-de-fnord_jahresrueckblick.mp3.sha182 B2011-01-02 19:38:48
27c3-4073-de-logikschaltungen_ohne_elektronik.mp316.1 MiB2011-01-03 22:59:07
27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.md584 B2011-01-04 00:24:38
27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.sha192 B2011-01-04 00:24:39
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp323.9 MiB2010-12-30 17:06:55
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.md593 B2011-01-02 20:25:30
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.sha1101 B2011-01-02 20:25:30
27c3-4082-en-sap_landscape.mp334.9 MiB2010-12-30 17:07:27
27c3-4082-en-sap_landscape.mp3.md565 B2011-01-02 20:25:31
27c3-4082-en-sap_landscape.mp3.sha173 B2011-01-02 20:25:32
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp313.8 MiB2010-12-30 17:07:35
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.md596 B2011-01-02 20:25:33
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.sha1104 B2011-01-02 20:25:33
27c3-4085-de-digitale_spaltung_per_gesetz.mp318.6 MiB2011-01-04 20:25:50
27c3-4085-de-digitale_spaltung_per_gesetz.mp3.md580 B2011-01-05 00:12:20
27c3-4085-de-digitale_spaltung_per_gesetz.mp3.sha188 B2011-01-05 00:12:20
27c3-4087-en-console_hacking_2010.mp320.0 MiB2010-12-30 17:07:58
27c3-4087-en-console_hacking_2010.mp3.md572 B2011-01-02 20:25:34
27c3-4087-en-console_hacking_2010.mp3.sha180 B2011-01-02 20:25:35
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp329.0 MiB2011-01-03 22:53:02
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.md598 B2011-01-04 00:24:39
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.sha1106 B2011-01-04 00:24:41
27c3-4090-en-the_baseband_apocalypse.mp330.0 MiB2010-12-30 17:08:17
27c3-4090-en-the_baseband_apocalypse.mp3.md575 B2011-01-02 20:25:35
27c3-4090-en-the_baseband_apocalypse.mp3.sha183 B2011-01-02 20:25:36
27c3-4094-de-netzneutralitaet_und_qos.mp336.2 MiB2011-01-03 00:01:47
27c3-4094-de-netzneutralitaet_und_qos.mp3.md576 B2011-01-03 00:11:06
27c3-4094-de-netzneutralitaet_und_qos.mp3.sha184 B2011-01-03 00:11:07
27c3-4096-en-code_deobfuscation_by_optimization.mp322.2 MiB2010-12-30 17:33:04
27c3-4096-en-code_deobfuscation_by_optimization.mp3.md586 B2011-01-02 20:25:36
27c3-4096-en-code_deobfuscation_by_optimization.mp3.sha194 B2011-01-02 20:25:37
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp320.1 MiB2010-12-30 17:08:30
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.md5106 B2011-01-02 20:25:38
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.sha1114 B2011-01-02 20:25:38
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp329.3 MiB2011-01-03 23:38:44
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.md592 B2011-01-04 00:24:41
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.sha1100 B2011-01-04 00:24:43
27c3-4099-en-file_-_print_-_electronics.mp323.4 MiB2010-12-30 17:33:11
27c3-4099-en-file_-_print_-_electronics.mp3.md578 B2011-01-02 20:25:39
27c3-4099-en-file_-_print_-_electronics.mp3.sha186 B2011-01-02 20:25:39
27c3-4103-en-copyright_enforcement_versus_freedoms.mp325.4 MiB2011-01-05 18:57:25
27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.md589 B2011-01-05 19:32:19
27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.sha197 B2011-01-05 19:32:21
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp328.2 MiB2010-12-30 17:33:19
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.md582 B2011-01-02 20:25:40
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.sha190 B2011-01-02 20:25:41
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp326.4 MiB2011-01-08 11:05:17
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.md595 B2011-01-08 22:09:53
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.sha1103 B2011-01-08 22:09:54
27c3-4121-en-is_the_ssliverse_a_safe_place.mp326.4 MiB2010-12-30 17:33:26
27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.md581 B2011-01-02 20:25:41
27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.sha189 B2011-01-02 20:25:42
27c3-4123-en-defense_is_not_dead.mp329.3 MiB2010-12-30 17:33:34
27c3-4123-en-defense_is_not_dead.mp3.md571 B2011-01-02 20:25:42
27c3-4123-en-defense_is_not_dead.mp3.sha179 B2011-01-02 20:25:43
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp327.5 MiB2011-01-05 18:56:36
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.md595 B2011-01-05 19:32:23
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.sha1103 B2011-01-05 19:32:26
27c3-4125-de-spinning_the_electornic_wheel.mp328.8 MiB2010-12-30 17:33:49
27c3-4125-de-spinning_the_electornic_wheel.mp3.md581 B2011-01-02 20:25:44
27c3-4125-de-spinning_the_electornic_wheel.mp3.sha189 B2011-01-02 20:25:44
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp326.2 MiB2010-12-30 17:34:08
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.md5101 B2011-01-02 20:25:45
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.sha1109 B2011-01-02 20:25:46
27c3-4140-en-contemporary_profiling_of_web_users.mp324.7 MiB2011-01-03 00:01:20
27c3-4140-en-contemporary_profiling_of_web_users.mp3.md587 B2011-01-03 00:11:08
27c3-4140-en-contemporary_profiling_of_web_users.mp3.sha195 B2011-01-03 00:11:09
27c3-4141-de-hacker_jeopardy.mp361.3 MiB2010-12-30 17:34:32
27c3-4141-de-hacker_jeopardy.mp3.md567 B2011-01-02 20:25:47
27c3-4141-de-hacker_jeopardy.mp3.sha175 B2011-01-02 20:25:48
27c3-4142-en-nodejs_as_a_networking_tool.mp315.1 MiB2011-01-02 19:03:15
27c3-4142-en-nodejs_as_a_networking_tool.mp3.md579 B2011-01-02 19:38:49
27c3-4142-en-nodejs_as_a_networking_tool.mp3.sha187 B2011-01-02 19:38:50
27c3-4143-en-part-time_scientists.mp325.8 MiB2010-12-30 17:34:53
27c3-4143-en-part-time_scientists.mp3.md572 B2011-01-02 20:25:49
27c3-4143-en-part-time_scientists.mp3.sha180 B2011-01-02 20:25:50
27c3-4144-en-a_short_political_history_of_acoustics.mp322.6 MiB2010-12-30 17:34:59
27c3-4144-en-a_short_political_history_of_acoustics.mp3.md590 B2011-01-02 20:25:51
27c3-4144-en-a_short_political_history_of_acoustics.mp3.sha198 B2011-01-02 20:25:51
27c3-4145-en-spoilers_human_interfaces_airplanes.mp331.3 MiB2011-01-05 18:56:56
27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.md587 B2011-01-05 19:32:27
27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.sha195 B2011-01-05 19:32:30
27c3-4149-en-i_control_your_code.mp328.5 MiB2010-12-30 17:35:09
27c3-4149-en-i_control_your_code.mp3.md571 B2011-01-02 20:25:52
27c3-4149-en-i_control_your_code.mp3.sha179 B2011-01-02 20:25:53
27c3-4151-en-android_geolocation_using_gsm_network.mp328.7 MiB2010-12-30 17:56:04
27c3-4151-en-android_geolocation_using_gsm_network.mp3.md589 B2011-01-02 20:25:54
27c3-4151-en-android_geolocation_using_gsm_network.mp3.sha197 B2011-01-02 20:25:54
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp323.6 MiB2010-12-30 17:56:23
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.md588 B2011-01-02 20:25:55
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.sha196 B2011-01-02 20:25:56
27c3-4160-en-automatic_identification_cryptographic_primitives.mp323.3 MiB2011-01-04 23:56:21
27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.md5101 B2011-01-05 00:12:21
27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.sha1109 B2011-01-05 00:12:22
27c3-4164-de-friede_sei_mit_euren_daten.mp324.8 MiB2011-01-05 18:57:16
27c3-4164-de-friede_sei_mit_euren_daten.mp3.md578 B2011-01-05 19:32:32
27c3-4164-de-friede_sei_mit_euren_daten.mp3.sha186 B2011-01-05 19:32:34
27c3-4168-en-automated_architecture_independent_gadget_search.mp316.6 MiB2011-01-05 18:56:27
27c3-4168-en-automated_architecture_independent_gadget_search.mp3.md5100 B2011-01-05 19:32:35
27c3-4168-en-automated_architecture_independent_gadget_search.mp3.sha1108 B2011-01-05 19:32:36
27c3-4174-en-the_hidden_nemesis.mp321.4 MiB2010-12-30 17:56:37
27c3-4174-en-the_hidden_nemesis.mp3.md570 B2011-01-02 20:25:56
27c3-4174-en-the_hidden_nemesis.mp3.sha178 B2011-01-02 20:25:56
27c3-4175-en-from_robot_to_robot.mp321.3 MiB2011-01-02 18:38:19
27c3-4175-en-from_robot_to_robot.mp3.md571 B2011-01-02 19:38:50
27c3-4175-en-from_robot_to_robot.mp3.sha179 B2011-01-02 19:38:50
27c3-4176-de-hacking_ibuttons.mp324.3 MiB2011-01-02 18:54:04
27c3-4176-de-hacking_ibuttons.mp3.md568 B2011-01-02 19:38:51
27c3-4176-de-hacking_ibuttons.mp3.sha176 B2011-01-02 19:38:52
27c3-4181-en-sip_home_gateways_under_fire.mp311.3 MiB2010-12-30 17:56:52
27c3-4181-en-sip_home_gateways_under_fire.mp3.md580 B2011-01-02 20:25:57
27c3-4181-en-sip_home_gateways_under_fire.mp3.sha188 B2011-01-02 20:25:57
27c3-4183-en-safety_on_the_open_sea.mp327.1 MiB2010-12-30 17:57:00
27c3-4183-en-safety_on_the_open_sea.mp3.md574 B2011-01-02 20:25:57
27c3-4183-en-safety_on_the_open_sea.mp3.sha182 B2011-01-02 20:25:58
27c3-4184-de-stanislaw_lem_weltverbesserer.mp320.2 MiB2011-01-12 12:12:19
27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.md581 B2011-01-12 12:27:27
27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.sha189 B2011-01-12 12:27:28
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp326.9 MiB2010-12-30 17:57:08
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.md583 B2011-01-02 20:25:59
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.sha191 B2011-01-02 20:25:59
27c3-4187-en-your_infrastructure_will_kill_you.mp330.6 MiB2010-12-30 17:57:18
27c3-4187-en-your_infrastructure_will_kill_you.mp3.md585 B2011-01-02 20:26:00
27c3-4187-en-your_infrastructure_will_kill_you.mp3.sha193 B2011-01-02 20:26:01
27c3-4190-en-data_retention_in_the_eu.mp327.5 MiB2010-12-30 17:57:28
27c3-4190-en-data_retention_in_the_eu.mp3.md576 B2011-01-02 20:26:01
27c3-4190-en-data_retention_in_the_eu.mp3.sha184 B2011-01-02 20:26:02
27c3-4193-en-having_fun_with_rtp.mp316.5 MiB2011-01-08 10:26:03
27c3-4193-en-having_fun_with_rtp.mp3.md571 B2011-01-08 22:09:56
27c3-4193-en-having_fun_with_rtp.mp3.sha179 B2011-01-08 22:09:57
27c3-4195-de-literarischer_abend.mp325.9 MiB2010-12-30 17:57:41
27c3-4195-de-literarischer_abend.mp3.md571 B2011-01-02 20:26:02
27c3-4195-de-literarischer_abend.mp3.sha179 B2011-01-02 20:26:03
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp325.6 MiB2011-01-10 21:13:32
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.md5103 B2011-01-10 21:16:44
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.sha1111 B2011-01-10 21:16:45
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp325.8 MiB2010-12-30 17:58:00
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.md5100 B2011-01-02 20:26:05
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.sha1108 B2011-01-02 20:26:06
27c3-4206-en-immi_from_concept_to_reality.mp325.8 MiB2010-12-30 17:58:13
27c3-4206-en-immi_from_concept_to_reality.mp3.md580 B2011-01-02 20:26:06
27c3-4206-en-immi_from_concept_to_reality.mp3.sha188 B2011-01-02 20:26:07
27c3-4208-en-wideband_gsm_sniffing.mp328.9 MiB2010-12-30 17:58:26
27c3-4208-en-wideband_gsm_sniffing.mp3.md573 B2011-01-02 20:26:08
27c3-4208-en-wideband_gsm_sniffing.mp3.sha181 B2011-01-02 20:26:09
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp329.7 MiB2011-01-02 19:15:14
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.md5102 B2011-01-02 19:38:57
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.sha1110 B2011-01-02 19:38:59
27c3-4210-en-lying_to_the_neighbours.mp315.8 MiB2011-01-08 14:14:41
27c3-4210-en-lying_to_the_neighbours.mp3.md575 B2011-01-08 22:10:00
27c3-4210-en-lying_to_the_neighbours.mp3.sha183 B2011-01-08 22:10:01
27c3-4211-en-chip_and_pin_is_broken.mp326.2 MiB2011-01-05 19:30:02
27c3-4211-en-chip_and_pin_is_broken.mp3.md574 B2011-01-05 19:32:40
27c3-4211-en-chip_and_pin_is_broken.mp3.sha182 B2011-01-05 19:32:43
27c3-4221-en-omg_wtf_pdf.mp326.1 MiB2011-01-05 18:56:46
27c3-4221-en-omg_wtf_pdf.mp3.md563 B2011-01-05 19:32:44
27c3-4221-en-omg_wtf_pdf.mp3.sha171 B2011-01-05 19:32:47
27c3-4230-de-security_nightmares.mp338.6 MiB2011-01-05 18:56:07
27c3-4230-de-security_nightmares.mp3.md571 B2011-01-05 19:32:48
27c3-4230-de-security_nightmares.mp3.sha179 B2011-01-05 19:32:52
27c3-4231-en-datenrettung_fun_with_hard_drives.mp327.6 MiB2011-01-04 23:58:30
27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.md585 B2011-01-05 00:12:23
27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.sha193 B2011-01-05 00:12:25
27c3-4234-en-usb_and_libusb.mp325.5 MiB2011-01-02 21:15:52
27c3-4234-en-usb_and_libusb.mp3.md566 B2011-01-03 00:11:10
27c3-4234-en-usb_and_libusb.mp3.sha174 B2011-01-03 00:11:11
27c3-4236-en-international_cyber_jurisdiction.mp327.0 MiB2011-01-04 23:58:12
27c3-4236-en-international_cyber_jurisdiction.mp3.md584 B2011-01-05 00:12:26
27c3-4236-en-international_cyber_jurisdiction.mp3.sha192 B2011-01-05 00:12:27
27c3-4237-en-indect_eu_surveillance_project.mp330.3 MiB2011-01-08 19:24:42
27c3-4237-en-indect_eu_surveillance_project.mp3.md582 B2011-01-08 22:10:02
27c3-4237-en-indect_eu_surveillance_project.mp3.sha190 B2011-01-08 22:10:03
27c3-4239-en-lightning_talks_d3.mp333.0 MiB2011-01-04 23:58:23
27c3-4239-en-lightning_talks_d3.mp3.md570 B2011-01-05 00:12:29
27c3-4239-en-lightning_talks_d3.mp3.sha178 B2011-01-05 00:12:30
27c3-4244-en-critical_overview_of_10_years_pet.mp324.6 MiB2011-01-04 23:58:17
27c3-4244-en-critical_overview_of_10_years_pet.mp3.md585 B2011-01-05 00:12:31
27c3-4244-en-critical_overview_of_10_years_pet.mp3.sha193 B2011-01-05 00:12:33
27c3-4245-en-adventures_in_analyzing_stuxnet.mp326.8 MiB2011-01-08 10:47:40
27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.md583 B2011-01-08 22:10:04
27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.sha191 B2011-01-08 22:10:06
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp327.4 MiB2011-01-02 19:28:38
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.md595 B2011-01-02 19:39:02
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.sha1103 B2011-01-02 19:39:03
27c3-4253-en-pentanews_game_show.mp329.5 MiB2011-01-02 18:34:24
27c3-4253-en-pentanews_game_show.mp3.md571 B2011-01-02 19:39:04
27c3-4253-en-pentanews_game_show.mp3.sha179 B2011-01-02 19:39:05
27c3-4261-en-key_recovery_attacks_rc4.mp319.1 MiB2011-01-08 10:40:50
27c3-4261-en-key_recovery_attacks_rc4.mp3.md576 B2011-01-08 22:10:07
27c3-4261-en-key_recovery_attacks_rc4.mp3.sha184 B2011-01-08 22:10:09
27c3-4263-en-resisting_excessive_government_surveillance.mp325.7 MiB2011-01-02 21:04:49
27c3-4263-en-resisting_excessive_government_surveillance.mp3.md595 B2011-01-03 00:11:12
27c3-4263-en-resisting_excessive_government_surveillance.mp3.sha1103 B2011-01-03 00:11:14
27c3-4265-en-hacking_smart_phones.mp333.6 MiB2011-01-02 19:11:40
27c3-4265-en-hacking_smart_phones.mp3.md572 B2011-01-02 19:39:06
27c3-4265-en-hacking_smart_phones.mp3.sha180 B2011-01-02 19:39:09
27c3-4276-en-cognitive_psychology_for_hackers.mp329.9 MiB2011-01-08 11:00:21
27c3-4276-en-cognitive_psychology_for_hackers.mp3.md584 B2011-01-08 22:10:10
27c3-4276-en-cognitive_psychology_for_hackers.mp3.sha192 B2011-01-08 22:10:12
27c3-4295-en-high_speed_high_security_cryptography.mp328.4 MiB2011-01-04 12:44:06
27c3-4295-en-high_speed_high_security_cryptography.mp3.md589 B2011-01-05 00:12:34
27c3-4295-en-high_speed_high_security_cryptography.mp3.sha197 B2011-01-05 00:12:36
27c3-4296-en-lightning_days_d2.mp322.6 MiB2011-01-08 10:50:26
27c3-4296-en-lightning_days_d2.mp3.md569 B2011-01-08 22:10:13
27c3-4296-en-lightning_days_d2.mp3.sha177 B2011-01-08 22:10:15
27c3-4297-de-die_gesamte_technik_ist_sicher.mp327.4 MiB2011-01-04 16:12:44
27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.md582 B2011-01-05 00:12:37
27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.sha190 B2011-01-05 00:12:38
27c3-4298-de-ccc_jahresrueckblick_2010.mp345.7 MiB2011-01-04 15:37:22
27c3-4298-de-ccc_jahresrueckblick_2010.mp3.md577 B2011-01-05 00:12:41
27c3-4298-de-ccc_jahresrueckblick_2010.mp3.sha185 B2011-01-05 00:12:45
27c3-4299-en-closing_event.mp312.5 MiB2011-01-04 12:22:59
27c3-4299-en-closing_event.mp3.md565 B2011-01-05 00:12:46
27c3-4299-en-closing_event.mp3.sha173 B2011-01-05 00:12:47
27c3-4300-en-lightning_talks_d4.mp355.3 MiB2011-01-08 10:39:26
27c3-4300-en-lightning_talks_d4.mp3.md570 B2011-01-08 22:10:17
27c3-4300-en-lightning_talks_d4.mp3.sha178 B2011-01-08 22:10:20
27c3-4301-en-flow_analysis_of_internet_activities.mp326.6 MiB2011-01-05 18:56:18
27c3-4301-en-flow_analysis_of_internet_activities.mp3.md588 B2011-01-05 19:32:53
27c3-4301-en-flow_analysis_of_internet_activities.mp3.sha196 B2011-01-05 19:32:56
27c3-4302-en-27c3_keynote_we_come_in_peace.mp317.7 MiB2011-01-02 18:33:58
27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.md581 B2011-01-02 19:39:09
27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.sha189 B2011-01-02 19:39:11
27c3-4326-de-radio_der_zukunft.mp335.6 MiB2011-01-02 23:57:11
27c3-4326-de-radio_der_zukunft.mp3.md569 B2011-01-03 00:11:15
27c3-4326-de-radio_der_zukunft.mp3.sha177 B2011-01-03 00:11:17
27c3-4333-en-hacker_jeopardy_translation.mp361.2 MiB2011-01-04 15:40:31
27c3-4333-en-hacker_jeopardy_translation.mp3.md579 B2011-01-05 00:12:50
27c3-4333-en-hacker_jeopardy_translation.mp3.sha187 B2011-01-05 00:12:54
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp338.0 MiB2011-01-10 12:56:14
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.md591 B2011-01-10 16:00:54
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.sha199 B2011-01-10 16:00:55
27c3-4338-de-wikileaks_und_mehr.mp318.6 MiB2011-01-04 12:53:49
27c3-4338-de-wikileaks_und_mehr.mp3.md570 B2011-01-05 00:12:55
27c3-4338-de-wikileaks_und_mehr.mp3.sha178 B2011-01-05 00:12:57
27c3-4339-en-openleaks.mp328.1 MiB2011-01-08 10:44:42
27c3-4339-en-openleaks.mp3.md561 B2011-01-08 22:10:22
27c3-4339-en-openleaks.mp3.sha169 B2011-01-08 22:10:24
27c3.mp3.all.md57.6 KiB2011-01-18 06:41:13
27c3.mp3.all.sha18.3 KiB2011-01-18 06:45:45