Parent directory/ | - | - |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3 | 27.9 MiB | 2010-12-30 11:20:36 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp3 | 11.3 MiB | 2010-12-30 13:10:26 |
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3 | 26.7 MiB | 2010-12-30 13:12:28 |
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3 | 29.2 MiB | 2010-12-30 13:14:56 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3 | 23.8 MiB | 2010-12-30 13:16:39 |
27c3-4017-en-desktop_on_the_linux.mp3 | 25.3 MiB | 2010-12-30 17:06:23 |
27c3-4018-en-frozencache.mp3 | 25.1 MiB | 2010-12-30 17:06:32 |
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3 | 23.9 MiB | 2010-12-30 17:06:55 |
27c3-4082-en-sap_landscape.mp3 | 34.9 MiB | 2010-12-30 17:07:27 |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3 | 13.8 MiB | 2010-12-30 17:07:35 |
27c3-4087-en-console_hacking_2010.mp3 | 20.0 MiB | 2010-12-30 17:07:58 |
27c3-4090-en-the_baseband_apocalypse.mp3 | 30.0 MiB | 2010-12-30 17:08:17 |
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3 | 20.1 MiB | 2010-12-30 17:08:30 |
27c3-4011-en-embedded_reverse_engineering.mp3 | 25.5 MiB | 2010-12-30 17:32:54 |
27c3-4096-en-code_deobfuscation_by_optimization.mp3 | 22.2 MiB | 2010-12-30 17:33:04 |
27c3-4099-en-file_-_print_-_electronics.mp3 | 23.4 MiB | 2010-12-30 17:33:11 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3 | 28.2 MiB | 2010-12-30 17:33:19 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp3 | 26.4 MiB | 2010-12-30 17:33:26 |
27c3-4123-en-defense_is_not_dead.mp3 | 29.3 MiB | 2010-12-30 17:33:34 |
27c3-4125-de-spinning_the_electornic_wheel.mp3 | 28.8 MiB | 2010-12-30 17:33:49 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3 | 26.2 MiB | 2010-12-30 17:34:08 |
27c3-4141-de-hacker_jeopardy.mp3 | 61.3 MiB | 2010-12-30 17:34:32 |
27c3-4143-en-part-time_scientists.mp3 | 25.8 MiB | 2010-12-30 17:34:53 |
27c3-4144-en-a_short_political_history_of_acoustics.mp3 | 22.6 MiB | 2010-12-30 17:34:59 |
27c3-4149-en-i_control_your_code.mp3 | 28.5 MiB | 2010-12-30 17:35:09 |
27c3-4151-en-android_geolocation_using_gsm_network.mp3 | 28.7 MiB | 2010-12-30 17:56:04 |
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3 | 23.6 MiB | 2010-12-30 17:56:23 |
27c3-4174-en-the_hidden_nemesis.mp3 | 21.4 MiB | 2010-12-30 17:56:37 |
27c3-4181-en-sip_home_gateways_under_fire.mp3 | 11.3 MiB | 2010-12-30 17:56:52 |
27c3-4183-en-safety_on_the_open_sea.mp3 | 27.1 MiB | 2010-12-30 17:57:00 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3 | 26.9 MiB | 2010-12-30 17:57:08 |
27c3-4187-en-your_infrastructure_will_kill_you.mp3 | 30.6 MiB | 2010-12-30 17:57:18 |
27c3-4190-en-data_retention_in_the_eu.mp3 | 27.5 MiB | 2010-12-30 17:57:28 |
27c3-4195-de-literarischer_abend.mp3 | 25.9 MiB | 2010-12-30 17:57:41 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3 | 25.8 MiB | 2010-12-30 17:58:00 |
27c3-4206-en-immi_from_concept_to_reality.mp3 | 25.8 MiB | 2010-12-30 17:58:13 |
27c3-4208-en-wideband_gsm_sniffing.mp3 | 28.9 MiB | 2010-12-30 17:58:26 |
27c3-4046-en-all_colours_are_beautiful.mp3 | 16.1 MiB | 2011-01-02 18:33:40 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp3 | 17.7 MiB | 2011-01-02 18:33:58 |
27c3-4253-en-pentanews_game_show.mp3 | 29.5 MiB | 2011-01-02 18:34:24 |
27c3-4175-en-from_robot_to_robot.mp3 | 21.3 MiB | 2011-01-02 18:38:19 |
27c3-3957-en-ipv6_insecurities.mp3 | 24.2 MiB | 2011-01-02 18:46:17 |
27c3-4176-de-hacking_ibuttons.mp3 | 24.3 MiB | 2011-01-02 18:54:04 |
27c3-4142-en-nodejs_as_a_networking_tool.mp3 | 15.1 MiB | 2011-01-02 19:03:15 |
27c3-4265-en-hacking_smart_phones.mp3 | 33.6 MiB | 2011-01-02 19:11:40 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3 | 29.7 MiB | 2011-01-02 19:15:14 |
27c3-4070-de-fnord_jahresrueckblick.mp3 | 38.0 MiB | 2011-01-02 19:19:01 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3 | 27.4 MiB | 2011-01-02 19:28:38 |
27c3-3957-en-ipv6_insecurities.mp3.md5 | 69 B | 2011-01-02 19:34:08 |
27c3-3957-en-ipv6_insecurities.mp3.sha1 | 77 B | 2011-01-02 19:34:10 |
27c3-4046-en-all_colours_are_beautiful.mp3.md5 | 77 B | 2011-01-02 19:34:43 |
27c3-4046-en-all_colours_are_beautiful.mp3.sha1 | 85 B | 2011-01-02 19:34:43 |
27c3-4070-de-fnord_jahresrueckblick.mp3.md5 | 74 B | 2011-01-02 19:38:48 |
27c3-4070-de-fnord_jahresrueckblick.mp3.sha1 | 82 B | 2011-01-02 19:38:48 |
27c3-4142-en-nodejs_as_a_networking_tool.mp3.md5 | 79 B | 2011-01-02 19:38:49 |
27c3-4175-en-from_robot_to_robot.mp3.md5 | 71 B | 2011-01-02 19:38:50 |
27c3-4175-en-from_robot_to_robot.mp3.sha1 | 79 B | 2011-01-02 19:38:50 |
27c3-4142-en-nodejs_as_a_networking_tool.mp3.sha1 | 87 B | 2011-01-02 19:38:50 |
27c3-4176-de-hacking_ibuttons.mp3.md5 | 68 B | 2011-01-02 19:38:51 |
27c3-4176-de-hacking_ibuttons.mp3.sha1 | 76 B | 2011-01-02 19:38:52 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.md5 | 102 B | 2011-01-02 19:38:57 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.sha1 | 110 B | 2011-01-02 19:38:59 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.md5 | 95 B | 2011-01-02 19:39:02 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.sha1 | 103 B | 2011-01-02 19:39:03 |
27c3-4253-en-pentanews_game_show.mp3.md5 | 71 B | 2011-01-02 19:39:04 |
27c3-4253-en-pentanews_game_show.mp3.sha1 | 79 B | 2011-01-02 19:39:05 |
27c3-4265-en-hacking_smart_phones.mp3.md5 | 72 B | 2011-01-02 19:39:06 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.md5 | 81 B | 2011-01-02 19:39:09 |
27c3-4265-en-hacking_smart_phones.mp3.sha1 | 80 B | 2011-01-02 19:39:09 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.sha1 | 89 B | 2011-01-02 19:39:11 |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.md5 | 89 B | 2011-01-02 20:25:18 |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.sha1 | 97 B | 2011-01-02 20:25:19 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.md5 | 89 B | 2011-01-02 20:25:19 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.sha1 | 97 B | 2011-01-02 20:25:20 |
27c3-4011-en-embedded_reverse_engineering.mp3.md5 | 80 B | 2011-01-02 20:25:20 |
27c3-4017-en-desktop_on_the_linux.mp3.md5 | 72 B | 2011-01-02 20:25:21 |
27c3-4011-en-embedded_reverse_engineering.mp3.sha1 | 88 B | 2011-01-02 20:25:21 |
27c3-4017-en-desktop_on_the_linux.mp3.sha1 | 80 B | 2011-01-02 20:25:22 |
27c3-4018-en-frozencache.mp3.sha1 | 71 B | 2011-01-02 20:25:23 |
27c3-4018-en-frozencache.mp3.md5 | 63 B | 2011-01-02 20:25:23 |
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.md5 | 104 B | 2011-01-02 20:25:24 |
27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.sha1 | 112 B | 2011-01-02 20:25:24 |
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.md5 | 113 B | 2011-01-02 20:25:25 |
27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.sha1 | 121 B | 2011-01-02 20:25:26 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.md5 | 95 B | 2011-01-02 20:25:26 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.sha1 | 103 B | 2011-01-02 20:25:27 |
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.md5 | 93 B | 2011-01-02 20:25:30 |
27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.sha1 | 101 B | 2011-01-02 20:25:30 |
27c3-4082-en-sap_landscape.mp3.md5 | 65 B | 2011-01-02 20:25:31 |
27c3-4082-en-sap_landscape.mp3.sha1 | 73 B | 2011-01-02 20:25:32 |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.md5 | 96 B | 2011-01-02 20:25:33 |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.sha1 | 104 B | 2011-01-02 20:25:33 |
27c3-4087-en-console_hacking_2010.mp3.md5 | 72 B | 2011-01-02 20:25:34 |
27c3-4090-en-the_baseband_apocalypse.mp3.md5 | 75 B | 2011-01-02 20:25:35 |
27c3-4087-en-console_hacking_2010.mp3.sha1 | 80 B | 2011-01-02 20:25:35 |
27c3-4090-en-the_baseband_apocalypse.mp3.sha1 | 83 B | 2011-01-02 20:25:36 |
27c3-4096-en-code_deobfuscation_by_optimization.mp3.md5 | 86 B | 2011-01-02 20:25:36 |
27c3-4096-en-code_deobfuscation_by_optimization.mp3.sha1 | 94 B | 2011-01-02 20:25:37 |
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.md5 | 106 B | 2011-01-02 20:25:38 |
27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.sha1 | 114 B | 2011-01-02 20:25:38 |
27c3-4099-en-file_-_print_-_electronics.mp3.sha1 | 86 B | 2011-01-02 20:25:39 |
27c3-4099-en-file_-_print_-_electronics.mp3.md5 | 78 B | 2011-01-02 20:25:39 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.md5 | 82 B | 2011-01-02 20:25:40 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.sha1 | 90 B | 2011-01-02 20:25:41 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.md5 | 81 B | 2011-01-02 20:25:41 |
27c3-4123-en-defense_is_not_dead.mp3.md5 | 71 B | 2011-01-02 20:25:42 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.sha1 | 89 B | 2011-01-02 20:25:42 |
27c3-4123-en-defense_is_not_dead.mp3.sha1 | 79 B | 2011-01-02 20:25:43 |
27c3-4125-de-spinning_the_electornic_wheel.mp3.sha1 | 89 B | 2011-01-02 20:25:44 |
27c3-4125-de-spinning_the_electornic_wheel.mp3.md5 | 81 B | 2011-01-02 20:25:44 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.md5 | 101 B | 2011-01-02 20:25:45 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.sha1 | 109 B | 2011-01-02 20:25:46 |
27c3-4141-de-hacker_jeopardy.mp3.md5 | 67 B | 2011-01-02 20:25:47 |
27c3-4141-de-hacker_jeopardy.mp3.sha1 | 75 B | 2011-01-02 20:25:48 |
27c3-4143-en-part-time_scientists.mp3.md5 | 72 B | 2011-01-02 20:25:49 |
27c3-4143-en-part-time_scientists.mp3.sha1 | 80 B | 2011-01-02 20:25:50 |
27c3-4144-en-a_short_political_history_of_acoustics.mp3.md5 | 90 B | 2011-01-02 20:25:51 |
27c3-4144-en-a_short_political_history_of_acoustics.mp3.sha1 | 98 B | 2011-01-02 20:25:51 |
27c3-4149-en-i_control_your_code.mp3.md5 | 71 B | 2011-01-02 20:25:52 |
27c3-4149-en-i_control_your_code.mp3.sha1 | 79 B | 2011-01-02 20:25:53 |
27c3-4151-en-android_geolocation_using_gsm_network.mp3.md5 | 89 B | 2011-01-02 20:25:54 |
27c3-4151-en-android_geolocation_using_gsm_network.mp3.sha1 | 97 B | 2011-01-02 20:25:54 |
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.md5 | 88 B | 2011-01-02 20:25:55 |
27c3-4174-en-the_hidden_nemesis.mp3.sha1 | 78 B | 2011-01-02 20:25:56 |
27c3-4174-en-the_hidden_nemesis.mp3.md5 | 70 B | 2011-01-02 20:25:56 |
27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.sha1 | 96 B | 2011-01-02 20:25:56 |
27c3-4183-en-safety_on_the_open_sea.mp3.md5 | 74 B | 2011-01-02 20:25:57 |
27c3-4181-en-sip_home_gateways_under_fire.mp3.sha1 | 88 B | 2011-01-02 20:25:57 |
27c3-4181-en-sip_home_gateways_under_fire.mp3.md5 | 80 B | 2011-01-02 20:25:57 |
27c3-4183-en-safety_on_the_open_sea.mp3.sha1 | 82 B | 2011-01-02 20:25:58 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.md5 | 83 B | 2011-01-02 20:25:59 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.sha1 | 91 B | 2011-01-02 20:25:59 |
27c3-4187-en-your_infrastructure_will_kill_you.mp3.md5 | 85 B | 2011-01-02 20:26:00 |
27c3-4187-en-your_infrastructure_will_kill_you.mp3.sha1 | 93 B | 2011-01-02 20:26:01 |
27c3-4190-en-data_retention_in_the_eu.mp3.md5 | 76 B | 2011-01-02 20:26:01 |
27c3-4195-de-literarischer_abend.mp3.md5 | 71 B | 2011-01-02 20:26:02 |
27c3-4190-en-data_retention_in_the_eu.mp3.sha1 | 84 B | 2011-01-02 20:26:02 |
27c3-4195-de-literarischer_abend.mp3.sha1 | 79 B | 2011-01-02 20:26:03 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.md5 | 100 B | 2011-01-02 20:26:05 |
27c3-4206-en-immi_from_concept_to_reality.mp3.md5 | 80 B | 2011-01-02 20:26:06 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.sha1 | 108 B | 2011-01-02 20:26:06 |
27c3-4206-en-immi_from_concept_to_reality.mp3.sha1 | 88 B | 2011-01-02 20:26:07 |
27c3-4208-en-wideband_gsm_sniffing.mp3.md5 | 73 B | 2011-01-02 20:26:08 |
27c3-4208-en-wideband_gsm_sniffing.mp3.sha1 | 81 B | 2011-01-02 20:26:09 |
27c3-4263-en-resisting_excessive_government_surveillance.mp3 | 25.7 MiB | 2011-01-02 21:04:49 |
27c3-4234-en-usb_and_libusb.mp3 | 25.5 MiB | 2011-01-02 21:15:52 |
27c3-4326-de-radio_der_zukunft.mp3 | 35.6 MiB | 2011-01-02 23:57:11 |
27c3-4140-en-contemporary_profiling_of_web_users.mp3 | 24.7 MiB | 2011-01-03 00:01:20 |
27c3-4094-de-netzneutralitaet_und_qos.mp3 | 36.2 MiB | 2011-01-03 00:01:47 |
27c3-4094-de-netzneutralitaet_und_qos.mp3.md5 | 76 B | 2011-01-03 00:11:06 |
27c3-4094-de-netzneutralitaet_und_qos.mp3.sha1 | 84 B | 2011-01-03 00:11:07 |
27c3-4140-en-contemporary_profiling_of_web_users.mp3.md5 | 87 B | 2011-01-03 00:11:08 |
27c3-4140-en-contemporary_profiling_of_web_users.mp3.sha1 | 95 B | 2011-01-03 00:11:09 |
27c3-4234-en-usb_and_libusb.mp3.md5 | 66 B | 2011-01-03 00:11:10 |
27c3-4234-en-usb_and_libusb.mp3.sha1 | 74 B | 2011-01-03 00:11:11 |
27c3-4263-en-resisting_excessive_government_surveillance.mp3.md5 | 95 B | 2011-01-03 00:11:12 |
27c3-4263-en-resisting_excessive_government_surveillance.mp3.sha1 | 103 B | 2011-01-03 00:11:14 |
27c3-4326-de-radio_der_zukunft.mp3.md5 | 69 B | 2011-01-03 00:11:15 |
27c3-4326-de-radio_der_zukunft.mp3.sha1 | 77 B | 2011-01-03 00:11:17 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3 | 29.0 MiB | 2011-01-03 22:53:02 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp3 | 16.1 MiB | 2011-01-03 22:59:07 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3 | 29.3 MiB | 2011-01-03 23:38:44 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.md5 | 84 B | 2011-01-04 00:24:38 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.sha1 | 92 B | 2011-01-04 00:24:39 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.md5 | 98 B | 2011-01-04 00:24:39 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.sha1 | 106 B | 2011-01-04 00:24:41 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.md5 | 92 B | 2011-01-04 00:24:41 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.sha1 | 100 B | 2011-01-04 00:24:43 |
27c3-3983-en-hackers_and_computer_science.mp3 | 15.5 MiB | 2011-01-04 10:07:25 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3 | 22.8 MiB | 2011-01-04 11:40:49 |
27c3-4299-en-closing_event.mp3 | 12.5 MiB | 2011-01-04 12:22:59 |
27c3-4295-en-high_speed_high_security_cryptography.mp3 | 28.4 MiB | 2011-01-04 12:44:06 |
27c3-4338-de-wikileaks_und_mehr.mp3 | 18.6 MiB | 2011-01-04 12:53:49 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp3 | 45.7 MiB | 2011-01-04 15:37:22 |
27c3-4333-en-hacker_jeopardy_translation.mp3 | 61.2 MiB | 2011-01-04 15:40:31 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp3 | 27.4 MiB | 2011-01-04 16:12:44 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp3 | 18.6 MiB | 2011-01-04 20:25:50 |
27c3-4003-en-cybernetics_for_the_masses.mp3 | 18.0 MiB | 2011-01-04 20:53:03 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp3 | 23.3 MiB | 2011-01-04 23:56:21 |
27c3-4236-en-international_cyber_jurisdiction.mp3 | 27.0 MiB | 2011-01-04 23:58:12 |
27c3-4244-en-critical_overview_of_10_years_pet.mp3 | 24.6 MiB | 2011-01-04 23:58:17 |
27c3-4239-en-lightning_talks_d3.mp3 | 33.0 MiB | 2011-01-04 23:58:23 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp3 | 27.6 MiB | 2011-01-04 23:58:30 |
27c3-3983-en-hackers_and_computer_science.mp3.md5 | 80 B | 2011-01-05 00:12:14 |
27c3-3983-en-hackers_and_computer_science.mp3.sha1 | 88 B | 2011-01-05 00:12:15 |
27c3-4003-en-cybernetics_for_the_masses.mp3.md5 | 78 B | 2011-01-05 00:12:16 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.md5 | 93 B | 2011-01-05 00:12:17 |
27c3-4003-en-cybernetics_for_the_masses.mp3.sha1 | 86 B | 2011-01-05 00:12:17 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.sha1 | 101 B | 2011-01-05 00:12:18 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp3.md5 | 80 B | 2011-01-05 00:12:20 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp3.sha1 | 88 B | 2011-01-05 00:12:20 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.md5 | 101 B | 2011-01-05 00:12:21 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.sha1 | 109 B | 2011-01-05 00:12:22 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.md5 | 85 B | 2011-01-05 00:12:23 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.sha1 | 93 B | 2011-01-05 00:12:25 |
27c3-4236-en-international_cyber_jurisdiction.mp3.md5 | 84 B | 2011-01-05 00:12:26 |
27c3-4236-en-international_cyber_jurisdiction.mp3.sha1 | 92 B | 2011-01-05 00:12:27 |
27c3-4239-en-lightning_talks_d3.mp3.md5 | 70 B | 2011-01-05 00:12:29 |
27c3-4239-en-lightning_talks_d3.mp3.sha1 | 78 B | 2011-01-05 00:12:30 |
27c3-4244-en-critical_overview_of_10_years_pet.mp3.md5 | 85 B | 2011-01-05 00:12:31 |
27c3-4244-en-critical_overview_of_10_years_pet.mp3.sha1 | 93 B | 2011-01-05 00:12:33 |
27c3-4295-en-high_speed_high_security_cryptography.mp3.md5 | 89 B | 2011-01-05 00:12:34 |
27c3-4295-en-high_speed_high_security_cryptography.mp3.sha1 | 97 B | 2011-01-05 00:12:36 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.md5 | 82 B | 2011-01-05 00:12:37 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.sha1 | 90 B | 2011-01-05 00:12:38 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp3.md5 | 77 B | 2011-01-05 00:12:41 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp3.sha1 | 85 B | 2011-01-05 00:12:45 |
27c3-4299-en-closing_event.mp3.md5 | 65 B | 2011-01-05 00:12:46 |
27c3-4299-en-closing_event.mp3.sha1 | 73 B | 2011-01-05 00:12:47 |
27c3-4333-en-hacker_jeopardy_translation.mp3.md5 | 79 B | 2011-01-05 00:12:50 |
27c3-4333-en-hacker_jeopardy_translation.mp3.sha1 | 87 B | 2011-01-05 00:12:54 |
27c3-4338-de-wikileaks_und_mehr.mp3.md5 | 70 B | 2011-01-05 00:12:55 |
27c3-4338-de-wikileaks_und_mehr.mp3.sha1 | 78 B | 2011-01-05 00:12:57 |
27c3-4230-de-security_nightmares.mp3 | 38.6 MiB | 2011-01-05 18:56:07 |
27c3-4301-en-flow_analysis_of_internet_activities.mp3 | 26.6 MiB | 2011-01-05 18:56:18 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp3 | 16.6 MiB | 2011-01-05 18:56:27 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3 | 27.5 MiB | 2011-01-05 18:56:36 |
27c3-4221-en-omg_wtf_pdf.mp3 | 26.1 MiB | 2011-01-05 18:56:46 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp3 | 31.3 MiB | 2011-01-05 18:56:56 |
27c3-4164-de-friede_sei_mit_euren_daten.mp3 | 24.8 MiB | 2011-01-05 18:57:16 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp3 | 25.4 MiB | 2011-01-05 18:57:25 |
27c3-4211-en-chip_and_pin_is_broken.mp3 | 26.2 MiB | 2011-01-05 19:30:02 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.md5 | 89 B | 2011-01-05 19:32:19 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.sha1 | 97 B | 2011-01-05 19:32:21 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.md5 | 95 B | 2011-01-05 19:32:23 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.sha1 | 103 B | 2011-01-05 19:32:26 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.md5 | 87 B | 2011-01-05 19:32:27 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.sha1 | 95 B | 2011-01-05 19:32:30 |
27c3-4164-de-friede_sei_mit_euren_daten.mp3.md5 | 78 B | 2011-01-05 19:32:32 |
27c3-4164-de-friede_sei_mit_euren_daten.mp3.sha1 | 86 B | 2011-01-05 19:32:34 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp3.md5 | 100 B | 2011-01-05 19:32:35 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp3.sha1 | 108 B | 2011-01-05 19:32:36 |
27c3-4211-en-chip_and_pin_is_broken.mp3.md5 | 74 B | 2011-01-05 19:32:40 |
27c3-4211-en-chip_and_pin_is_broken.mp3.sha1 | 82 B | 2011-01-05 19:32:43 |
27c3-4221-en-omg_wtf_pdf.mp3.md5 | 63 B | 2011-01-05 19:32:44 |
27c3-4221-en-omg_wtf_pdf.mp3.sha1 | 71 B | 2011-01-05 19:32:47 |
27c3-4230-de-security_nightmares.mp3.md5 | 71 B | 2011-01-05 19:32:48 |
27c3-4230-de-security_nightmares.mp3.sha1 | 79 B | 2011-01-05 19:32:52 |
27c3-4301-en-flow_analysis_of_internet_activities.mp3.md5 | 88 B | 2011-01-05 19:32:53 |
27c3-4301-en-flow_analysis_of_internet_activities.mp3.sha1 | 96 B | 2011-01-05 19:32:56 |
27c3-4193-en-having_fun_with_rtp.mp3 | 16.5 MiB | 2011-01-08 10:26:03 |
27c3-4300-en-lightning_talks_d4.mp3 | 55.3 MiB | 2011-01-08 10:39:26 |
27c3-4261-en-key_recovery_attacks_rc4.mp3 | 19.1 MiB | 2011-01-08 10:40:50 |
27c3-4339-en-openleaks.mp3 | 28.1 MiB | 2011-01-08 10:44:42 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp3 | 26.8 MiB | 2011-01-08 10:47:40 |
27c3-4296-en-lightning_days_d2.mp3 | 22.6 MiB | 2011-01-08 10:50:26 |
27c3-4276-en-cognitive_psychology_for_hackers.mp3 | 29.9 MiB | 2011-01-08 11:00:21 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3 | 26.4 MiB | 2011-01-08 11:05:17 |
27c3-4210-en-lying_to_the_neighbours.mp3 | 15.8 MiB | 2011-01-08 14:14:41 |
27c3-4237-en-indect_eu_surveillance_project.mp3 | 30.3 MiB | 2011-01-08 19:24:42 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.md5 | 95 B | 2011-01-08 22:09:53 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.sha1 | 103 B | 2011-01-08 22:09:54 |
27c3-4193-en-having_fun_with_rtp.mp3.md5 | 71 B | 2011-01-08 22:09:56 |
27c3-4193-en-having_fun_with_rtp.mp3.sha1 | 79 B | 2011-01-08 22:09:57 |
27c3-4210-en-lying_to_the_neighbours.mp3.md5 | 75 B | 2011-01-08 22:10:00 |
27c3-4210-en-lying_to_the_neighbours.mp3.sha1 | 83 B | 2011-01-08 22:10:01 |
27c3-4237-en-indect_eu_surveillance_project.mp3.md5 | 82 B | 2011-01-08 22:10:02 |
27c3-4237-en-indect_eu_surveillance_project.mp3.sha1 | 90 B | 2011-01-08 22:10:03 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.md5 | 83 B | 2011-01-08 22:10:04 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.sha1 | 91 B | 2011-01-08 22:10:06 |
27c3-4261-en-key_recovery_attacks_rc4.mp3.md5 | 76 B | 2011-01-08 22:10:07 |
27c3-4261-en-key_recovery_attacks_rc4.mp3.sha1 | 84 B | 2011-01-08 22:10:09 |
27c3-4276-en-cognitive_psychology_for_hackers.mp3.md5 | 84 B | 2011-01-08 22:10:10 |
27c3-4276-en-cognitive_psychology_for_hackers.mp3.sha1 | 92 B | 2011-01-08 22:10:12 |
27c3-4296-en-lightning_days_d2.mp3.md5 | 69 B | 2011-01-08 22:10:13 |
27c3-4296-en-lightning_days_d2.mp3.sha1 | 77 B | 2011-01-08 22:10:15 |
27c3-4300-en-lightning_talks_d4.mp3.md5 | 70 B | 2011-01-08 22:10:17 |
27c3-4300-en-lightning_talks_d4.mp3.sha1 | 78 B | 2011-01-08 22:10:20 |
27c3-4339-en-openleaks.mp3.md5 | 61 B | 2011-01-08 22:10:22 |
27c3-4339-en-openleaks.mp3.sha1 | 69 B | 2011-01-08 22:10:24 |
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3 | 38.0 MiB | 2011-01-10 12:56:14 |
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.md5 | 91 B | 2011-01-10 16:00:54 |
27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.sha1 | 99 B | 2011-01-10 16:00:55 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3 | 25.6 MiB | 2011-01-10 21:13:32 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.md5 | 103 B | 2011-01-10 21:16:44 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.sha1 | 111 B | 2011-01-10 21:16:45 |
27c3-4061-en-building_custom_disassemblers.mp3 | 33.1 MiB | 2011-01-12 12:05:21 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp3 | 20.2 MiB | 2011-01-12 12:12:19 |
27c3-4061-en-building_custom_disassemblers.mp3.md5 | 81 B | 2011-01-12 12:27:05 |
27c3-4061-en-building_custom_disassemblers.mp3.sha1 | 89 B | 2011-01-12 12:27:06 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.md5 | 81 B | 2011-01-12 12:27:27 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.sha1 | 89 B | 2011-01-12 12:27:28 |
27c3-4060-en-attacking_mobile_phones.mp3 | 28.1 MiB | 2011-01-13 23:15:36 |
27c3-4060-en-attacking_mobile_phones.mp3.md5 | 75 B | 2011-01-14 09:24:14 |
27c3-4060-en-attacking_mobile_phones.mp3.sha1 | 83 B | 2011-01-14 09:24:14 |
27c3.mp3.all.md5 | 7.6 KiB | 2011-01-18 06:41:13 |
27c3.mp3.all.sha1 | 8.3 KiB | 2011-01-18 06:45:45 |