Index of /CCC/25C3/audio_only

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[SND]25c3-2596-en-swf_and_the_malware_tragedy.mp311-Jan-2009 22:42 22M 
[   ]25c3-2596-en-swf_and_the_malware_tragedy.mp3.md511-Jan-2009 22:42 79  
[SND]25c3-2596-en-swf_and_the_malware_tragedy.ogg11-Jan-2009 22:42 20M 
[   ]25c3-2596-en-swf_and_the_malware_tragedy.ogg.md511-Jan-2009 22:42 79  
[SND]25c3-2639-en-attacking_nfc_mobile_phones.mp312-Jan-2009 02:38 38M 
[   ]25c3-2639-en-attacking_nfc_mobile_phones.mp3.md512-Jan-2009 02:38 79  
[SND]25c3-2639-en-attacking_nfc_mobile_phones.ogg12-Jan-2009 02:39 34M 
[   ]25c3-2639-en-attacking_nfc_mobile_phones.ogg.md512-Jan-2009 02:38 79  
[SND]25c3-2665-en-the_trust_situation.mp329-Dec-2008 13:25 28M 
[   ]25c3-2665-en-the_trust_situation.mp3.md506-Jan-2009 21:21 71  
[SND]25c3-2665-en-the_trust_situation.ogg29-Dec-2008 16:36 25M 
[   ]25c3-2665-en-the_trust_situation.ogg.md506-Jan-2009 21:21 71  
[SND]25c3-2669-en-collapsing_the_european_security_architecture.mp312-Jan-2009 02:38 27M 
[   ]25c3-2669-en-collapsing_the_european_security_architecture.mp3.md512-Jan-2009 02:38 97  
[SND]25c3-2669-en-collapsing_the_european_security_architecture.ogg12-Jan-2009 02:39 24M 
[   ]25c3-2669-en-collapsing_the_european_security_architecture.ogg.md512-Jan-2009 02:38 97  
[SND]25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp329-Dec-2008 03:11 27M 
[   ]25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3.md506-Jan-2009 21:21 119  
[SND]25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg29-Dec-2008 14:53 24M 
[   ]25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg.md506-Jan-2009 21:21 119  
[SND]25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp306-Jan-2009 21:42 22M 
[   ]25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp3.md506-Jan-2009 21:41 138  
[SND]25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg06-Jan-2009 21:46 20M 
[   ]25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.ogg.md506-Jan-2009 21:41 138  
[SND]25c3-2681-en-repurposing_the_ti_ez430u.mp330-Dec-2008 00:06 15M 
[   ]25c3-2681-en-repurposing_the_ti_ez430u.mp3.md506-Jan-2009 21:21 77  
[SND]25c3-2681-en-repurposing_the_ti_ez430u.ogg30-Dec-2008 02:51 14M 
[   ]25c3-2681-en-repurposing_the_ti_ez430u.ogg.md506-Jan-2009 21:21 77  
[SND]25c3-2734-en-short_attention_span_security.mp312-Jan-2009 02:38 24M 
[   ]25c3-2734-en-short_attention_span_security.mp3.md512-Jan-2009 02:38 81  
[SND]25c3-2734-en-short_attention_span_security.ogg12-Jan-2009 02:39 22M 
[   ]25c3-2734-en-short_attention_span_security.ogg.md512-Jan-2009 02:38 81  
[SND]25c3-2773-en-soviet_unterzoegersdorf.mp330-Dec-2008 00:20 36M 
[   ]25c3-2773-en-soviet_unterzoegersdorf.mp3.md506-Jan-2009 21:21 75  
[SND]25c3-2773-en-soviet_unterzoegersdorf.ogg30-Dec-2008 02:47 32M 
[   ]25c3-2773-en-soviet_unterzoegersdorf.ogg.md506-Jan-2009 21:21 75  
[SND]25c3-2777-en-crafting_and_hacking_separated_at_birth.mp312-Jan-2009 02:38 16M 
[   ]25c3-2777-en-crafting_and_hacking_separated_at_birth.mp3.md512-Jan-2009 02:38 91  
[SND]25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg12-Jan-2009 02:39 15M 
[   ]25c3-2777-en-crafting_and_hacking_separated_at_birth.ogg.md512-Jan-2009 02:38 91  
[SND]25c3-2781-en-objects_as_software_the_coming_revolution.mp311-Jan-2009 22:42 24M 
[   ]25c3-2781-en-objects_as_software_the_coming_revolution.mp3.md511-Jan-2009 22:42 93  
[SND]25c3-2781-en-objects_as_software_the_coming_revolution.ogg11-Jan-2009 22:42 21M 
[   ]25c3-2781-en-objects_as_software_the_coming_revolution.ogg.md511-Jan-2009 22:42 93  
[SND]25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp306-Jan-2009 21:42 30M 
[   ]25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp3.md506-Jan-2009 21:41 106  
[SND]25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg06-Jan-2009 21:46 27M 
[   ]25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.ogg.md506-Jan-2009 21:41 106  
[SND]25c3-2799-en-console_hacking_2008_wii_fail.mp329-Dec-2008 16:38 26M 
[   ]25c3-2799-en-console_hacking_2008_wii_fail.mp3.md506-Jan-2009 21:21 81  
[SND]25c3-2799-en-console_hacking_2008_wii_fail.ogg29-Dec-2008 14:53 23M 
[   ]25c3-2799-en-console_hacking_2008_wii_fail.ogg.md506-Jan-2009 21:21 81  
[SND]25c3-2806-en-building_an_international_movement_hackerspacesorg.mp329-Dec-2008 14:16 30M 
[   ]25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3.md506-Jan-2009 21:21 102  
[SND]25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg29-Dec-2008 14:16 27M 
[   ]25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg.md506-Jan-2009 21:21 102  
[SND]25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp323-Jan-2009 00:28 24M 
[   ]25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3.md523-Jan-2009 00:28 98  
[SND]25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg23-Jan-2009 00:28 21M 
[   ]25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg.md523-Jan-2009 00:28 98  
[SND]25c3-2812-de-fnord_news_show.mp329-Dec-2008 23:08 23M 
[   ]25c3-2812-de-fnord_news_show.mp3.md506-Jan-2009 21:21 67  
[SND]25c3-2812-de-fnord_news_show.ogg29-Dec-2008 23:08 20M 
[   ]25c3-2812-de-fnord_news_show.ogg.md506-Jan-2009 21:21 67  
[SND]25c3-2814-de-datenpannen.mp329-Dec-2008 16:12 24M 
[   ]25c3-2814-de-datenpannen.mp3.md506-Jan-2009 21:21 63  
[SND]25c3-2814-de-datenpannen.ogg29-Dec-2008 16:16 22M 
[   ]25c3-2814-de-datenpannen.ogg.md506-Jan-2009 21:21 63  
[SND]25c3-2815-en-beyond_asimov_-_laws_for_robots.mp329-Dec-2008 16:10 22M 
[   ]25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3.md506-Jan-2009 21:21 83  
[SND]25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg29-Dec-2008 16:21 20M 
[   ]25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg.md506-Jan-2009 21:21 83  
[SND]25c3-2816-en-cisco_ios_attack_and_defense.mp306-Jan-2009 21:42 30M 
[   ]25c3-2816-en-cisco_ios_attack_and_defense.mp3.md506-Jan-2009 21:41 80  
[SND]25c3-2816-en-cisco_ios_attack_and_defense.ogg06-Jan-2009 21:46 25M 
[   ]25c3-2816-en-cisco_ios_attack_and_defense.ogg.md506-Jan-2009 21:41 80  
[SND]25c3-2827-de-u23.mp330-Dec-2008 00:19 23M 
[   ]25c3-2827-de-u23.mp3.md506-Jan-2009 21:21 55  
[SND]25c3-2827-de-u23.ogg30-Dec-2008 02:46 20M 
[   ]25c3-2827-de-u23.ogg.md506-Jan-2009 21:21 55  
[SND]25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp308-Jan-2009 00:08 20M 
[   ]25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp3.md508-Jan-2009 00:08 86  
[SND]25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg08-Jan-2009 00:09 18M 
[   ]25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.ogg.md508-Jan-2009 00:08 86  
[SND]25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp306-Jan-2009 21:42 17M 
[   ]25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp3.md506-Jan-2009 21:41 99  
[SND]25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg06-Jan-2009 21:46 15M 
[   ]25c3-2831-en-security_of_mica-based_wireless_sensor_networks.ogg.md506-Jan-2009 21:41 99  
[SND]25c3-2832-en-exploiting_symbian.mp329-Dec-2008 15:22 29M 
[   ]25c3-2832-en-exploiting_symbian.mp3.md506-Jan-2009 21:21 70  
[SND]25c3-2832-en-exploiting_symbian.ogg29-Dec-2008 15:22 26M 
[   ]25c3-2832-en-exploiting_symbian.ogg.md506-Jan-2009 21:21 70  
[SND]25c3-2839-en-cracking_the_msp430_bsl.mp329-Dec-2008 16:08 17M 
[   ]25c3-2839-en-cracking_the_msp430_bsl.mp3.md506-Jan-2009 21:21 75  
[SND]25c3-2839-en-cracking_the_msp430_bsl.ogg29-Dec-2008 14:24 15M 
[   ]25c3-2839-en-cracking_the_msp430_bsl.ogg.md506-Jan-2009 21:21 75  
[SND]25c3-2843-en-algorithmic_music_in_a_box.mp308-Jan-2009 00:09 23M 
[   ]25c3-2843-en-algorithmic_music_in_a_box.mp3.md508-Jan-2009 00:08 78  
[SND]25c3-2843-en-algorithmic_music_in_a_box.ogg08-Jan-2009 00:10 21M 
[   ]25c3-2843-en-algorithmic_music_in_a_box.ogg.md508-Jan-2009 00:08 78  
[SND]25c3-2845-en-rf_fingerprinting_of_rfid.mp329-Dec-2008 15:34 20M 
[   ]25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md506-Jan-2009 21:21 77  
[SND]25c3-2845-en-rf_fingerprinting_of_rfid.ogg29-Dec-2008 14:21 18M 
[   ]25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md506-Jan-2009 21:21 77  
[SND]25c3-2860-de-neusprech_im_berwachungsstaat.mp330-Dec-2008 02:47 32M 
[   ]25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md506-Jan-2009 21:21 81  
[SND]25c3-2860-de-neusprech_im_berwachungsstaat.ogg30-Dec-2008 02:48 29M 
[   ]25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md506-Jan-2009 21:21 81  
[SND]25c3-2863-en-climate_change_-_state_of_the_science.mp313-Jan-2009 17:59 30M 
[   ]25c3-2863-en-climate_change_-_state_of_the_science.mp3.md513-Jan-2009 17:59 89  
[SND]25c3-2863-en-climate_change_-_state_of_the_science.ogg13-Jan-2009 17:59 26M 
[   ]25c3-2863-en-climate_change_-_state_of_the_science.ogg.md513-Jan-2009 17:59 89  
[SND]25c3-2872-en-the_privacy_workshop_project.mp330-Dec-2008 00:20 22M 
[   ]25c3-2872-en-the_privacy_workshop_project.mp3.md506-Jan-2009 21:21 80  
[SND]25c3-2872-en-the_privacy_workshop_project.ogg30-Dec-2008 02:50 20M 
[   ]25c3-2872-en-the_privacy_workshop_project.ogg.md506-Jan-2009 21:21 80  
[SND]25c3-2873-en-privacy_in_the_social_semantic_web.mp330-Dec-2008 00:02 21M 
[   ]25c3-2873-en-privacy_in_the_social_semantic_web.mp3.md506-Jan-2009 21:21 86  
[SND]25c3-2873-en-privacy_in_the_social_semantic_web.ogg30-Dec-2008 02:45 19M 
[   ]25c3-2873-en-privacy_in_the_social_semantic_web.ogg.md506-Jan-2009 21:21 86  
[SND]25c3-2874-en-the_ultimate_commodore_64_talk.mp311-Jan-2009 22:42 28M 
[   ]25c3-2874-en-the_ultimate_commodore_64_talk.mp3.md511-Jan-2009 22:42 82  
[SND]25c3-2874-en-the_ultimate_commodore_64_talk.ogg11-Jan-2009 22:42 25M 
[   ]25c3-2874-en-the_ultimate_commodore_64_talk.ogg.md511-Jan-2009 22:42 82  
[SND]25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp308-Jan-2009 00:09 21M 
[   ]25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp3.md508-Jan-2009 00:08 96  
[SND]25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg08-Jan-2009 00:10 19M 
[   ]25c3-2875-en-an_introduction_to_new_stream_cipher_designs.ogg.md508-Jan-2009 00:08 96  
[SND]25c3-2882-en-full-disk-encryption_crash-course.mp329-Dec-2008 14:54 22M 
[   ]25c3-2882-en-full-disk-encryption_crash-course.mp3.md506-Jan-2009 21:21 85  
[SND]25c3-2882-en-full-disk-encryption_crash-course.ogg29-Dec-2008 15:01 20M 
[   ]25c3-2882-en-full-disk-encryption_crash-course.ogg.md506-Jan-2009 21:21 85  
[SND]25c3-2890-en-scalable_swarm_robotics.mp329-Dec-2008 15:28 18M 
[   ]25c3-2890-en-scalable_swarm_robotics.mp3.md506-Jan-2009 21:21 75  
[SND]25c3-2890-en-scalable_swarm_robotics.ogg29-Dec-2008 14:19 16M 
[   ]25c3-2890-en-scalable_swarm_robotics.ogg.md506-Jan-2009 21:21 75  
[SND]25c3-2892-en-about_cyborgs_and_gargoyles_.mp329-Dec-2008 15:11 20M 
[   ]25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md506-Jan-2009 21:21 80  
[SND]25c3-2892-en-about_cyborgs_and_gargoyles_.ogg29-Dec-2008 15:11 19M 
[   ]25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md506-Jan-2009 21:21 80  
[SND]25c3-2893-en-attacking_rich_internet_applications.mp306-Jan-2009 21:42 28M 
[   ]25c3-2893-en-attacking_rich_internet_applications.mp3.md506-Jan-2009 21:41 88  
[SND]25c3-2893-en-attacking_rich_internet_applications.ogg06-Jan-2009 21:46 25M 
[   ]25c3-2893-en-attacking_rich_internet_applications.ogg.md506-Jan-2009 21:41 88  
[SND]25c3-2895-de-der_elektronische_personalausweis.mp311-Jan-2009 22:42 27M 
[   ]25c3-2895-de-der_elektronische_personalausweis.mp3.md511-Jan-2009 22:42 85  
[SND]25c3-2895-de-der_elektronische_personalausweis.ogg11-Jan-2009 22:42 24M 
[   ]25c3-2895-de-der_elektronische_personalausweis.ogg.md511-Jan-2009 22:42 85  
[SND]25c3-2896-en-chip_reverse_engineering.mp329-Dec-2008 13:17 20M 
[   ]25c3-2896-en-chip_reverse_engineering.mp3.md506-Jan-2009 21:21 76  
[SND]25c3-2896-en-chip_reverse_engineering.ogg29-Dec-2008 14:07 18M 
[   ]25c3-2896-en-chip_reverse_engineering.ogg.md506-Jan-2009 21:21 76  
[SND]25c3-2899-en-mining_social_contacts_with_active_rfid.mp306-Jan-2009 21:43 27M 
[   ]25c3-2899-en-mining_social_contacts_with_active_rfid.mp3.md506-Jan-2009 21:41 91  
[SND]25c3-2899-en-mining_social_contacts_with_active_rfid.ogg06-Jan-2009 21:46 24M 
[   ]25c3-2899-en-mining_social_contacts_with_active_rfid.ogg.md506-Jan-2009 21:41 91  
[SND]25c3-2901-en-faifa_a_first_open_source_plc_tool.mp329-Dec-2008 13:55 23M 
[   ]25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3.md506-Jan-2009 21:21 86  
[SND]25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg29-Dec-2008 16:29 20M 
[   ]25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg.md506-Jan-2009 21:21 86  
[SND]25c3-2904-en-solar-powering_your_geek_gear.mp329-Dec-2008 13:05 13M 
[   ]25c3-2904-en-solar-powering_your_geek_gear.mp3.md506-Jan-2009 21:21 81  
[SND]25c3-2904-en-solar-powering_your_geek_gear.ogg29-Dec-2008 19:27 12M 
[   ]25c3-2904-en-solar-powering_your_geek_gear.ogg.md506-Jan-2009 21:21 81  
[SND]25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp312-Jan-2009 02:39 33M 
[   ]25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp3.md512-Jan-2009 02:38 102  
[SND]25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg12-Jan-2009 02:39 30M 
[   ]25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.ogg.md512-Jan-2009 02:38 102  
[SND]25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp329-Dec-2008 16:11 14M 
[   ]25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3.md506-Jan-2009 21:21 89  
[SND]25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg29-Dec-2008 14:12 12M 
[   ]25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg.md506-Jan-2009 21:21 89  
[SND]25c3-2916-en-wikileaks.mp311-Jan-2009 22:42 27M 
[   ]25c3-2916-en-wikileaks.mp3.md511-Jan-2009 22:42 61  
[SND]25c3-2916-en-wikileaks.ogg11-Jan-2009 22:42 24M 
[   ]25c3-2916-en-wikileaks.ogg.md511-Jan-2009 22:42 61  
[SND]25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp329-Dec-2008 16:13 27M 
[   ]25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3.md506-Jan-2009 21:21 99  
[SND]25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg29-Dec-2008 16:22 24M 
[   ]25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg.md506-Jan-2009 21:21 99  
[SND]25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp306-Jan-2009 21:43 25M 
[   ]25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp3.md506-Jan-2009 21:41 92  
[SND]25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg06-Jan-2009 21:47 22M 
[   ]25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.ogg.md506-Jan-2009 21:41 92  
[SND]25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg29-Dec-2008 14:16 29M 
[   ]25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg.md506-Jan-2009 21:21 90  
[SND]25c3-2934-en-blinkenlights_stereoscope.mp306-Jan-2009 21:43 30M 
[   ]25c3-2934-en-blinkenlights_stereoscope.mp3.md506-Jan-2009 21:41 77  
[SND]25c3-2934-en-blinkenlights_stereoscope.ogg06-Jan-2009 21:47 26M 
[   ]25c3-2934-en-blinkenlights_stereoscope.ogg.md506-Jan-2009 21:41 77  
[SND]25c3-2937-en-dect.mp306-Jan-2009 21:43 31M 
[   ]25c3-2937-en-dect.mp3.md506-Jan-2009 21:41 56  
[SND]25c3-2937-en-dect.ogg06-Jan-2009 21:47 27M 
[   ]25c3-2937-en-dect.ogg.md506-Jan-2009 21:41 56  
[SND]25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp306-Jan-2009 21:44 23M 
[   ]25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp3.md506-Jan-2009 21:41 116  
[SND]25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg06-Jan-2009 21:48 21M 
[   ]25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.ogg.md506-Jan-2009 21:41 116  
[SND]25c3-2940-en-flying_for_free.mp323-Jan-2009 00:28 28M 
[   ]25c3-2940-en-flying_for_free.mp3.md523-Jan-2009 00:28 67  
[SND]25c3-2940-en-flying_for_free.ogg23-Jan-2009 00:28 25M 
[   ]25c3-2940-en-flying_for_free.ogg.md523-Jan-2009 00:28 67  
[SND]25c3-2942-de-vertex_hacking.mp306-Jan-2009 21:44 22M 
[   ]25c3-2942-de-vertex_hacking.mp3.md506-Jan-2009 21:41 66  
[SND]25c3-2942-de-vertex_hacking.ogg06-Jan-2009 21:48 20M 
[   ]25c3-2942-de-vertex_hacking.ogg.md506-Jan-2009 21:41 66  
[SND]25c3-2952-de-pflanzenhacken.mp311-Jan-2009 22:42 25M 
[   ]25c3-2952-de-pflanzenhacken.mp3.md511-Jan-2009 22:42 66  
[SND]25c3-2952-de-pflanzenhacken.ogg11-Jan-2009 22:42 22M 
[   ]25c3-2952-de-pflanzenhacken.ogg.md511-Jan-2009 22:42 66  
[SND]25c3-2953-en-security_failures_in_smart_card_payment_systems.mp329-Dec-2008 16:08 28M 
[   ]25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3.md506-Jan-2009 21:21 99  
[SND]25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg29-Dec-2008 16:06 25M 
[   ]25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg.md506-Jan-2009 21:21 99  
[SND]25c3-2958-de-hacker_jeopardy.mp312-Jan-2009 02:39 47M 
[   ]25c3-2958-de-hacker_jeopardy.mp3.md512-Jan-2009 02:38 67  
[SND]25c3-2958-de-hacker_jeopardy.ogg12-Jan-2009 02:39 42M 
[   ]25c3-2958-de-hacker_jeopardy.ogg.md512-Jan-2009 02:38 67  
[SND]25c3-2963-de-handschellen_hacken.mp326-Jan-2009 12:39 28M 
[   ]25c3-2963-de-handschellen_hacken.mp3.md526-Jan-2009 12:39 71  
[SND]25c3-2963-de-handschellen_hacken.ogg26-Jan-2009 12:39 25M 
[   ]25c3-2963-de-handschellen_hacken.ogg.md526-Jan-2009 12:39 71  
[SND]25c3-2970-en-coreboot_beyond_the_final_frontier.mp329-Dec-2008 01:52 23M 
[   ]25c3-2970-en-coreboot_beyond_the_final_frontier.mp3.md506-Jan-2009 21:21 86  
[SND]25c3-2970-en-coreboot_beyond_the_final_frontier.ogg29-Dec-2008 16:23 21M 
[   ]25c3-2970-en-coreboot_beyond_the_final_frontier.ogg.md506-Jan-2009 21:21 86  
[SND]25c3-2973-en-lightning_talks_day4.mp311-Jan-2009 22:42 28M 
[   ]25c3-2973-en-lightning_talks_day4.mp3.md511-Jan-2009 22:42 72  
[SND]25c3-2973-en-lightning_talks_day4.ogg11-Jan-2009 22:42 25M 
[   ]25c3-2973-en-lightning_talks_day4.ogg.md511-Jan-2009 22:42 72  
[SND]25c3-2975-de-zehn_big_brother_awards_in_at.mp306-Jan-2009 21:44 26M 
[   ]25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md506-Jan-2009 21:41 81  
[SND]25c3-2975-de-zehn_big_brother_awards_in_at.ogg06-Jan-2009 21:48 23M 
[   ]25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md506-Jan-2009 21:41 81  
[SND]25c3-2976-en-hacking_the_iphone.mp329-Dec-2008 13:59 27M 
[   ]25c3-2976-en-hacking_the_iphone.mp3.md506-Jan-2009 21:21 70  
[SND]25c3-2976-en-hacking_the_iphone.ogg29-Dec-2008 16:24 24M 
[   ]25c3-2976-en-hacking_the_iphone.ogg.md506-Jan-2009 21:21 70  
[SND]25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp306-Jan-2009 21:44 28M 
[   ]25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp3.md506-Jan-2009 21:41 97  
[SND]25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg06-Jan-2009 21:48 25M 
[   ]25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.ogg.md506-Jan-2009 21:41 97  
[SND]25c3-2979-en-embracing_post-privacy.mp306-Jan-2009 21:44 27M 
[   ]25c3-2979-en-embracing_post-privacy.mp3.md506-Jan-2009 21:41 74  
[SND]25c3-2979-en-embracing_post-privacy.ogg06-Jan-2009 21:48 24M 
[   ]25c3-2979-en-embracing_post-privacy.ogg.md506-Jan-2009 21:41 74  
[SND]25c3-2980-en-the_infinite_library.mp306-Jan-2009 23:25 27M 
[   ]25c3-2980-en-the_infinite_library.mp3.md506-Jan-2009 23:25 72  
[SND]25c3-2980-en-the_infinite_library.ogg08-Jan-2009 00:10 24M 
[   ]25c3-2980-en-the_infinite_library.ogg.md508-Jan-2009 00:08 72  
[SND]25c3-2988-en-just_estonia_and_georgia.mp306-Jan-2009 21:45 20M 
[   ]25c3-2988-en-just_estonia_and_georgia.mp3.md506-Jan-2009 21:41 76  
[SND]25c3-2988-en-just_estonia_and_georgia.ogg06-Jan-2009 21:48 18M 
[   ]25c3-2988-en-just_estonia_and_georgia.ogg.md506-Jan-2009 21:41 76  
[SND]25c3-2991-en-terrorist_all-stars.mp306-Jan-2009 21:45 30M 
[   ]25c3-2991-en-terrorist_all-stars.mp3.md506-Jan-2009 21:41 71  
[SND]25c3-2991-en-terrorist_all-stars.ogg06-Jan-2009 21:48 27M 
[   ]25c3-2991-en-terrorist_all-stars.ogg.md506-Jan-2009 21:41 71  
[SND]25c3-2992-en-tricks_makes_you_smile.mp308-Jan-2009 00:09 16M 
[   ]25c3-2992-en-tricks_makes_you_smile.mp3.md508-Jan-2009 00:08 74  
[SND]25c3-2992-en-tricks_makes_you_smile.ogg08-Jan-2009 00:10 14M 
[   ]25c3-2992-en-tricks_makes_you_smile.ogg.md508-Jan-2009 00:08 74  
[SND]25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp306-Jan-2009 21:45 23M 
[   ]25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp3.md506-Jan-2009 21:41 108  
[SND]25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg06-Jan-2009 21:49 21M 
[   ]25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.ogg.md506-Jan-2009 21:41 108  
[SND]25c3-2997-en-locating_mobile_phones_using_ss7.mp329-Dec-2008 16:15 22M 
[   ]25c3-2997-en-locating_mobile_phones_using_ss7.mp3.md506-Jan-2009 21:21 84  
[SND]25c3-2997-en-locating_mobile_phones_using_ss7.ogg29-Dec-2008 16:18 20M 
[   ]25c3-2997-en-locating_mobile_phones_using_ss7.ogg.md506-Jan-2009 21:21 84  
[SND]25c3-2999-en-closing_ceremony.mp311-Jan-2009 22:42 23M 
[   ]25c3-2999-en-closing_ceremony.mp3.md511-Jan-2009 22:42 68  
[SND]25c3-2999-en-closing_ceremony.ogg11-Jan-2009 22:42 20M 
[   ]25c3-2999-en-closing_ceremony.ogg.md511-Jan-2009 22:42 68  
[SND]25c3-3000-en-stormfucker_owning_the_storm_botnet.mp312-Jan-2009 02:39 37M 
[   ]25c3-3000-en-stormfucker_owning_the_storm_botnet.mp3.md512-Jan-2009 02:38 87  
[SND]25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg12-Jan-2009 02:39 33M 
[   ]25c3-3000-en-stormfucker_owning_the_storm_botnet.ogg.md512-Jan-2009 02:38 87  
[SND]25c3-3002-en-squeezing_attack_traces.mp311-Jan-2009 22:42 17M 
[   ]25c3-3002-en-squeezing_attack_traces.mp3.md511-Jan-2009 22:42 75  
[SND]25c3-3002-en-squeezing_attack_traces.ogg11-Jan-2009 22:43 15M 
[   ]25c3-3002-en-squeezing_attack_traces.ogg.md511-Jan-2009 22:42 75  
[SND]25c3-3004-en-why_technology_sucks.mp306-Jan-2009 21:45 20M 
[   ]25c3-3004-en-why_technology_sucks.mp3.md506-Jan-2009 21:41 72  
[SND]25c3-3004-en-why_technology_sucks.ogg06-Jan-2009 21:49 18M 
[   ]25c3-3004-en-why_technology_sucks.ogg.md506-Jan-2009 21:42 72  
[SND]25c3-3007-en-running_your_own_gsm_network.mp330-Dec-2008 18:16 20M 
[   ]25c3-3007-en-running_your_own_gsm_network.mp3.md506-Jan-2009 21:21 80  
[SND]25c3-3007-en-running_your_own_gsm_network.ogg30-Dec-2008 18:16 18M 
[   ]25c3-3007-en-running_your_own_gsm_network.ogg.md506-Jan-2009 21:21 80  
[SND]25c3-3008-en-anatomy_of_smartphone_hardware.mp306-Jan-2009 21:45 26M 
[   ]25c3-3008-en-anatomy_of_smartphone_hardware.mp3.md506-Jan-2009 21:42 82  
[SND]25c3-3008-en-anatomy_of_smartphone_hardware.ogg06-Jan-2009 21:49 23M 
[   ]25c3-3008-en-anatomy_of_smartphone_hardware.ogg.md506-Jan-2009 21:42 82  
[SND]25c3-3015-en-rapid_prototype_your_life.mp329-Dec-2008 14:10 26M 
[   ]25c3-3015-en-rapid_prototype_your_life.mp3.md506-Jan-2009 21:21 77  
[SND]25c3-3015-en-rapid_prototype_your_life.ogg29-Dec-2008 14:09 23M 
[   ]25c3-3015-en-rapid_prototype_your_life.ogg.md506-Jan-2009 21:21 77  
[SND]25c3-3016-en-life_is_a_holodeck.mp311-Jan-2009 22:42 31M 
[   ]25c3-3016-en-life_is_a_holodeck.mp3.md511-Jan-2009 22:42 70  
[SND]25c3-3016-en-life_is_a_holodeck.ogg11-Jan-2009 22:43 27M 
[   ]25c3-3016-en-life_is_a_holodeck.ogg.md511-Jan-2009 22:42 70  
[SND]25c3-3020-en-banking_malware_101.mp312-Jan-2009 02:39 29M 
[   ]25c3-3020-en-banking_malware_101.mp3.md512-Jan-2009 02:38 71  
[SND]25c3-3020-en-banking_malware_101.ogg12-Jan-2009 02:40 26M 
[   ]25c3-3020-en-banking_malware_101.ogg.md512-Jan-2009 02:38 71  
[SND]25c3-3021-de-security_nightmares_2009.mp312-Jan-2009 02:39 43M 
[   ]25c3-3021-de-security_nightmares_2009.mp3.md512-Jan-2009 02:38 76  
[SND]25c3-3021-de-security_nightmares_2009.ogg12-Jan-2009 02:40 38M 
[   ]25c3-3021-de-security_nightmares_2009.ogg.md512-Jan-2009 02:38 76  
[SND]25c3-3023-en-making_the_theoretical_possible.mp306-Jan-2009 21:46 28M 
[   ]25c3-3023-en-making_the_theoretical_possible.mp3.md506-Jan-2009 21:42 83  
[SND]25c3-3023-en-making_the_theoretical_possible.ogg06-Jan-2009 21:49 25M 
[   ]25c3-3023-en-making_the_theoretical_possible.ogg.md506-Jan-2009 21:42 83  
[SND]25c3-3024-de-jahresrueckblick.mp312-Jan-2009 02:39 57M 
[   ]25c3-3024-de-jahresrueckblick.mp3.md512-Jan-2009 02:38 68  
[SND]25c3-3024-de-jahresrueckblick.ogg12-Jan-2009 02:40 51M 
[   ]25c3-3024-de-jahresrueckblick.ogg.md512-Jan-2009 02:38 68  
[SND]25c3-3025-en-opening_and_keynote_nothing_to_hide.mp323-Jan-2009 00:28 36M 
[   ]25c3-3025-en-opening_and_keynote_nothing_to_hide.mp3.md523-Jan-2009 00:28 87  
[SND]25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg23-Jan-2009 00:28 32M 
[   ]25c3-3025-en-opening_and_keynote_nothing_to_hide.ogg.md523-Jan-2009 00:28 87  
[SND]25c3-3028-de-der_hackerparagraph_202c_stgb.mp329-Dec-2008 16:14 28M 
[   ]25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md506-Jan-2009 21:21 81  
[SND]25c3-3028-de-der_hackerparagraph_202c_stgb.ogg29-Dec-2008 16:19 25M 
[   ]25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md506-Jan-2009 21:21 81  
[SND]25c3-3030-en-messing_around_with_garage_doors.mp312-Jan-2009 02:39 35M 
[   ]25c3-3030-en-messing_around_with_garage_doors.mp3.md512-Jan-2009 02:38 84  
[SND]25c3-3030-en-messing_around_with_garage_doors.ogg12-Jan-2009 02:40 31M 
[   ]25c3-3030-en-messing_around_with_garage_doors.ogg.md512-Jan-2009 02:38 84  
[SND]25c3-3032-en-analyzing_rfid_security.mp306-Jan-2009 21:46 25M 
[   ]25c3-3032-en-analyzing_rfid_security.mp3.md506-Jan-2009 21:42 75  
[SND]25c3-3032-en-analyzing_rfid_security.ogg06-Jan-2009 21:50 22M 
[   ]25c3-3032-en-analyzing_rfid_security.ogg.md506-Jan-2009 21:42 75  
[SND]25c3-3041-en-evoting_after_nedap_and_digital_pen.mp330-Dec-2008 00:00 30M 
[   ]25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3.md506-Jan-2009 21:21 87  
[SND]25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg30-Dec-2008 02:45 26M 
[   ]25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg.md506-Jan-2009 21:21 87  
[SND]25c3-3044-en-all_your_bases_are_belong_to_us.mp329-Dec-2008 12:53 25M 
[   ]25c3-3044-en-all_your_bases_are_belong_to_us.mp3.md506-Jan-2009 21:21 83  
[SND]25c3-3044-en-all_your_bases_are_belong_to_us.ogg29-Dec-2008 13:27 22M 
[   ]25c3-3044-en-all_your_bases_are_belong_to_us.ogg.md506-Jan-2009 21:21 83  
[SND]25c3-3047-en-lightning_talks_day3_morning.mp329-Dec-2008 23:56 27M 
[   ]25c3-3047-en-lightning_talks_day3_morning.mp3.md506-Jan-2009 21:21 80  
[SND]25c3-3047-en-lightning_talks_day3_morning.ogg30-Dec-2008 00:05 24M 
[   ]25c3-3047-en-lightning_talks_day3_morning.ogg.md506-Jan-2009 21:21 80  
[SND]25c3-3048-en-lightning_talks_day2.mp329-Dec-2008 16:25 23M 
[   ]25c3-3048-en-lightning_talks_day2.mp3.md506-Jan-2009 21:21 72  
[SND]25c3-3048-en-lightning_talks_day2.ogg29-Dec-2008 16:35 21M 
[   ]25c3-3048-en-lightning_talks_day2.ogg.md506-Jan-2009 21:21 72  
[SND]25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp311-Jan-2009 22:42 22M 
[   ]25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp3.md511-Jan-2009 22:42 96  
[SND]25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg11-Jan-2009 22:43 19M 
[   ]25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.ogg.md511-Jan-2009 22:42 96  
[SND]25c3-3053-en-lightning_talks_day3_-_evening.mp308-Jan-2009 00:09 25M 
[   ]25c3-3053-en-lightning_talks_day3_-_evening.mp3.md508-Jan-2009 00:08 82  
[SND]25c3-3053-en-lightning_talks_day3_-_evening.ogg08-Jan-2009 00:10 22M 
[   ]25c3-3053-en-lightning_talks_day3_-_evening.ogg.md508-Jan-2009 00:08 82  
[SND]25c3-3056-en-fnord_news_show_english_interpretation.mp313-Jan-2009 17:59 23M 
[   ]25c3-3056-en-fnord_news_show_english_interpretation.mp3.md513-Jan-2009 17:59 90  
[SND]25c3-3056-en-fnord_news_show_english_interpretation.ogg13-Jan-2009 17:59 20M 
[   ]25c3-3056-en-fnord_news_show_english_interpretation.ogg.md513-Jan-2009 17:59 90  
[SND]25c3-3057-en-hacker_jeopardy_english_interpretation.mp313-Jan-2009 17:59 47M 
[   ]25c3-3057-en-hacker_jeopardy_english_interpretation.mp3.md513-Jan-2009 17:59 90  
[SND]25c3-3057-en-hacker_jeopardy_english_interpretation.ogg13-Jan-2009 17:59 42M 
[   ]25c3-3057-en-hacker_jeopardy_english_interpretation.ogg.md513-Jan-2009 17:59 90  
[SND]25c3-3058-en-security_nightmares_2009_english_interpretation.mp313-Jan-2009 17:59 42M 
[   ]25c3-3058-en-security_nightmares_2009_english_interpretation.mp3.md513-Jan-2009 17:59 99  
[SND]25c3-3058-en-security_nightmares_2009_english_interpretation.ogg13-Jan-2009 17:59 38M 
[   ]25c3-3058-en-security_nightmares_2009_english_interpretation.ogg.md513-Jan-2009 17:59 99  
[   ]25c3.mp3.all.md518-Jan-2011 21:25 7.5K 
[   ]25c3.mp3.all.torrent04-Jan-2013 12:56 102K 
[   ]25c3.ogg.all.md518-Jan-2011 21:24 7.6K 
[   ]25c3.ogg.all.torrent04-Jan-2013 12:55 93K 

Apache/2.2.22 (Debian) Server at mirror.fem-net.de Port 80