Index of /CCC/25C3/audio_only/


../
25c3-2596-en-swf_and_the_malware_tragedy.mp3       11-Jan-2009 21:42     22M
25c3-2596-en-swf_and_the_malware_tragedy.mp3.md5   11-Jan-2009 21:42      79
25c3-2596-en-swf_and_the_malware_tragedy.ogg       11-Jan-2009 21:42     20M
25c3-2596-en-swf_and_the_malware_tragedy.ogg.md5   11-Jan-2009 21:42      79
25c3-2639-en-attacking_nfc_mobile_phones.mp3       12-Jan-2009 01:38     38M
25c3-2639-en-attacking_nfc_mobile_phones.mp3.md5   12-Jan-2009 01:38      79
25c3-2639-en-attacking_nfc_mobile_phones.ogg       12-Jan-2009 01:39     34M
25c3-2639-en-attacking_nfc_mobile_phones.ogg.md5   12-Jan-2009 01:38      79
25c3-2665-en-the_trust_situation.mp3               29-Dec-2008 12:25     28M
25c3-2665-en-the_trust_situation.mp3.md5           06-Jan-2009 20:21      71
25c3-2665-en-the_trust_situation.ogg               29-Dec-2008 15:36     25M
25c3-2665-en-the_trust_situation.ogg.md5           06-Jan-2009 20:21      71
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38     27M
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38      97
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:39     24M
25c3-2669-en-collapsing_the_european_security_a..> 12-Jan-2009 01:38      97
25c3-2678-en-vulnerability_discovery_in_encrypt..> 29-Dec-2008 02:11     27M
25c3-2678-en-vulnerability_discovery_in_encrypt..> 06-Jan-2009 20:21     119
25c3-2678-en-vulnerability_discovery_in_encrypt..> 29-Dec-2008 13:53     24M
25c3-2678-en-vulnerability_discovery_in_encrypt..> 06-Jan-2009 20:21     119
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:42     22M
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:41     138
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:46     20M
25c3-2680-en-not_soy_fast_genetically_modified_..> 06-Jan-2009 20:41     138
25c3-2681-en-repurposing_the_ti_ez430u.mp3         29-Dec-2008 23:06     15M
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5     06-Jan-2009 20:21      77
25c3-2681-en-repurposing_the_ti_ez430u.ogg         30-Dec-2008 01:51     14M
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5     06-Jan-2009 20:21      77
25c3-2734-en-short_attention_span_security.mp3     12-Jan-2009 01:38     24M
25c3-2734-en-short_attention_span_security.mp3.md5 12-Jan-2009 01:38      81
25c3-2734-en-short_attention_span_security.ogg     12-Jan-2009 01:39     22M
25c3-2734-en-short_attention_span_security.ogg.md5 12-Jan-2009 01:38      81
25c3-2773-en-soviet_unterzoegersdorf.mp3           29-Dec-2008 23:20     36M
25c3-2773-en-soviet_unterzoegersdorf.mp3.md5       06-Jan-2009 20:21      75
25c3-2773-en-soviet_unterzoegersdorf.ogg           30-Dec-2008 01:47     32M
25c3-2773-en-soviet_unterzoegersdorf.ogg.md5       06-Jan-2009 20:21      75
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38     16M
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38      91
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:39     15M
25c3-2777-en-crafting_and_hacking_separated_at_..> 12-Jan-2009 01:38      91
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42     24M
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42      93
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42     21M
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:42      93
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:42     30M
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:41     106
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:46     27M
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:41     106
25c3-2799-en-console_hacking_2008_wii_fail.mp3     29-Dec-2008 15:38     26M
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5 06-Jan-2009 20:21      81
25c3-2799-en-console_hacking_2008_wii_fail.ogg     29-Dec-2008 13:53     23M
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5 06-Jan-2009 20:21      81
25c3-2806-en-building_an_international_movement..> 29-Dec-2008 13:16     30M
25c3-2806-en-building_an_international_movement..> 06-Jan-2009 20:21     102
25c3-2806-en-building_an_international_movement..> 29-Dec-2008 13:16     27M
25c3-2806-en-building_an_international_movement..> 06-Jan-2009 20:21     102
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28     24M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28      98
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28     21M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28      98
25c3-2812-de-fnord_news_show.mp3                   29-Dec-2008 22:08     23M
25c3-2812-de-fnord_news_show.mp3.md5               06-Jan-2009 20:21      67
25c3-2812-de-fnord_news_show.ogg                   29-Dec-2008 22:08     20M
25c3-2812-de-fnord_news_show.ogg.md5               06-Jan-2009 20:21      67
25c3-2814-de-datenpannen.mp3                       29-Dec-2008 15:12     24M
25c3-2814-de-datenpannen.mp3.md5                   06-Jan-2009 20:21      63
25c3-2814-de-datenpannen.ogg                       29-Dec-2008 15:16     22M
25c3-2814-de-datenpannen.ogg.md5                   06-Jan-2009 20:21      63
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3   29-Dec-2008 15:10     22M
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp..> 06-Jan-2009 20:21      83
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg   29-Dec-2008 15:21     20M
25c3-2815-en-beyond_asimov_-_laws_for_robots.og..> 06-Jan-2009 20:21      83
25c3-2816-en-cisco_ios_attack_and_defense.mp3      06-Jan-2009 20:42     30M
25c3-2816-en-cisco_ios_attack_and_defense.mp3.md5  06-Jan-2009 20:41      80
25c3-2816-en-cisco_ios_attack_and_defense.ogg      06-Jan-2009 20:46     25M
25c3-2816-en-cisco_ios_attack_and_defense.ogg.md5  06-Jan-2009 20:41      80
25c3-2827-de-u23.mp3                               29-Dec-2008 23:19     23M
25c3-2827-de-u23.mp3.md5                           06-Jan-2009 20:21      55
25c3-2827-de-u23.ogg                               30-Dec-2008 01:46     20M
25c3-2827-de-u23.ogg.md5                           06-Jan-2009 20:21      55
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08     20M
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08      86
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:09     18M
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:08      86
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:42     17M
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:41      99
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:46     15M
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:41      99
25c3-2832-en-exploiting_symbian.mp3                29-Dec-2008 14:22     29M
25c3-2832-en-exploiting_symbian.mp3.md5            06-Jan-2009 20:21      70
25c3-2832-en-exploiting_symbian.ogg                29-Dec-2008 14:22     26M
25c3-2832-en-exploiting_symbian.ogg.md5            06-Jan-2009 20:21      70
25c3-2839-en-cracking_the_msp430_bsl.mp3           29-Dec-2008 15:08     17M
25c3-2839-en-cracking_the_msp430_bsl.mp3.md5       06-Jan-2009 20:21      75
25c3-2839-en-cracking_the_msp430_bsl.ogg           29-Dec-2008 13:24     15M
25c3-2839-en-cracking_the_msp430_bsl.ogg.md5       06-Jan-2009 20:21      75
25c3-2843-en-algorithmic_music_in_a_box.mp3        07-Jan-2009 23:09     23M
25c3-2843-en-algorithmic_music_in_a_box.mp3.md5    07-Jan-2009 23:08      78
25c3-2843-en-algorithmic_music_in_a_box.ogg        07-Jan-2009 23:10     21M
25c3-2843-en-algorithmic_music_in_a_box.ogg.md5    07-Jan-2009 23:08      78
25c3-2845-en-rf_fingerprinting_of_rfid.mp3         29-Dec-2008 14:34     20M
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5     06-Jan-2009 20:21      77
25c3-2845-en-rf_fingerprinting_of_rfid.ogg         29-Dec-2008 13:21     18M
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5     06-Jan-2009 20:21      77
25c3-2860-de-neusprech_im_berwachungsstaat.mp3     30-Dec-2008 01:47     32M
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5 06-Jan-2009 20:21      81
25c3-2860-de-neusprech_im_berwachungsstaat.ogg     30-Dec-2008 01:48     29M
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5 06-Jan-2009 20:21      81
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59     30M
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59      89
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59     26M
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59      89
25c3-2872-en-the_privacy_workshop_project.mp3      29-Dec-2008 23:20     22M
25c3-2872-en-the_privacy_workshop_project.mp3.md5  06-Jan-2009 20:21      80
25c3-2872-en-the_privacy_workshop_project.ogg      30-Dec-2008 01:50     20M
25c3-2872-en-the_privacy_workshop_project.ogg.md5  06-Jan-2009 20:21      80
25c3-2873-en-privacy_in_the_social_semantic_web..> 29-Dec-2008 23:02     21M
25c3-2873-en-privacy_in_the_social_semantic_web..> 06-Jan-2009 20:21      86
25c3-2873-en-privacy_in_the_social_semantic_web..> 30-Dec-2008 01:45     19M
25c3-2873-en-privacy_in_the_social_semantic_web..> 06-Jan-2009 20:21      86
25c3-2874-en-the_ultimate_commodore_64_talk.mp3    11-Jan-2009 21:42     28M
25c3-2874-en-the_ultimate_commodore_64_talk.mp3..> 11-Jan-2009 21:42      82
25c3-2874-en-the_ultimate_commodore_64_talk.ogg    11-Jan-2009 21:42     25M
25c3-2874-en-the_ultimate_commodore_64_talk.ogg..> 11-Jan-2009 21:42      82
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:09     21M
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:08      96
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:10     19M
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:08      96
25c3-2882-en-full-disk-encryption_crash-course.mp3 29-Dec-2008 13:54     22M
25c3-2882-en-full-disk-encryption_crash-course...> 06-Jan-2009 20:21      85
25c3-2882-en-full-disk-encryption_crash-course.ogg 29-Dec-2008 14:01     20M
25c3-2882-en-full-disk-encryption_crash-course...> 06-Jan-2009 20:21      85
25c3-2890-en-scalable_swarm_robotics.mp3           29-Dec-2008 14:28     18M
25c3-2890-en-scalable_swarm_robotics.mp3.md5       06-Jan-2009 20:21      75
25c3-2890-en-scalable_swarm_robotics.ogg           29-Dec-2008 13:19     16M
25c3-2890-en-scalable_swarm_robotics.ogg.md5       06-Jan-2009 20:21      75
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3      29-Dec-2008 14:11     20M
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5  06-Jan-2009 20:21      80
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg      29-Dec-2008 14:11     19M
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5  06-Jan-2009 20:21      80
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:42     28M
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:41      88
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:46     25M
25c3-2893-en-attacking_rich_internet_applicatio..> 06-Jan-2009 20:41      88
25c3-2895-de-der_elektronische_personalausweis.mp3 11-Jan-2009 21:42     27M
25c3-2895-de-der_elektronische_personalausweis...> 11-Jan-2009 21:42      85
25c3-2895-de-der_elektronische_personalausweis.ogg 11-Jan-2009 21:42     24M
25c3-2895-de-der_elektronische_personalausweis...> 11-Jan-2009 21:42      85
25c3-2896-en-chip_reverse_engineering.mp3          29-Dec-2008 12:17     20M
25c3-2896-en-chip_reverse_engineering.mp3.md5      06-Jan-2009 20:21      76
25c3-2896-en-chip_reverse_engineering.ogg          29-Dec-2008 13:07     18M
25c3-2896-en-chip_reverse_engineering.ogg.md5      06-Jan-2009 20:21      76
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:43     27M
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:41      91
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:46     24M
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:41      91
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 29-Dec-2008 12:55     23M
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 06-Jan-2009 20:21      86
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 29-Dec-2008 15:29     20M
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 06-Jan-2009 20:21      86
25c3-2904-en-solar-powering_your_geek_gear.mp3     29-Dec-2008 12:05     13M
25c3-2904-en-solar-powering_your_geek_gear.mp3.md5 06-Jan-2009 20:21      81
25c3-2904-en-solar-powering_your_geek_gear.ogg     29-Dec-2008 18:27     12M
25c3-2904-en-solar-powering_your_geek_gear.ogg.md5 06-Jan-2009 20:21      81
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:39     33M
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:38     102
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:39     30M
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 12-Jan-2009 01:38     102
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 29-Dec-2008 15:11     14M
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 06-Jan-2009 20:21      89
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 29-Dec-2008 13:12     12M
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 06-Jan-2009 20:21      89
25c3-2916-en-wikileaks.mp3                         11-Jan-2009 21:42     27M
25c3-2916-en-wikileaks.mp3.md5                     11-Jan-2009 21:42      61
25c3-2916-en-wikileaks.ogg                         11-Jan-2009 21:42     24M
25c3-2916-en-wikileaks.ogg.md5                     11-Jan-2009 21:42      61
25c3-2922-en-advanced_memory_forensics_the_cold..> 29-Dec-2008 15:13     27M
25c3-2922-en-advanced_memory_forensics_the_cold..> 06-Jan-2009 20:21      99
25c3-2922-en-advanced_memory_forensics_the_cold..> 29-Dec-2008 15:22     24M
25c3-2922-en-advanced_memory_forensics_the_cold..> 06-Jan-2009 20:21      99
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:43     25M
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:41      92
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:47     22M
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:41      92
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 29-Dec-2008 13:16     29M
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:21      90
25c3-2934-en-blinkenlights_stereoscope.mp3         06-Jan-2009 20:43     30M
25c3-2934-en-blinkenlights_stereoscope.mp3.md5     06-Jan-2009 20:41      77
25c3-2934-en-blinkenlights_stereoscope.ogg         06-Jan-2009 20:47     26M
25c3-2934-en-blinkenlights_stereoscope.ogg.md5     06-Jan-2009 20:41      77
25c3-2937-en-dect.mp3                              06-Jan-2009 20:43     31M
25c3-2937-en-dect.mp3.md5                          06-Jan-2009 20:41      56
25c3-2937-en-dect.ogg                              06-Jan-2009 20:47     27M
25c3-2937-en-dect.ogg.md5                          06-Jan-2009 20:41      56
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:44     23M
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:41     116
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:48     21M
25c3-2938-en-methods_for_understanding_targeted..> 06-Jan-2009 20:41     116
25c3-2940-en-flying_for_free.mp3                   22-Jan-2009 23:28     28M
25c3-2940-en-flying_for_free.mp3.md5               22-Jan-2009 23:28      67
25c3-2940-en-flying_for_free.ogg                   22-Jan-2009 23:28     25M
25c3-2940-en-flying_for_free.ogg.md5               22-Jan-2009 23:28      67
25c3-2942-de-vertex_hacking.mp3                    06-Jan-2009 20:44     22M
25c3-2942-de-vertex_hacking.mp3.md5                06-Jan-2009 20:41      66
25c3-2942-de-vertex_hacking.ogg                    06-Jan-2009 20:48     20M
25c3-2942-de-vertex_hacking.ogg.md5                06-Jan-2009 20:41      66
25c3-2952-de-pflanzenhacken.mp3                    11-Jan-2009 21:42     25M
25c3-2952-de-pflanzenhacken.mp3.md5                11-Jan-2009 21:42      66
25c3-2952-de-pflanzenhacken.ogg                    11-Jan-2009 21:42     22M
25c3-2952-de-pflanzenhacken.ogg.md5                11-Jan-2009 21:42      66
25c3-2953-en-security_failures_in_smart_card_pa..> 29-Dec-2008 15:08     28M
25c3-2953-en-security_failures_in_smart_card_pa..> 06-Jan-2009 20:21      99
25c3-2953-en-security_failures_in_smart_card_pa..> 29-Dec-2008 15:06     25M
25c3-2953-en-security_failures_in_smart_card_pa..> 06-Jan-2009 20:21      99
25c3-2958-de-hacker_jeopardy.mp3                   12-Jan-2009 01:39     47M
25c3-2958-de-hacker_jeopardy.mp3.md5               12-Jan-2009 01:38      67
25c3-2958-de-hacker_jeopardy.ogg                   12-Jan-2009 01:39     42M
25c3-2958-de-hacker_jeopardy.ogg.md5               12-Jan-2009 01:38      67
25c3-2963-de-handschellen_hacken.mp3               26-Jan-2009 11:39     28M
25c3-2963-de-handschellen_hacken.mp3.md5           26-Jan-2009 11:39      71
25c3-2963-de-handschellen_hacken.ogg               26-Jan-2009 11:39     25M
25c3-2963-de-handschellen_hacken.ogg.md5           26-Jan-2009 11:39      71
25c3-2970-en-coreboot_beyond_the_final_frontier..> 29-Dec-2008 00:52     23M
25c3-2970-en-coreboot_beyond_the_final_frontier..> 06-Jan-2009 20:21      86
25c3-2970-en-coreboot_beyond_the_final_frontier..> 29-Dec-2008 15:23     21M
25c3-2970-en-coreboot_beyond_the_final_frontier..> 06-Jan-2009 20:21      86
25c3-2973-en-lightning_talks_day4.mp3              11-Jan-2009 21:42     28M
25c3-2973-en-lightning_talks_day4.mp3.md5          11-Jan-2009 21:42      72
25c3-2973-en-lightning_talks_day4.ogg              11-Jan-2009 21:42     25M
25c3-2973-en-lightning_talks_day4.ogg.md5          11-Jan-2009 21:42      72
25c3-2975-de-zehn_big_brother_awards_in_at.mp3     06-Jan-2009 20:44     26M
25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md5 06-Jan-2009 20:41      81
25c3-2975-de-zehn_big_brother_awards_in_at.ogg     06-Jan-2009 20:48     23M
25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md5 06-Jan-2009 20:41      81
25c3-2976-en-hacking_the_iphone.mp3                29-Dec-2008 12:59     27M
25c3-2976-en-hacking_the_iphone.mp3.md5            06-Jan-2009 20:21      70
25c3-2976-en-hacking_the_iphone.ogg                29-Dec-2008 15:24     24M
25c3-2976-en-hacking_the_iphone.ogg.md5            06-Jan-2009 20:21      70
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:44     28M
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:41      97
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:48     25M
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:41      97
25c3-2979-en-embracing_post-privacy.mp3            06-Jan-2009 20:44     27M
25c3-2979-en-embracing_post-privacy.mp3.md5        06-Jan-2009 20:41      74
25c3-2979-en-embracing_post-privacy.ogg            06-Jan-2009 20:48     24M
25c3-2979-en-embracing_post-privacy.ogg.md5        06-Jan-2009 20:41      74
25c3-2980-en-the_infinite_library.mp3              06-Jan-2009 22:25     27M
25c3-2980-en-the_infinite_library.mp3.md5          06-Jan-2009 22:25      72
25c3-2980-en-the_infinite_library.ogg              07-Jan-2009 23:10     24M
25c3-2980-en-the_infinite_library.ogg.md5          07-Jan-2009 23:08      72
25c3-2988-en-just_estonia_and_georgia.mp3          06-Jan-2009 20:45     20M
25c3-2988-en-just_estonia_and_georgia.mp3.md5      06-Jan-2009 20:41      76
25c3-2988-en-just_estonia_and_georgia.ogg          06-Jan-2009 20:48     18M
25c3-2988-en-just_estonia_and_georgia.ogg.md5      06-Jan-2009 20:41      76
25c3-2991-en-terrorist_all-stars.mp3               06-Jan-2009 20:45     30M
25c3-2991-en-terrorist_all-stars.mp3.md5           06-Jan-2009 20:41      71
25c3-2991-en-terrorist_all-stars.ogg               06-Jan-2009 20:48     27M
25c3-2991-en-terrorist_all-stars.ogg.md5           06-Jan-2009 20:41      71
25c3-2992-en-tricks_makes_you_smile.mp3            07-Jan-2009 23:09     16M
25c3-2992-en-tricks_makes_you_smile.mp3.md5        07-Jan-2009 23:08      74
25c3-2992-en-tricks_makes_you_smile.ogg            07-Jan-2009 23:10     14M
25c3-2992-en-tricks_makes_you_smile.ogg.md5        07-Jan-2009 23:08      74
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:45     23M
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:41     108
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:49     21M
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 06-Jan-2009 20:41     108
25c3-2997-en-locating_mobile_phones_using_ss7.mp3  29-Dec-2008 15:15     22M
25c3-2997-en-locating_mobile_phones_using_ss7.m..> 06-Jan-2009 20:21      84
25c3-2997-en-locating_mobile_phones_using_ss7.ogg  29-Dec-2008 15:18     20M
25c3-2997-en-locating_mobile_phones_using_ss7.o..> 06-Jan-2009 20:21      84
25c3-2999-en-closing_ceremony.mp3                  11-Jan-2009 21:42     23M
25c3-2999-en-closing_ceremony.mp3.md5              11-Jan-2009 21:42      68
25c3-2999-en-closing_ceremony.ogg                  11-Jan-2009 21:42     20M
25c3-2999-en-closing_ceremony.ogg.md5              11-Jan-2009 21:42      68
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:39     37M
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:38      87
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:39     33M
25c3-3000-en-stormfucker_owning_the_storm_botne..> 12-Jan-2009 01:38      87
25c3-3002-en-squeezing_attack_traces.mp3           11-Jan-2009 21:42     17M
25c3-3002-en-squeezing_attack_traces.mp3.md5       11-Jan-2009 21:42      75
25c3-3002-en-squeezing_attack_traces.ogg           11-Jan-2009 21:43     15M
25c3-3002-en-squeezing_attack_traces.ogg.md5       11-Jan-2009 21:42      75
25c3-3004-en-why_technology_sucks.mp3              06-Jan-2009 20:45     20M
25c3-3004-en-why_technology_sucks.mp3.md5          06-Jan-2009 20:41      72
25c3-3004-en-why_technology_sucks.ogg              06-Jan-2009 20:49     18M
25c3-3004-en-why_technology_sucks.ogg.md5          06-Jan-2009 20:42      72
25c3-3007-en-running_your_own_gsm_network.mp3      30-Dec-2008 17:16     20M
25c3-3007-en-running_your_own_gsm_network.mp3.md5  06-Jan-2009 20:21      80
25c3-3007-en-running_your_own_gsm_network.ogg      30-Dec-2008 17:16     18M
25c3-3007-en-running_your_own_gsm_network.ogg.md5  06-Jan-2009 20:21      80
25c3-3008-en-anatomy_of_smartphone_hardware.mp3    06-Jan-2009 20:45     26M
25c3-3008-en-anatomy_of_smartphone_hardware.mp3..> 06-Jan-2009 20:42      82
25c3-3008-en-anatomy_of_smartphone_hardware.ogg    06-Jan-2009 20:49     23M
25c3-3008-en-anatomy_of_smartphone_hardware.ogg..> 06-Jan-2009 20:42      82
25c3-3015-en-rapid_prototype_your_life.mp3         29-Dec-2008 13:10     26M
25c3-3015-en-rapid_prototype_your_life.mp3.md5     06-Jan-2009 20:21      77
25c3-3015-en-rapid_prototype_your_life.ogg         29-Dec-2008 13:09     23M
25c3-3015-en-rapid_prototype_your_life.ogg.md5     06-Jan-2009 20:21      77
25c3-3016-en-life_is_a_holodeck.mp3                11-Jan-2009 21:42     31M
25c3-3016-en-life_is_a_holodeck.mp3.md5            11-Jan-2009 21:42      70
25c3-3016-en-life_is_a_holodeck.ogg                11-Jan-2009 21:43     27M
25c3-3016-en-life_is_a_holodeck.ogg.md5            11-Jan-2009 21:42      70
25c3-3020-en-banking_malware_101.mp3               12-Jan-2009 01:39     29M
25c3-3020-en-banking_malware_101.mp3.md5           12-Jan-2009 01:38      71
25c3-3020-en-banking_malware_101.ogg               12-Jan-2009 01:40     26M
25c3-3020-en-banking_malware_101.ogg.md5           12-Jan-2009 01:38      71
25c3-3021-de-security_nightmares_2009.mp3          12-Jan-2009 01:39     43M
25c3-3021-de-security_nightmares_2009.mp3.md5      12-Jan-2009 01:38      76
25c3-3021-de-security_nightmares_2009.ogg          12-Jan-2009 01:40     38M
25c3-3021-de-security_nightmares_2009.ogg.md5      12-Jan-2009 01:38      76
25c3-3023-en-making_the_theoretical_possible.mp3   06-Jan-2009 20:46     28M
25c3-3023-en-making_the_theoretical_possible.mp..> 06-Jan-2009 20:42      83
25c3-3023-en-making_the_theoretical_possible.ogg   06-Jan-2009 20:49     25M
25c3-3023-en-making_the_theoretical_possible.og..> 06-Jan-2009 20:42      83
25c3-3024-de-jahresrueckblick.mp3                  12-Jan-2009 01:39     57M
25c3-3024-de-jahresrueckblick.mp3.md5              12-Jan-2009 01:38      68
25c3-3024-de-jahresrueckblick.ogg                  12-Jan-2009 01:40     51M
25c3-3024-de-jahresrueckblick.ogg.md5              12-Jan-2009 01:38      68
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28     36M
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28      87
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28     32M
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28      87
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3     29-Dec-2008 15:14     28M
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5 06-Jan-2009 20:21      81
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg     29-Dec-2008 15:19     25M
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5 06-Jan-2009 20:21      81
25c3-3030-en-messing_around_with_garage_doors.mp3  12-Jan-2009 01:39     35M
25c3-3030-en-messing_around_with_garage_doors.m..> 12-Jan-2009 01:38      84
25c3-3030-en-messing_around_with_garage_doors.ogg  12-Jan-2009 01:40     31M
25c3-3030-en-messing_around_with_garage_doors.o..> 12-Jan-2009 01:38      84
25c3-3032-en-analyzing_rfid_security.mp3           06-Jan-2009 20:46     25M
25c3-3032-en-analyzing_rfid_security.mp3.md5       06-Jan-2009 20:42      75
25c3-3032-en-analyzing_rfid_security.ogg           06-Jan-2009 20:50     22M
25c3-3032-en-analyzing_rfid_security.ogg.md5       06-Jan-2009 20:42      75
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 29-Dec-2008 23:00     30M
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 06-Jan-2009 20:21      87
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 30-Dec-2008 01:45     26M
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 06-Jan-2009 20:21      87
25c3-3044-en-all_your_bases_are_belong_to_us.mp3   29-Dec-2008 11:53     25M
25c3-3044-en-all_your_bases_are_belong_to_us.mp..> 06-Jan-2009 20:21      83
25c3-3044-en-all_your_bases_are_belong_to_us.ogg   29-Dec-2008 12:27     22M
25c3-3044-en-all_your_bases_are_belong_to_us.og..> 06-Jan-2009 20:21      83
25c3-3047-en-lightning_talks_day3_morning.mp3      29-Dec-2008 22:56     27M
25c3-3047-en-lightning_talks_day3_morning.mp3.md5  06-Jan-2009 20:21      80
25c3-3047-en-lightning_talks_day3_morning.ogg      29-Dec-2008 23:05     24M
25c3-3047-en-lightning_talks_day3_morning.ogg.md5  06-Jan-2009 20:21      80
25c3-3048-en-lightning_talks_day2.mp3              29-Dec-2008 15:25     23M
25c3-3048-en-lightning_talks_day2.mp3.md5          06-Jan-2009 20:21      72
25c3-3048-en-lightning_talks_day2.ogg              29-Dec-2008 15:35     21M
25c3-3048-en-lightning_talks_day2.ogg.md5          06-Jan-2009 20:21      72
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42     22M
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42      96
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:43     19M
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 11-Jan-2009 21:42      96
25c3-3053-en-lightning_talks_day3_-_evening.mp3    07-Jan-2009 23:09     25M
25c3-3053-en-lightning_talks_day3_-_evening.mp3..> 07-Jan-2009 23:08      82
25c3-3053-en-lightning_talks_day3_-_evening.ogg    07-Jan-2009 23:10     22M
25c3-3053-en-lightning_talks_day3_-_evening.ogg..> 07-Jan-2009 23:08      82
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59     23M
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59      90
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59     20M
25c3-3056-en-fnord_news_show_english_interpreta..> 13-Jan-2009 16:59      90
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59     47M
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59      90
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59     42M
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59      90
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59     42M
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59      99
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59     38M
25c3-3058-en-security_nightmares_2009_english_i..> 13-Jan-2009 16:59      99
25c3.mp3.all.md5                                   18-Jan-2011 20:25    7651
25c3.mp3.all.torrent                               04-Jan-2013 11:56    102K
25c3.ogg.all.md5                                   18-Jan-2011 20:24    7741
25c3.ogg.all.torrent                               04-Jan-2013 11:55     93K