Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/cdn.media.ccc.de/congress/2012/mp3-audio-only/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
29c3-5203-en-omg_oer_mp3.mp3.sha171 B2013-01-04 22:44:22
29c3-5140-en-safecast_mp3.mp3.sha172 B2012-12-29 22:12:51
29c3-5085-en-everycook_mp3.mp3.sha173 B2012-12-30 10:01:38
29c3-5275-en-facthacks_mp3.mp3.sha173 B2012-12-29 16:12:02
29c3-5404-en-noc_review_mp3.mp3.sha174 B2013-01-04 19:49:25
29c3-5102-de-en-digiges_mp3.mp3.sha174 B2012-12-30 01:45:01
29c3-5104-en-esxi_beast_mp3.mp3.sha174 B2012-12-29 22:16:57
29c3-5239-en-smart_meter_mp3.mp3.sha175 B2012-12-29 22:06:41
29c3-5390-en-tacticaltech_mp3.mp3.sha176 B2013-01-04 23:17:11
29c3-5399-en-opening_event_mp3.mp3.sha177 B2012-12-29 16:05:52
29c3-5289-de-en-meldegesetz_mp3.mp3.sha178 B2012-12-29 21:23:35
29c3-5112-en-isps_black_box_mp3.mp3.sha178 B2013-01-11 01:27:56
29c3-5138-en-romantichackers_mp3.mp3.sha179 B2013-01-04 22:40:14
29c3-5316-en-lightningtalks1_mp3.mp3.sha179 B2012-12-29 21:27:42
29c3-5282-de-en-rfidkleidung_mp3.mp3.sha179 B2013-01-04 23:31:35
29c3-5210-en-on_breaking_saml_mp3.mp3.sha180 B2013-01-04 23:42:48
29c3-5037-de-en-nougatbytes10_mp3.mp3.sha180 B2012-12-29 20:21:01
29c3-5384-en-lightning_talks_3_mp3.mp3.sha181 B2013-01-04 21:46:34
29c3-5385-en-not_my_department_mp3.mp3.sha181 B2012-12-29 16:07:55
29c3-5398-en-closing_event2012_mp3.mp3.sha181 B2013-01-04 19:45:17
29c3-5059-en-scada_strangelove_mp3.mp3.sha181 B2012-12-30 09:40:41
29c3-5383-en-lightning_talks_2_mp3.mp3.sha181 B2013-01-02 15:40:23
29c3-5309-de-en-hacker_jeopardy_mp3.mp3.sha182 B2012-12-30 09:44:48
29c3-5382-de-en-antiterrordatei_mp3.mp3.sha182 B2012-12-29 18:00:40
29c3-5419-de-podcaster_workshop_mp3.mp3.sha182 B2013-01-13 22:15:34
29c3-5395-en-howto_hack_the_law_mp3.mp3.sha182 B2012-12-29 17:58:37
29c3-5195-en-executable_metadata_mp3.mp3.sha183 B2013-01-04 19:50:27
29c3-5338-en-enemies_of_the_state_mp3.mp3.sha184 B2012-12-29 20:10:45
29c3-5160-en-transparenzgesetz_hh_mp3.mp3.sha184 B2012-12-29 21:25:39
29c3-5400-en-hacking_cisco_phones_mp3.mp3.sha184 B2012-12-29 20:18:58
29c3-5380-de-en-staatstrojaner2012_mp3.mp3.sha185 B2012-12-29 21:31:49
29c3-5179-de-en-hacking_philosophy_mp3.mp3.sha185 B2013-01-04 23:51:07
29c3-5226-en-further_hacks_calypso_mp3.mp3.sha185 B2013-01-04 23:08:59
29c3-5177-en-securing_the_campaign_mp3.mp3.sha185 B2012-12-30 17:32:57
29c3-5417-en-cve_2011_3402_analysis_mp3.mp3.sha186 B2013-01-04 23:10:02
29c3-5159-en-defend_freedoms_online_mp3.mp3.sha186 B2012-12-29 20:08:42
29c3-5401-de-en-der_mord_faellt_aus_mp3.mp3.sha186 B2012-12-29 22:02:35
29c3-5219-en-how_i_met_your_pointer_mp3.mp3.sha186 B2013-01-04 23:29:31
29c3-5180-de-en-marvin_und_der_blues_mp3.mp3.sha187 B2013-01-04 21:41:25
29c3-5379-de-en-jahresrueckblick2012_mp3.mp3.sha187 B2012-12-30 01:14:05
29c3-5044-en-time_is_not_on_your_side_mp3.mp3.sha188 B2012-12-29 20:16:55
29c3-5270-de-en-hanussens_mindreading_mp3.mp3.sha188 B2012-12-29 22:19:01
29c3-5285-de-en-men_who_stare_at_bits_mp3.mp3.sha188 B2013-01-04 23:53:12
29c3-5152-en-hashflooding_dos_reloaded_mp3.mp3.sha189 B2013-01-04 22:52:38
29c3-5323-de-en-pflanzenhacken_richtig_mp3.mp3.sha189 B2013-01-04 22:41:16
29c3-5124-en-low_cost_chip_microprobing_mp3.mp3.sha190 B2012-12-30 17:15:47
29c3-5306-en-the_tor_software_ecosystem_mp3.mp3.sha190 B2013-01-04 23:21:16
29c3-5167-en-setting_mobile_phones_free_mp3.mp3.sha190 B2012-12-29 18:02:43
29c3-5216-en-let_me_answer_that_for_you_mp3.mp3.sha190 B2012-12-29 22:14:54
29c3-5402-en-russias_surveillance_state_mp3.mp3.sha190 B2012-12-30 17:15:34
29c3-5287-de-en-hinter_den_kulissen_nsu_mp3.mp3.sha190 B2012-12-29 20:02:33
29c3-5221-de-en-cyberwar_statt_cyberwar_mp3.mp3.sha190 B2012-12-29 21:21:32
29c3-5265-en-page_fault_liberation_army_mp3.mp3.sha190 B2013-01-04 19:46:19
29c3-5244-de-en-security_nightmares2012_mp3.mp3.sha190 B2013-01-04 19:52:31
29c3-5208-en-accessibility_and_security_mp3.mp3.sha190 B2012-12-30 01:30:42
29c3-5077-en-ethics_in_security_research_mp3.mp3.sha191 B2013-01-04 23:39:44
29c3-5178-en-the_ultimate_galaksija_talk_mp3.mp3.sha191 B2013-01-04 21:38:18
29c3-5299-de-en-best_of_verfassungsschutz_mp3.mp3.sha192 B2013-01-04 22:04:53
29c3-5396-de-en-gender_studies_informatik_mp3.mp3.sha192 B2012-12-29 22:00:32
29c3-5266-de-en-proximax_telex_flashproxy_mp3.mp3.sha192 B2013-01-04 21:40:22
29c3-5393-en-milking_the_digital_cash_cow_mp3.mp3.sha192 B2012-12-30 12:38:54
29c3-5198-en-de-fnord_jahresrueckblick2012_mp3.mp3.sha193 B2012-12-30 09:46:52
29c3-5397-de-en-indect_verhaltenserkennung_mp3.mp3.sha193 B2013-01-04 14:05:51
29c3-5333-en-gsm_cell_phone_network_review_mp3.mp3.sha193 B2013-01-04 21:45:31
29c3-5305-en-long_live_the_protocoletariat_mp3.mp3.sha193 B2013-01-04 23:49:02
29c3-5319-en-certificate_authority_collapse_mp3.mp3.sha194 B2012-12-29 21:29:45
29c3-5134-en-new_human_interfaces_for_music_mp3.mp3.sha194 B2012-12-29 20:12:49
29c3-5274-en-grand_eu_data_protection_reform_mp3.mp3.sha195 B2012-12-29 19:58:26
29c3-5121-de-en-sind_faire_computer_moeglich_mp3.mp3.sha195 B2013-01-04 23:25:22
29c3-5368-de-en-ifg_chance_oder_buergerbluff_mp3.mp3.sha195 B2013-01-04 23:26:24
29c3-5283-de-en-whiteit_cleanit_ceocoalition_mp3.mp3.sha195 B2012-12-29 20:06:39
29c3-5024-en-hackers_as_a_highrisk_population_mp3.mp3.sha196 B2012-12-29 22:10:48
29c3-5262-de-en-anderthalb_jahre_fragdenstaat_mp3.mp3.sha196 B2012-12-29 16:09:59
29c3-5327-en-writing_a_thumbdrive_from_scratch_mp3.mp3.sha197 B2012-12-30 12:24:30
29c3-5095-en-privacy_and_the_car_of_the_future_mp3.mp3.sha197 B2012-12-29 20:04:36
29c3-5336-de-en-sprache_ungleichheit_unfreiheit_mp3.mp3.sha198 B2013-01-04 22:02:49
29c3-5301-en-defeating_windows_memory_forensics_mp3.mp3.sha198 B2012-12-29 22:08:44
29c3-5181-de-die_wahrheit_was_wirklich_passierte_mp3.mp3.sha199 B2013-01-11 01:24:50
29c3-5206-en-the_ethics_of_activists_ddos_actions_mp3.mp3.sha1100 B2012-12-29 20:14:52
29c3-5146-en-an_overview_of_secure_name_resolution_mp3.mp3.sha1101 B2013-01-04 23:46:56
29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_mp3.mp3.sha1102 B2012-12-29 20:00:30
29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_mp3.mp3.sha1104 B2013-01-02 15:55:26
29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_mp3.mp3.sha1104 B2013-01-05 18:17:48
29c3-5308-de-en-open_source_schluessel_und_schloesser_mp3.mp3.sha1104 B2012-12-30 12:32:45
29c3-5230-en-stylometry_and_online_underground_markets_mp3.mp3.sha1105 B2013-01-04 23:33:39
29c3-5237-en-a_rambling_walk_through_an_emv_transaction_mp3.mp3.sha1106 B2012-12-30 17:16:00
29c3-5225-en-security_evaluation_of_russian_gost_cipher_mp3.mp3.sha1106 B2012-12-30 01:32:45
29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_mp3.mp3.sha1111 B2012-12-30 12:36:51
29c3-5256-en-the_future_of_protocol_reversing_and_simulation_mp3.mp3.sha1111 B2013-01-04 22:34:06
29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_mp3.mp3.sha1112 B2013-01-04 21:54:43
29c3-5123-en-small_footprint_inspection_techniques_for_android_mp3.mp3.sha1113 B2013-01-04 23:44:52
29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_mp3.mp3.sha1116 B2013-01-11 01:30:00
29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_mp3.mp3.sha1118 B2012-12-30 17:32:44
29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_mp3.mp3.sha1120 B2013-01-06 22:22:23
29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_mp3.mp3.sha1125 B2013-01-04 22:38:10
29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_mp3.mp3.sha1127 B2012-12-29 22:04:38
29c3.mp3.all.sha18.5 KiB2013-01-14 12:13:13
29c3-5399-en-opening_event_mp3.mp314.6 MiB2012-12-29 14:10:10
29c3-5210-en-on_breaking_saml_mp3.mp331.7 MiB2013-01-04 23:40:32
29c3-5378-de-en-stabilitaetsanker_wachstumslokomotive_mp3.mp335.3 MiB2013-01-05 18:15:45
29c3-5138-en-romantichackers_mp3.mp337.2 MiB2013-01-04 22:37:59
29c3-5390-en-tacticaltech_mp3.mp341.7 MiB2013-01-04 23:15:42
29c3-5077-en-ethics_in_security_research_mp3.mp342.6 MiB2013-01-04 23:38:29
29c3-5091-de-en-unsicherheit_hardwarebasierter_festplattenverschluesselung_mp3.mp346.1 MiB2013-01-04 22:36:55
29c3-5208-en-accessibility_and_security_mp3.mp347.5 MiB2012-12-30 00:49:39
29c3-5404-en-noc_review_mp3.mp351.9 MiB2013-01-04 19:47:35
29c3-5398-en-closing_event2012_mp3.mp355.1 MiB2013-01-04 19:44:18
29c3-5180-de-en-marvin_und_der_blues_mp3.mp355.5 MiB2013-01-04 21:36:28
29c3-5203-en-omg_oer_mp3.mp355.7 MiB2013-01-04 22:43:12
29c3-5221-de-en-cyberwar_statt_cyberwar_mp3.mp357.8 MiB2012-12-29 21:08:02
29c3-5368-de-en-ifg_chance_oder_buergerbluff_mp3.mp358.3 MiB2013-01-04 23:26:02
29c3-5270-de-en-hanussens_mindreading_mp3.mp361.4 MiB2012-12-29 21:24:55
29c3-5164-de-en-sharing_access_risiken_beim_betrieb_von_wlan_netzen_mp3.mp361.5 MiB2012-12-30 17:32:30
29c3-5088-en-many_tamagotchis_were_harmed_in_the_making_of_this_presentation_mp3.mp361.7 MiB2012-12-29 21:13:37
29c3-5104-en-esxi_beast_mp3.mp362.1 MiB2012-12-29 21:25:19
29c3-5226-en-further_hacks_calypso_mp3.mp362.6 MiB2013-01-04 23:05:55
29c3-5206-en-the_ethics_of_activists_ddos_actions_mp3.mp363.3 MiB2012-12-29 19:16:48
29c3-5123-en-small_footprint_inspection_techniques_for_android_mp3.mp364.7 MiB2013-01-04 23:42:06
29c3-5216-en-let_me_answer_that_for_you_mp3.mp366.8 MiB2012-12-29 21:44:19
29c3-5140-en-safecast_mp3.mp366.9 MiB2012-12-29 21:44:43
29c3-5285-de-en-men_who_stare_at_bits_mp3.mp367.3 MiB2013-01-04 23:48:30
29c3-5134-en-new_human_interfaces_for_music_mp3.mp368.2 MiB2012-12-29 19:17:53
29c3-5178-en-the_ultimate_galaksija_talk_mp3.mp369.6 MiB2013-01-04 21:37:32
29c3-5205-en-analytical_summary_of_the_blackhole_exploit_kit_mp3.mp370.0 MiB2012-12-30 12:30:32
29c3-5308-de-en-open_source_schluessel_und_schloesser_mp3.mp370.5 MiB2012-12-30 12:26:07
29c3-5095-en-privacy_and_the_car_of_the_future_mp3.mp371.8 MiB2012-12-29 18:53:18
29c3-5177-en-securing_the_campaign_mp3.mp371.8 MiB2012-12-30 17:32:45
29c3-5396-de-en-gender_studies_informatik_mp3.mp372.8 MiB2012-12-29 21:18:01
29c3-5112-en-isps_black_box_mp3.mp373.7 MiB2013-01-11 01:26:59
29c3-5301-en-defeating_windows_memory_forensics_mp3.mp374.1 MiB2012-12-29 21:20:14
29c3-5044-en-time_is_not_on_your_side_mp3.mp374.3 MiB2012-12-29 19:21:41
29c3-5400-en-hacking_cisco_phones_mp3.mp374.4 MiB2012-12-29 19:19:17
29c3-5085-en-everycook_mp3.mp374.7 MiB2012-12-30 09:51:50
29c3-5262-de-en-anderthalb_jahre_fragdenstaat_mp3.mp375.4 MiB2012-12-29 14:12:54
29c3-5283-de-en-whiteit_cleanit_ceocoalition_mp3.mp375.4 MiB2012-12-29 18:56:03
29c3-5385-en-not_my_department_mp3.mp376.3 MiB2012-12-29 14:11:09
29c3-5219-en-how_i_met_your_pointer_mp3.mp376.4 MiB2013-01-04 23:27:37
29c3-5395-en-howto_hack_the_law_mp3.mp376.4 MiB2012-12-29 17:41:12
29c3-5059-en-scada_strangelove_mp3.mp376.6 MiB2012-12-30 09:36:21
29c3-5160-en-transparenzgesetz_hh_mp3.mp376.7 MiB2012-12-29 20:57:49
29c3-5382-de-en-antiterrordatei_mp3.mp377.3 MiB2012-12-29 17:44:42
29c3-5181-de-die_wahrheit_was_wirklich_passierte_mp3.mp377.4 MiB2013-01-11 01:21:14
29c3-5152-en-hashflooding_dos_reloaded_mp3.mp377.6 MiB2013-01-04 22:51:31
29c3-5402-en-russias_surveillance_state_mp3.mp377.7 MiB2012-12-30 17:14:22
29c3-5265-en-page_fault_liberation_army_mp3.mp377.9 MiB2013-01-04 19:45:23
29c3-5333-en-gsm_cell_phone_network_review_mp3.mp379.0 MiB2013-01-04 21:44:30
29c3-5127-de-siechtum_und_sterben_der_aerztlichen_schweigepflicht_mp3.mp379.2 MiB2013-01-11 01:24:22
29c3-5282-de-en-rfidkleidung_mp3.mp379.5 MiB2013-01-04 23:28:44
29c3-5179-de-en-hacking_philosophy_mp3.mp379.6 MiB2013-01-04 23:46:54
29c3-5167-en-setting_mobile_phones_free_mp3.mp379.9 MiB2012-12-29 17:48:15
29c3-5417-en-cve_2011_3402_analysis_mp3.mp380.5 MiB2013-01-04 23:09:03
29c3-5401-de-en-der_mord_faellt_aus_mp3.mp380.6 MiB2012-12-29 21:16:37
29c3-5121-de-en-sind_faire_computer_moeglich_mp3.mp380.9 MiB2013-01-04 23:23:57
29c3-5225-en-security_evaluation_of_russian_gost_cipher_mp3.mp380.9 MiB2012-12-30 01:12:02
29c3-5393-en-milking_the_digital_cash_cow_mp3.mp381.0 MiB2012-12-30 12:32:59
29c3-5299-de-en-best_of_verfassungsschutz_mp3.mp381.0 MiB2013-01-04 22:03:28
29c3-5239-en-smart_meter_mp3.mp381.2 MiB2012-12-29 21:22:36
29c3-5237-en-a_rambling_walk_through_an_emv_transaction_mp3.mp381.3 MiB2012-12-30 17:05:38
29c3-5280-en-miilions_of_lesson_learned_on_electronic_napkins_mp3.mp381.3 MiB2013-01-04 21:47:07
29c3-5102-de-en-digiges_mp3.mp381.3 MiB2012-12-30 01:17:49
29c3-5289-de-en-meldegesetz_mp3.mp381.3 MiB2012-12-29 20:49:59
29c3-5146-en-an_overview_of_secure_name_resolution_mp3.mp381.4 MiB2013-01-04 23:44:12
29c3-5266-de-en-proximax_telex_flashproxy_mp3.mp381.9 MiB2013-01-04 21:39:08
29c3-5274-en-grand_eu_data_protection_reform_mp3.mp382.4 MiB2012-12-29 17:51:03
29c3-5124-en-low_cost_chip_microprobing_mp3.mp382.8 MiB2012-12-30 17:14:43
29c3-5323-de-en-pflanzenhacken_richtig_mp3.mp383.0 MiB2013-01-04 22:40:04
29c3-5101-de-en-privatisierung_der_rechtsdurchsetzung_mp3.mp383.0 MiB2013-01-02 15:53:54
29c3-5287-de-en-hinter_den_kulissen_nsu_mp3.mp383.0 MiB2012-12-29 18:52:42
29c3-5319-en-certificate_authority_collapse_mp3.mp383.3 MiB2012-12-29 21:06:58
29c3-5024-en-hackers_as_a_highrisk_population_mp3.mp383.5 MiB2012-12-29 21:20:44
29c3-5195-en-executable_metadata_mp3.mp383.8 MiB2013-01-04 19:48:41
29c3-5159-en-defend_freedoms_online_mp3.mp384.4 MiB2012-12-29 18:55:12
29c3-5263-de-en-mehr_transparenz_und_teilhabe_im_gesetzgebungsprozess_mp3.mp386.8 MiB2013-01-06 22:21:05
29c3-5397-de-en-indect_verhaltenserkennung_mp3.mp386.8 MiB2013-01-04 14:02:28
29c3-5327-en-writing_a_thumbdrive_from_scratch_mp3.mp387.3 MiB2012-12-30 12:19:26
29c3-5305-en-long_live_the_protocoletariat_mp3.mp387.3 MiB2013-01-04 23:45:48
29c3-5374-en-re_igniting_the_crypto_wars_on_the_web_mp3.mp388.3 MiB2012-12-29 18:51:59
29c3-5230-en-stylometry_and_online_underground_markets_mp3.mp388.5 MiB2013-01-04 23:31:20
29c3-5336-de-en-sprache_ungleichheit_unfreiheit_mp3.mp390.3 MiB2013-01-04 22:01:52
29c3-5306-en-the_tor_software_ecosystem_mp3.mp393.6 MiB2013-01-04 23:17:47
29c3-5256-en-the_future_of_protocol_reversing_and_simulation_mp3.mp394.0 MiB2013-01-04 22:33:20
29c3-5380-de-en-staatstrojaner2012_mp3.mp397.4 MiB2012-12-29 21:02:24
29c3-5275-en-facthacks_mp3.mp3104.1 MiB2012-12-29 14:09:05
29c3-5244-de-en-security_nightmares2012_mp3.mp3114.3 MiB2013-01-04 19:45:58
29c3-5198-en-de-fnord_jahresrueckblick2012_mp3.mp3117.4 MiB2012-12-30 09:42:41
29c3-5037-de-en-nougatbytes10_mp3.mp3122.7 MiB2012-12-29 19:35:30
29c3-5379-de-en-jahresrueckblick2012_mp3.mp3127.9 MiB2012-12-30 00:53:59
29c3-5419-de-podcaster_workshop_mp3.mp3132.4 MiB2013-01-13 19:20:27
29c3-5316-en-lightningtalks1_mp3.mp3173.6 MiB2012-12-29 21:06:18
29c3-5338-en-enemies_of_the_state_mp3.mp3190.3 MiB2012-12-29 18:54:33
29c3-5383-en-lightning_talks_2_mp3.mp3201.1 MiB2013-01-02 15:37:10
29c3-5309-de-en-hacker_jeopardy_mp3.mp3222.9 MiB2012-12-30 09:38:56
29c3-5384-en-lightning_talks_3_mp3.mp3223.6 MiB2013-01-04 21:42:51