Index of /Mirrors/CCC/25C3/audio_only
Name
Last modified
Size
Description
Parent Directory
-
25c3-2596-en-swf_and_the_malware_tragedy.mp3
2009-01-11 22:42
22M
25c3-2596-en-swf_and_the_malware_tragedy.mp3.md5
2009-01-11 22:42
79
25c3-2596-en-swf_and_the_malware_tragedy.ogg
2009-01-11 22:42
20M
25c3-2596-en-swf_and_the_malware_tragedy.ogg.md5
2009-01-11 22:42
79
25c3-2639-en-attacking_nfc_mobile_phones.mp3
2009-01-12 02:38
38M
25c3-2639-en-attacking_nfc_mobile_phones.mp3.md5
2009-01-12 02:38
79
25c3-2639-en-attacking_nfc_mobile_phones.ogg
2009-01-12 02:39
34M
25c3-2639-en-attacking_nfc_mobile_phones.ogg.md5
2009-01-12 02:38
79
25c3-2665-en-the_trust_situation.mp3
2008-12-29 13:25
28M
25c3-2665-en-the_trust_situation.mp3.md5
2009-01-06 21:21
71
25c3-2665-en-the_trust_situation.ogg
2008-12-29 16:36
25M
25c3-2665-en-the_trust_situation.ogg.md5
2009-01-06 21:21
71
25c3-2669-en-collapsing_the_european_security_architecture.mp3
2009-01-12 02:38
27M
25c3-2669-en-collapsing_the_european_security_architecture.mp3.md5
2009-01-12 02:38
97
25c3-2669-en-collapsing_the_european_security_architecture.ogg
2009-01-12 02:39
24M
25c3-2669-en-collapsing_the_european_security_architecture.ogg.md5
2009-01-12 02:38
97
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3
2008-12-29 03:11
27M
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3.md5
2009-01-06 21:21
119
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg
2008-12-29 14:53
24M
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg.md5
2009-01-06 21:21
119
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp3
2009-01-06 21:42
22M
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp3.md5
2009-01-06 21:41
138
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg
2009-01-06 21:46
20M
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg.md5
2009-01-06 21:41
138
25c3-2681-en-repurposing_the_ti_ez430u.mp3
2008-12-30 00:06
15M
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5
2009-01-06 21:21
77
25c3-2681-en-repurposing_the_ti_ez430u.ogg
2008-12-30 02:51
14M
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5
2009-01-06 21:21
77
25c3-2734-en-short_attention_span_security.mp3
2009-01-12 02:38
24M
25c3-2734-en-short_attention_span_security.mp3.md5
2009-01-12 02:38
81
25c3-2734-en-short_attention_span_security.ogg
2009-01-12 02:39
22M
25c3-2734-en-short_attention_span_security.ogg.md5
2009-01-12 02:38
81
25c3-2773-en-soviet_unterzoegersdorf.mp3
2008-12-30 00:20
36M
25c3-2773-en-soviet_unterzoegersdorf.mp3.md5
2009-01-06 21:21
75
25c3-2773-en-soviet_unterzoegersdorf.ogg
2008-12-30 02:47
32M
25c3-2773-en-soviet_unterzoegersdorf.ogg.md5
2009-01-06 21:21
75
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp3
2009-01-12 02:38
16M
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp3.md5
2009-01-12 02:38
91
25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg
2009-01-12 02:39
15M
25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg.md5
2009-01-12 02:38
91
25c3-2781-en-objects_as_software_the_coming_revolution.mp3
2009-01-11 22:42
24M
25c3-2781-en-objects_as_software_the_coming_revolution.mp3.md5
2009-01-11 22:42
93
25c3-2781-en-objects_as_software_the_coming_revolution.ogg
2009-01-11 22:42
21M
25c3-2781-en-objects_as_software_the_coming_revolution.ogg.md5
2009-01-11 22:42
93
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp3
2009-01-06 21:42
30M
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp3.md5
2009-01-06 21:41
106
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg
2009-01-06 21:46
27M
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg.md5
2009-01-06 21:41
106
25c3-2799-en-console_hacking_2008_wii_fail.mp3
2008-12-29 16:38
26M
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5
2009-01-06 21:21
81
25c3-2799-en-console_hacking_2008_wii_fail.ogg
2008-12-29 14:53
23M
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5
2009-01-06 21:21
81
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3
2008-12-29 14:16
30M
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3.md5
2009-01-06 21:21
102
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg
2008-12-29 14:16
27M
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg.md5
2009-01-06 21:21
102
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3
2009-01-23 00:28
24M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3.md5
2009-01-23 00:28
98
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg
2009-01-23 00:28
21M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg.md5
2009-01-23 00:28
98
25c3-2812-de-fnord_news_show.mp3
2008-12-29 23:08
23M
25c3-2812-de-fnord_news_show.mp3.md5
2009-01-06 21:21
67
25c3-2812-de-fnord_news_show.ogg
2008-12-29 23:08
20M
25c3-2812-de-fnord_news_show.ogg.md5
2009-01-06 21:21
67
25c3-2814-de-datenpannen.mp3
2008-12-29 16:12
24M
25c3-2814-de-datenpannen.mp3.md5
2009-01-06 21:21
63
25c3-2814-de-datenpannen.ogg
2008-12-29 16:16
22M
25c3-2814-de-datenpannen.ogg.md5
2009-01-06 21:21
63
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3
2008-12-29 16:10
22M
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3.md5
2009-01-06 21:21
83
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg
2008-12-29 16:21
20M
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg.md5
2009-01-06 21:21
83
25c3-2816-en-cisco_ios_attack_and_defense.mp3
2009-01-06 21:42
30M
25c3-2816-en-cisco_ios_attack_and_defense.mp3.md5
2009-01-06 21:41
80
25c3-2816-en-cisco_ios_attack_and_defense.ogg
2009-01-06 21:46
25M
25c3-2816-en-cisco_ios_attack_and_defense.ogg.md5
2009-01-06 21:41
80
25c3-2827-de-u23.mp3
2008-12-30 00:19
23M
25c3-2827-de-u23.mp3.md5
2009-01-06 21:21
55
25c3-2827-de-u23.ogg
2008-12-30 02:46
20M
25c3-2827-de-u23.ogg.md5
2009-01-06 21:21
55
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp3
2009-01-08 00:08
20M
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp3.md5
2009-01-08 00:08
86
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg
2009-01-08 00:09
18M
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg.md5
2009-01-08 00:08
86
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp3
2009-01-06 21:42
17M
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp3.md5
2009-01-06 21:41
99
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg
2009-01-06 21:46
15M
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg.md5
2009-01-06 21:41
99
25c3-2832-en-exploiting_symbian.mp3
2008-12-29 15:22
29M
25c3-2832-en-exploiting_symbian.mp3.md5
2009-01-06 21:21
70
25c3-2832-en-exploiting_symbian.ogg
2008-12-29 15:22
26M
25c3-2832-en-exploiting_symbian.ogg.md5
2009-01-06 21:21
70
25c3-2839-en-cracking_the_msp430_bsl.mp3
2008-12-29 16:08
17M
25c3-2839-en-cracking_the_msp430_bsl.mp3.md5
2009-01-06 21:21
75
25c3-2839-en-cracking_the_msp430_bsl.ogg
2008-12-29 14:24
15M
25c3-2839-en-cracking_the_msp430_bsl.ogg.md5
2009-01-06 21:21
75
25c3-2843-en-algorithmic_music_in_a_box.mp3
2009-01-08 00:09
23M
25c3-2843-en-algorithmic_music_in_a_box.mp3.md5
2009-01-08 00:08
78
25c3-2843-en-algorithmic_music_in_a_box.ogg
2009-01-08 00:10
21M
25c3-2843-en-algorithmic_music_in_a_box.ogg.md5
2009-01-08 00:08
78
25c3-2845-en-rf_fingerprinting_of_rfid.mp3
2008-12-29 15:34
20M
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5
2009-01-06 21:21
77
25c3-2845-en-rf_fingerprinting_of_rfid.ogg
2008-12-29 14:21
18M
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5
2009-01-06 21:21
77
25c3-2860-de-neusprech_im_berwachungsstaat.mp3
2008-12-30 02:47
32M
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5
2009-01-06 21:21
81
25c3-2860-de-neusprech_im_berwachungsstaat.ogg
2008-12-30 02:48
29M
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5
2009-01-06 21:21
81
25c3-2863-en-climate_change_-_state_of_the_science.mp3
2009-01-13 17:59
30M
25c3-2863-en-climate_change_-_state_of_the_science.mp3.md5
2009-01-13 17:59
89
25c3-2863-en-climate_change_-_state_of_the_science.ogg
2009-01-13 17:59
26M
25c3-2863-en-climate_change_-_state_of_the_science.ogg.md5
2009-01-13 17:59
89
25c3-2872-en-the_privacy_workshop_project.mp3
2008-12-30 00:20
22M
25c3-2872-en-the_privacy_workshop_project.mp3.md5
2009-01-06 21:21
80
25c3-2872-en-the_privacy_workshop_project.ogg
2008-12-30 02:50
20M
25c3-2872-en-the_privacy_workshop_project.ogg.md5
2009-01-06 21:21
80
25c3-2873-en-privacy_in_the_social_semantic_web.mp3
2008-12-30 00:02
21M
25c3-2873-en-privacy_in_the_social_semantic_web.mp3.md5
2009-01-06 21:21
86
25c3-2873-en-privacy_in_the_social_semantic_web.ogg
2008-12-30 02:45
19M
25c3-2873-en-privacy_in_the_social_semantic_web.ogg.md5
2009-01-06 21:21
86
25c3-2874-en-the_ultimate_commodore_64_talk.mp3
2009-01-11 22:42
28M
25c3-2874-en-the_ultimate_commodore_64_talk.mp3.md5
2009-01-11 22:42
82
25c3-2874-en-the_ultimate_commodore_64_talk.ogg
2009-01-11 22:42
25M
25c3-2874-en-the_ultimate_commodore_64_talk.ogg.md5
2009-01-11 22:42
82
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp3
2009-01-08 00:09
21M
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp3.md5
2009-01-08 00:08
96
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg
2009-01-08 00:10
19M
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg.md5
2009-01-08 00:08
96
25c3-2882-en-full-disk-encryption_crash-course.mp3
2008-12-29 14:54
22M
25c3-2882-en-full-disk-encryption_crash-course.mp3.md5
2009-01-06 21:21
85
25c3-2882-en-full-disk-encryption_crash-course.ogg
2008-12-29 15:01
20M
25c3-2882-en-full-disk-encryption_crash-course.ogg.md5
2009-01-06 21:21
85
25c3-2890-en-scalable_swarm_robotics.mp3
2008-12-29 15:28
18M
25c3-2890-en-scalable_swarm_robotics.mp3.md5
2009-01-06 21:21
75
25c3-2890-en-scalable_swarm_robotics.ogg
2008-12-29 14:19
16M
25c3-2890-en-scalable_swarm_robotics.ogg.md5
2009-01-06 21:21
75
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3
2008-12-29 15:11
20M
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5
2009-01-06 21:21
80
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg
2008-12-29 15:11
19M
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5
2009-01-06 21:21
80
25c3-2893-en-attacking_rich_internet_applications.mp3
2009-01-06 21:42
28M
25c3-2893-en-attacking_rich_internet_applications.mp3.md5
2009-01-06 21:41
88
25c3-2893-en-attacking_rich_internet_applications.ogg
2009-01-06 21:46
25M
25c3-2893-en-attacking_rich_internet_applications.ogg.md5
2009-01-06 21:41
88
25c3-2895-de-der_elektronische_personalausweis.mp3
2009-01-11 22:42
27M
25c3-2895-de-der_elektronische_personalausweis.mp3.md5
2009-01-11 22:42
85
25c3-2895-de-der_elektronische_personalausweis.ogg
2009-01-11 22:42
24M
25c3-2895-de-der_elektronische_personalausweis.ogg.md5
2009-01-11 22:42
85
25c3-2896-en-chip_reverse_engineering.mp3
2008-12-29 13:17
20M
25c3-2896-en-chip_reverse_engineering.mp3.md5
2009-01-06 21:21
76
25c3-2896-en-chip_reverse_engineering.ogg
2008-12-29 14:07
18M
25c3-2896-en-chip_reverse_engineering.ogg.md5
2009-01-06 21:21
76
25c3-2899-en-mining_social_contacts_with_active_rfid.mp3
2009-01-06 21:43
27M
25c3-2899-en-mining_social_contacts_with_active_rfid.mp3.md5
2009-01-06 21:41
91
25c3-2899-en-mining_social_contacts_with_active_rfid.ogg
2009-01-06 21:46
24M
25c3-2899-en-mining_social_contacts_with_active_rfid.ogg.md5
2009-01-06 21:41
91
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3
2008-12-29 13:55
23M
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3.md5
2009-01-06 21:21
86
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg
2008-12-29 16:29
20M
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg.md5
2009-01-06 21:21
86
25c3-2904-en-solar-powering_your_geek_gear.mp3
2008-12-29 13:05
13M
25c3-2904-en-solar-powering_your_geek_gear.mp3.md5
2009-01-06 21:21
81
25c3-2904-en-solar-powering_your_geek_gear.ogg
2008-12-29 19:27
12M
25c3-2904-en-solar-powering_your_geek_gear.ogg.md5
2009-01-06 21:21
81
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp3
2009-01-12 02:39
33M
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp3.md5
2009-01-12 02:38
102
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg
2009-01-12 02:39
30M
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg.md5
2009-01-12 02:38
102
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3
2008-12-29 16:11
14M
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3.md5
2009-01-06 21:21
89
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg
2008-12-29 14:12
12M
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg.md5
2009-01-06 21:21
89
25c3-2916-en-wikileaks.mp3
2009-01-11 22:42
27M
25c3-2916-en-wikileaks.mp3.md5
2009-01-11 22:42
61
25c3-2916-en-wikileaks.ogg
2009-01-11 22:42
24M
25c3-2916-en-wikileaks.ogg.md5
2009-01-11 22:42
61
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3
2008-12-29 16:13
27M
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3.md5
2009-01-06 21:21
99
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg
2008-12-29 16:22
24M
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg.md5
2009-01-06 21:21
99
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp3
2009-01-06 21:43
25M
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp3.md5
2009-01-06 21:41
92
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg
2009-01-06 21:47
22M
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg.md5
2009-01-06 21:41
92
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg
2008-12-29 14:16
29M
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg.md5
2009-01-06 21:21
90
25c3-2934-en-blinkenlights_stereoscope.mp3
2009-01-06 21:43
30M
25c3-2934-en-blinkenlights_stereoscope.mp3.md5
2009-01-06 21:41
77
25c3-2934-en-blinkenlights_stereoscope.ogg
2009-01-06 21:47
26M
25c3-2934-en-blinkenlights_stereoscope.ogg.md5
2009-01-06 21:41
77
25c3-2937-en-dect.mp3
2009-01-06 21:43
31M
25c3-2937-en-dect.mp3.md5
2009-01-06 21:41
56
25c3-2937-en-dect.ogg
2009-01-06 21:47
27M
25c3-2937-en-dect.ogg.md5
2009-01-06 21:41
56
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3
2009-01-06 21:44
23M
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3.md5
2009-01-06 21:41
116
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg
2009-01-06 21:48
21M
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg.md5
2009-01-06 21:41
116
25c3-2940-en-flying_for_free.mp3
2009-01-23 00:28
28M
25c3-2940-en-flying_for_free.mp3.md5
2009-01-23 00:28
67
25c3-2940-en-flying_for_free.ogg
2009-01-23 00:28
25M
25c3-2940-en-flying_for_free.ogg.md5
2009-01-23 00:28
67
25c3-2942-de-vertex_hacking.mp3
2009-01-06 21:44
22M
25c3-2942-de-vertex_hacking.mp3.md5
2009-01-06 21:41
66
25c3-2942-de-vertex_hacking.ogg
2009-01-06 21:48
20M
25c3-2942-de-vertex_hacking.ogg.md5
2009-01-06 21:41
66
25c3-2952-de-pflanzenhacken.mp3
2009-01-11 22:42
25M
25c3-2952-de-pflanzenhacken.mp3.md5
2009-01-11 22:42
66
25c3-2952-de-pflanzenhacken.ogg
2009-01-11 22:42
22M
25c3-2952-de-pflanzenhacken.ogg.md5
2009-01-11 22:42
66
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3
2008-12-29 16:08
28M
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3.md5
2009-01-06 21:21
99
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg
2008-12-29 16:06
25M
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg.md5
2009-01-06 21:21
99
25c3-2958-de-hacker_jeopardy.mp3
2009-01-12 02:39
47M
25c3-2958-de-hacker_jeopardy.mp3.md5
2009-01-12 02:38
67
25c3-2958-de-hacker_jeopardy.ogg
2009-01-12 02:39
42M
25c3-2958-de-hacker_jeopardy.ogg.md5
2009-01-12 02:38
67
25c3-2963-de-handschellen_hacken.mp3
2009-01-26 12:39
28M
25c3-2963-de-handschellen_hacken.mp3.md5
2009-01-26 12:39
71
25c3-2963-de-handschellen_hacken.ogg
2009-01-26 12:39
25M
25c3-2963-de-handschellen_hacken.ogg.md5
2009-01-26 12:39
71
25c3-2970-en-coreboot_beyond_the_final_frontier.mp3
2008-12-29 01:52
23M
25c3-2970-en-coreboot_beyond_the_final_frontier.mp3.md5
2009-01-06 21:21
86
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg
2008-12-29 16:23
21M
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg.md5
2009-01-06 21:21
86
25c3-2973-en-lightning_talks_day4.mp3
2009-01-11 22:42
28M
25c3-2973-en-lightning_talks_day4.mp3.md5
2009-01-11 22:42
72
25c3-2973-en-lightning_talks_day4.ogg
2009-01-11 22:42
25M
25c3-2973-en-lightning_talks_day4.ogg.md5
2009-01-11 22:42
72
25c3-2975-de-zehn_big_brother_awards_in_at.mp3
2009-01-06 21:44
26M
25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md5
2009-01-06 21:41
81
25c3-2975-de-zehn_big_brother_awards_in_at.ogg
2009-01-06 21:48
23M
25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md5
2009-01-06 21:41
81
25c3-2976-en-hacking_the_iphone.mp3
2008-12-29 13:59
27M
25c3-2976-en-hacking_the_iphone.mp3.md5
2009-01-06 21:21
70
25c3-2976-en-hacking_the_iphone.ogg
2008-12-29 16:24
24M
25c3-2976-en-hacking_the_iphone.ogg.md5
2009-01-06 21:21
70
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3
2009-01-06 21:44
28M
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3.md5
2009-01-06 21:41
97
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg
2009-01-06 21:48
25M
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg.md5
2009-01-06 21:41
97
25c3-2979-en-embracing_post-privacy.mp3
2009-01-06 21:44
27M
25c3-2979-en-embracing_post-privacy.mp3.md5
2009-01-06 21:41
74
25c3-2979-en-embracing_post-privacy.ogg
2009-01-06 21:48
24M
25c3-2979-en-embracing_post-privacy.ogg.md5
2009-01-06 21:41
74
25c3-2980-en-the_infinite_library.mp3
2009-01-06 23:25
27M
25c3-2980-en-the_infinite_library.mp3.md5
2009-01-06 23:25
72
25c3-2980-en-the_infinite_library.ogg
2009-01-08 00:10
24M
25c3-2980-en-the_infinite_library.ogg.md5
2009-01-08 00:08
72
25c3-2988-en-just_estonia_and_georgia.mp3
2009-01-06 21:45
20M
25c3-2988-en-just_estonia_and_georgia.mp3.md5
2009-01-06 21:41
76
25c3-2988-en-just_estonia_and_georgia.ogg
2009-01-06 21:48
18M
25c3-2988-en-just_estonia_and_georgia.ogg.md5
2009-01-06 21:41
76
25c3-2991-en-terrorist_all-stars.mp3
2009-01-06 21:45
30M
25c3-2991-en-terrorist_all-stars.mp3.md5
2009-01-06 21:41
71
25c3-2991-en-terrorist_all-stars.ogg
2009-01-06 21:48
27M
25c3-2991-en-terrorist_all-stars.ogg.md5
2009-01-06 21:41
71
25c3-2992-en-tricks_makes_you_smile.mp3
2009-01-08 00:09
16M
25c3-2992-en-tricks_makes_you_smile.mp3.md5
2009-01-08 00:08
74
25c3-2992-en-tricks_makes_you_smile.ogg
2009-01-08 00:10
14M
25c3-2992-en-tricks_makes_you_smile.ogg.md5
2009-01-08 00:08
74
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp3
2009-01-06 21:45
23M
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp3.md5
2009-01-06 21:41
108
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg
2009-01-06 21:49
21M
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg.md5
2009-01-06 21:41
108
25c3-2997-en-locating_mobile_phones_using_ss7.mp3
2008-12-29 16:15
22M
25c3-2997-en-locating_mobile_phones_using_ss7.mp3.md5
2009-01-06 21:21
84
25c3-2997-en-locating_mobile_phones_using_ss7.ogg
2008-12-29 16:18
20M
25c3-2997-en-locating_mobile_phones_using_ss7.ogg.md5
2009-01-06 21:21
84
25c3-2999-en-closing_ceremony.mp3
2009-01-11 22:42
23M
25c3-2999-en-closing_ceremony.mp3.md5
2009-01-11 22:42
68
25c3-2999-en-closing_ceremony.ogg
2009-01-11 22:42
20M
25c3-2999-en-closing_ceremony.ogg.md5
2009-01-11 22:42
68
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp3
2009-01-12 02:39
37M
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp3.md5
2009-01-12 02:38
87
25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg
2009-01-12 02:39
33M
25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg.md5
2009-01-12 02:38
87
25c3-3002-en-squeezing_attack_traces.mp3
2009-01-11 22:42
17M
25c3-3002-en-squeezing_attack_traces.mp3.md5
2009-01-11 22:42
75
25c3-3002-en-squeezing_attack_traces.ogg
2009-01-11 22:43
15M
25c3-3002-en-squeezing_attack_traces.ogg.md5
2009-01-11 22:42
75
25c3-3004-en-why_technology_sucks.mp3
2009-01-06 21:45
20M
25c3-3004-en-why_technology_sucks.mp3.md5
2009-01-06 21:41
72
25c3-3004-en-why_technology_sucks.ogg
2009-01-06 21:49
18M
25c3-3004-en-why_technology_sucks.ogg.md5
2009-01-06 21:42
72
25c3-3007-en-running_your_own_gsm_network.mp3
2008-12-30 18:16
20M
25c3-3007-en-running_your_own_gsm_network.mp3.md5
2009-01-06 21:21
80
25c3-3007-en-running_your_own_gsm_network.ogg
2008-12-30 18:16
18M
25c3-3007-en-running_your_own_gsm_network.ogg.md5
2009-01-06 21:21
80
25c3-3008-en-anatomy_of_smartphone_hardware.mp3
2009-01-06 21:45
26M
25c3-3008-en-anatomy_of_smartphone_hardware.mp3.md5
2009-01-06 21:42
82
25c3-3008-en-anatomy_of_smartphone_hardware.ogg
2009-01-06 21:49
23M
25c3-3008-en-anatomy_of_smartphone_hardware.ogg.md5
2009-01-06 21:42
82
25c3-3015-en-rapid_prototype_your_life.mp3
2008-12-29 14:10
26M
25c3-3015-en-rapid_prototype_your_life.mp3.md5
2009-01-06 21:21
77
25c3-3015-en-rapid_prototype_your_life.ogg
2008-12-29 14:09
23M
25c3-3015-en-rapid_prototype_your_life.ogg.md5
2009-01-06 21:21
77
25c3-3016-en-life_is_a_holodeck.mp3
2009-01-11 22:42
31M
25c3-3016-en-life_is_a_holodeck.mp3.md5
2009-01-11 22:42
70
25c3-3016-en-life_is_a_holodeck.ogg
2009-01-11 22:43
27M
25c3-3016-en-life_is_a_holodeck.ogg.md5
2009-01-11 22:42
70
25c3-3020-en-banking_malware_101.mp3
2009-01-12 02:39
29M
25c3-3020-en-banking_malware_101.mp3.md5
2009-01-12 02:38
71
25c3-3020-en-banking_malware_101.ogg
2009-01-12 02:40
26M
25c3-3020-en-banking_malware_101.ogg.md5
2009-01-12 02:38
71
25c3-3021-de-security_nightmares_2009.mp3
2009-01-12 02:39
43M
25c3-3021-de-security_nightmares_2009.mp3.md5
2009-01-12 02:38
76
25c3-3021-de-security_nightmares_2009.ogg
2009-01-12 02:40
38M
25c3-3021-de-security_nightmares_2009.ogg.md5
2009-01-12 02:38
76
25c3-3023-en-making_the_theoretical_possible.mp3
2009-01-06 21:46
28M
25c3-3023-en-making_the_theoretical_possible.mp3.md5
2009-01-06 21:42
83
25c3-3023-en-making_the_theoretical_possible.ogg
2009-01-06 21:49
25M
25c3-3023-en-making_the_theoretical_possible.ogg.md5
2009-01-06 21:42
83
25c3-3024-de-jahresrueckblick.mp3
2009-01-12 02:39
57M
25c3-3024-de-jahresrueckblick.mp3.md5
2009-01-12 02:38
68
25c3-3024-de-jahresrueckblick.ogg
2009-01-12 02:40
51M
25c3-3024-de-jahresrueckblick.ogg.md5
2009-01-12 02:38
68
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp3
2009-01-23 00:28
36M
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp3.md5
2009-01-23 00:28
87
25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg
2009-01-23 00:28
32M
25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg.md5
2009-01-23 00:28
87
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3
2008-12-29 16:14
28M
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5
2009-01-06 21:21
81
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg
2008-12-29 16:19
25M
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5
2009-01-06 21:21
81
25c3-3030-en-messing_around_with_garage_doors.mp3
2009-01-12 02:39
35M
25c3-3030-en-messing_around_with_garage_doors.mp3.md5
2009-01-12 02:38
84
25c3-3030-en-messing_around_with_garage_doors.ogg
2009-01-12 02:40
31M
25c3-3030-en-messing_around_with_garage_doors.ogg.md5
2009-01-12 02:38
84
25c3-3032-en-analyzing_rfid_security.mp3
2009-01-06 21:46
25M
25c3-3032-en-analyzing_rfid_security.mp3.md5
2009-01-06 21:42
75
25c3-3032-en-analyzing_rfid_security.ogg
2009-01-06 21:50
22M
25c3-3032-en-analyzing_rfid_security.ogg.md5
2009-01-06 21:42
75
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3
2008-12-30 00:00
30M
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3.md5
2009-01-06 21:21
87
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg
2008-12-30 02:45
26M
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg.md5
2009-01-06 21:21
87
25c3-3044-en-all_your_bases_are_belong_to_us.mp3
2008-12-29 12:53
25M
25c3-3044-en-all_your_bases_are_belong_to_us.mp3.md5
2009-01-06 21:21
83
25c3-3044-en-all_your_bases_are_belong_to_us.ogg
2008-12-29 13:27
22M
25c3-3044-en-all_your_bases_are_belong_to_us.ogg.md5
2009-01-06 21:21
83
25c3-3047-en-lightning_talks_day3_morning.mp3
2008-12-29 23:56
27M
25c3-3047-en-lightning_talks_day3_morning.mp3.md5
2009-01-06 21:21
80
25c3-3047-en-lightning_talks_day3_morning.ogg
2008-12-30 00:05
24M
25c3-3047-en-lightning_talks_day3_morning.ogg.md5
2009-01-06 21:21
80
25c3-3048-en-lightning_talks_day2.mp3
2008-12-29 16:25
23M
25c3-3048-en-lightning_talks_day2.mp3.md5
2009-01-06 21:21
72
25c3-3048-en-lightning_talks_day2.ogg
2008-12-29 16:35
21M
25c3-3048-en-lightning_talks_day2.ogg.md5
2009-01-06 21:21
72
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp3
2009-01-11 22:42
22M
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp3.md5
2009-01-11 22:42
96
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg
2009-01-11 22:43
19M
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg.md5
2009-01-11 22:42
96
25c3-3053-en-lightning_talks_day3_-_evening.mp3
2009-01-08 00:09
25M
25c3-3053-en-lightning_talks_day3_-_evening.mp3.md5
2009-01-08 00:08
82
25c3-3053-en-lightning_talks_day3_-_evening.ogg
2009-01-08 00:10
22M
25c3-3053-en-lightning_talks_day3_-_evening.ogg.md5
2009-01-08 00:08
82
25c3-3056-en-fnord_news_show_english_interpretation.mp3
2009-01-13 17:59
23M
25c3-3056-en-fnord_news_show_english_interpretation.mp3.md5
2009-01-13 17:59
90
25c3-3056-en-fnord_news_show_english_interpretation.ogg
2009-01-13 17:59
20M
25c3-3056-en-fnord_news_show_english_interpretation.ogg.md5
2009-01-13 17:59
90
25c3-3057-en-hacker_jeopardy_english_interpretation.mp3
2009-01-13 17:59
47M
25c3-3057-en-hacker_jeopardy_english_interpretation.mp3.md5
2009-01-13 17:59
90
25c3-3057-en-hacker_jeopardy_english_interpretation.ogg
2009-01-13 17:59
42M
25c3-3057-en-hacker_jeopardy_english_interpretation.ogg.md5
2009-01-13 17:59
90
25c3-3058-en-security_nightmares_2009_english_interpretation.mp3
2009-01-13 17:59
42M
25c3-3058-en-security_nightmares_2009_english_interpretation.mp3.md5
2009-01-13 17:59
99
25c3-3058-en-security_nightmares_2009_english_interpretation.ogg
2009-01-13 17:59
38M
25c3-3058-en-security_nightmares_2009_english_interpretation.ogg.md5
2009-01-13 17:59
99
25c3.mp3.all.md5
2011-01-18 21:25
7.5K
25c3.mp3.all.torrent
2011-01-18 23:10
104K
25c3.ogg.all.md5
2011-01-18 21:24
7.6K
25c3.ogg.all.torrent
2011-01-18 23:08
94K
Apache/2.4.62 (Fedora Linux) Server at www-stud.fht-esslingen.de Port 80