Index of /CCC/25C3/video_h264_720x576/


../
25c3-2596-en-swf_and_the_malware_tragedy.mp4       07-Jan-2009 23:13    373M
25c3-2596-en-swf_and_the_malware_tragedy.mp4.md5   07-Jan-2009 23:10      79
25c3-2596-en-swf_and_the_malware_tragedy.mp4.to..> 18-Jan-2011 20:58     15K
25c3-2639-en-attacking_nfc_mobile_phones.mp4       11-Jan-2009 21:44    630M
25c3-2639-en-attacking_nfc_mobile_phones.mp4.md5   11-Jan-2009 21:43      79
25c3-2639-en-attacking_nfc_mobile_phones.mp4.to..> 18-Jan-2011 20:59     25K
25c3-2665-en-the_trust_situation.mp4               28-Dec-2008 00:30    466M
25c3-2665-en-the_trust_situation.mp4.md5           04-Jan-2009 12:18      71
25c3-2665-en-the_trust_situation.mp4.torrent       18-Jan-2011 21:00     19K
25c3-2669-en-collapsing_the_european_security_a..> 11-Jan-2009 21:45    448M
25c3-2669-en-collapsing_the_european_security_a..> 11-Jan-2009 21:43      97
25c3-2669-en-collapsing_the_european_security_a..> 18-Jan-2011 21:00     18K
25c3-2678-en-vulnerability_discovery_in_encrypt..> 29-Dec-2008 18:26    460M
25c3-2678-en-vulnerability_discovery_in_encrypt..> 04-Jan-2009 12:18     119
25c3-2678-en-vulnerability_discovery_in_encrypt..> 18-Jan-2011 21:00     19K
25c3-2680-en-not_soy_fast_genetically_modified_..> 07-Jan-2009 23:15    369M
25c3-2680-en-not_soy_fast_genetically_modified_..> 07-Jan-2009 23:10     138
25c3-2680-en-not_soy_fast_genetically_modified_..> 18-Jan-2011 21:01     15K
25c3-2681-en-repurposing_the_ti_ez430u.mp4         11-Jan-2009 21:45    258M
25c3-2681-en-repurposing_the_ti_ez430u.mp4.md5     11-Jan-2009 21:43      77
25c3-2681-en-repurposing_the_ti_ez430u.mp4.torrent 18-Jan-2011 21:01     11K
25c3-2734-en-short_attention_span_security.mp4     11-Jan-2009 21:46    411M
25c3-2734-en-short_attention_span_security.mp4.md5 11-Jan-2009 21:43      81
25c3-2734-en-short_attention_span_security.mp4...> 18-Jan-2011 21:01     17K
25c3-2773-en-soviet_unterzoegersdorf.mp4           30-Dec-2008 19:30    547M
25c3-2773-en-soviet_unterzoegersdorf.mp4.md5       04-Jan-2009 12:18      75
25c3-2773-en-soviet_unterzoegersdorf.mp4.torrent   18-Jan-2011 21:01     22K
25c3-2777-en-crafting_and_hacking_separated_at_..> 11-Jan-2009 21:46    277M
25c3-2777-en-crafting_and_hacking_separated_at_..> 11-Jan-2009 21:43      91
25c3-2777-en-crafting_and_hacking_separated_at_..> 18-Jan-2011 21:02     12K
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:47    399M
25c3-2781-en-objects_as_software_the_coming_rev..> 11-Jan-2009 21:43      93
25c3-2781-en-objects_as_software_the_coming_rev..> 18-Jan-2011 21:02     16K
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:53    507M
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 06-Jan-2009 20:50     106
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 18-Jan-2011 21:02     21K
25c3-2799-en-console_hacking_2008_wii_fail.mp4     29-Dec-2008 19:13    434M
25c3-2799-en-console_hacking_2008_wii_fail.mp4.md5 04-Jan-2009 12:18      81
25c3-2799-en-console_hacking_2008_wii_fail.mp4...> 18-Jan-2011 21:02     18K
25c3-2806-en-building_an_international_movement..> 30-Dec-2008 15:34    503M
25c3-2806-en-building_an_international_movement..> 04-Jan-2009 12:18     102
25c3-2806-en-building_an_international_movement..> 18-Jan-2011 21:03     20K
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:29    397M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 22-Jan-2009 23:28      98
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 18-Jan-2011 21:03     16K
25c3-2812-de-fnord_news_show.mp4                   30-Dec-2008 15:41    385M
25c3-2812-de-fnord_news_show.mp4.md5               04-Jan-2009 12:18      67
25c3-2812-de-fnord_news_show.mp4.torrent           18-Jan-2011 21:04     16K
25c3-2814-de-datenpannen.mp4                       29-Dec-2008 19:26    405M
25c3-2814-de-datenpannen.mp4.md5                   04-Jan-2009 12:18      63
25c3-2814-de-datenpannen.mp4.torrent               18-Jan-2011 21:04     16K
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4   29-Dec-2008 19:23    379M
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp..> 04-Jan-2009 12:18      83
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp..> 18-Jan-2011 21:04     16K
25c3-2816-en-cisco_ios_attack_and_defense.mp4      07-Jan-2009 23:18    508M
25c3-2816-en-cisco_ios_attack_and_defense.mp4.md5  07-Jan-2009 23:11      80
25c3-2816-en-cisco_ios_attack_and_defense.mp4.t..> 18-Jan-2011 21:05     21K
25c3-2827-de-u23.mp4                               30-Dec-2008 15:16    383M
25c3-2827-de-u23.mp4.md5                           04-Jan-2009 12:18      55
25c3-2827-de-u23.mp4.torrent                       18-Jan-2011 21:05     16K
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:20    338M
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 07-Jan-2009 23:11      86
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 18-Jan-2011 21:05     14K
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:54    284M
25c3-2831-en-security_of_mica-based_wireless_se..> 06-Jan-2009 20:50      99
25c3-2831-en-security_of_mica-based_wireless_se..> 18-Jan-2011 21:05     12K
25c3-2832-en-exploiting_symbian.mp4                30-Dec-2008 15:17    483M
25c3-2832-en-exploiting_symbian.mp4.md5            04-Jan-2009 12:18      70
25c3-2832-en-exploiting_symbian.mp4.torrent        18-Jan-2011 21:06     20K
25c3-2839-en-cracking_the_msp430_bsl.mp4           29-Dec-2008 16:15    287M
25c3-2839-en-cracking_the_msp430_bsl.mp4.md5       04-Jan-2009 12:18      75
25c3-2839-en-cracking_the_msp430_bsl.mp4.torrent   18-Jan-2011 21:06     12K
25c3-2843-en-algorithmic_music_in_a_box.mp4        07-Jan-2009 23:22    392M
25c3-2843-en-algorithmic_music_in_a_box.mp4.md5    07-Jan-2009 23:11      78
25c3-2843-en-algorithmic_music_in_a_box.mp4.tor..> 18-Jan-2011 21:06     16K
25c3-2845-en-rf_fingerprinting_of_rfid.mp4         22-Jan-2009 23:29    341M
25c3-2845-en-rf_fingerprinting_of_rfid.mp4.md5     22-Jan-2009 23:28      77
25c3-2845-en-rf_fingerprinting_of_rfid.mp4.torrent 18-Jan-2011 21:06     14K
25c3-2860-de-neusprech_im_berwachungsstaat.mp4     30-Dec-2008 18:57    537M
25c3-2860-de-neusprech_im_berwachungsstaat.mp4.md5 04-Jan-2009 12:18      81
25c3-2860-de-neusprech_im_berwachungsstaat.mp4...> 18-Jan-2011 21:07     22K
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 17:00    495M
25c3-2863-en-climate_change_-_state_of_the_scie..> 13-Jan-2009 16:59      89
25c3-2863-en-climate_change_-_state_of_the_scie..> 18-Jan-2011 21:07     20K
25c3-2872-en-the_privacy_workshop_project.mp4      07-Jan-2009 23:24    371M
25c3-2872-en-the_privacy_workshop_project.mp4.md5  07-Jan-2009 23:11      80
25c3-2872-en-the_privacy_workshop_project.mp4.t..> 18-Jan-2011 21:07     15K
25c3-2873-en-privacy_in_the_social_semantic_web..> 30-Dec-2008 02:56    352M
25c3-2873-en-privacy_in_the_social_semantic_web..> 04-Jan-2009 12:18      86
25c3-2873-en-privacy_in_the_social_semantic_web..> 18-Jan-2011 21:07     14K
25c3-2874-en-the_ultimate_commodore_64_talk.mp4    06-Jan-2009 20:58    469M
25c3-2874-en-the_ultimate_commodore_64_talk.mp4..> 06-Jan-2009 20:50      82
25c3-2874-en-the_ultimate_commodore_64_talk.mp4..> 18-Jan-2011 21:08     19K
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:26    359M
25c3-2875-en-an_introduction_to_new_stream_ciph..> 07-Jan-2009 23:11      96
25c3-2875-en-an_introduction_to_new_stream_ciph..> 18-Jan-2011 21:08     15K
25c3-2882-en-full-disk-encryption_crash-course.mp4 30-Dec-2008 01:50    370M
25c3-2882-en-full-disk-encryption_crash-course...> 04-Jan-2009 12:18      85
25c3-2882-en-full-disk-encryption_crash-course...> 18-Jan-2011 21:08     15K
25c3-2890-en-scalable_swarm_robotics.mp4           07-Jan-2009 23:28    301M
25c3-2890-en-scalable_swarm_robotics.mp4.md5       07-Jan-2009 23:11      75
25c3-2890-en-scalable_swarm_robotics.mp4.torrent   18-Jan-2011 21:08     12K
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4      11-Jan-2009 21:48    343M
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4.md5  11-Jan-2009 21:43      80
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4.t..> 18-Jan-2011 21:09     14K
25c3-2893-en-attacking_rich_internet_applicatio..> 11-Jan-2009 21:48    472M
25c3-2893-en-attacking_rich_internet_applicatio..> 11-Jan-2009 21:43      88
25c3-2893-en-attacking_rich_internet_applicatio..> 18-Jan-2011 21:09     19K
25c3-2895-de-der_elektronische_personalausweis.mp4 11-Jan-2009 21:49    467M
25c3-2895-de-der_elektronische_personalausweis...> 11-Jan-2009 21:43      85
25c3-2895-de-der_elektronische_personalausweis...> 18-Jan-2011 21:09     19K
25c3-2896-en-chip_reverse_engineering.mp4          29-Dec-2008 20:17    345M
25c3-2896-en-chip_reverse_engineering.mp4.md5      04-Jan-2009 12:18      76
25c3-2896-en-chip_reverse_engineering.mp4.torrent  18-Jan-2011 21:10     14K
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 21:03    454M
25c3-2899-en-mining_social_contacts_with_active..> 06-Jan-2009 20:50      91
25c3-2899-en-mining_social_contacts_with_active..> 18-Jan-2011 21:10     18K
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 27-Dec-2008 22:33    384M
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 04-Jan-2009 12:18      86
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 18-Jan-2011 21:10     16K
25c3-2904-en-solar-powering_your_geek_gear.mp4     22-Jan-2009 23:29    223M
25c3-2904-en-solar-powering_your_geek_gear.mp4.md5 22-Jan-2009 23:28      81
25c3-2904-en-solar-powering_your_geek_gear.mp4...> 18-Jan-2011 21:11    9626
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 11-Jan-2009 21:50    557M
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 11-Jan-2009 21:43     102
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 18-Jan-2011 21:11     22K
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 30-Dec-2008 01:49    234M
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 04-Jan-2009 12:18      89
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 18-Jan-2011 21:11     10K
25c3-2916-en-wikileaks.mp4                         11-Jan-2009 21:51    449M
25c3-2916-en-wikileaks.mp4.md5                     11-Jan-2009 21:43      61
25c3-2916-en-wikileaks.mp4.torrent                 18-Jan-2011 21:11     18K
25c3-2922-en-advanced_memory_forensics_the_cold..> 30-Dec-2008 12:42    449M
25c3-2922-en-advanced_memory_forensics_the_cold..> 04-Jan-2009 12:18      99
25c3-2922-en-advanced_memory_forensics_the_cold..> 18-Jan-2011 21:12     18K
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 21:13    424M
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 06-Jan-2009 20:50      92
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 18-Jan-2011 21:12     17K
25c3-2934-en-blinkenlights_stereoscope.mp4         07-Jan-2009 23:31    499M
25c3-2934-en-blinkenlights_stereoscope.mp4.md5     07-Jan-2009 23:11      77
25c3-2934-en-blinkenlights_stereoscope.mp4.torrent 18-Jan-2011 21:12     20K
25c3-2937-en-dect.mp4                              06-Jan-2009 21:17    513M
25c3-2937-en-dect.mp4.md5                          06-Jan-2009 20:50      56
25c3-2937-en-dect.mp4.torrent                      18-Jan-2011 21:13     21K
25c3-2938-en-methods_for_understanding_targeted..> 07-Jan-2009 23:32    392M
25c3-2938-en-methods_for_understanding_targeted..> 07-Jan-2009 23:11     116
25c3-2938-en-methods_for_understanding_targeted..> 18-Jan-2011 21:13     16K
25c3-2940-en-flying_for_free.mp4                   22-Jan-2009 23:29    463M
25c3-2940-en-flying_for_free.mp4.md5               22-Jan-2009 23:28      67
25c3-2940-en-flying_for_free.mp4.torrent           18-Jan-2011 21:13     19K
25c3-2942-de-vertex_hacking.mp4                    06-Jan-2009 21:21    375M
25c3-2942-de-vertex_hacking.mp4.md5                06-Jan-2009 20:50      66
25c3-2942-de-vertex_hacking.mp4.torrent            18-Jan-2011 21:14     15K
25c3-2952-de-pflanzenhacken.mp4                    11-Jan-2009 21:52    417M
25c3-2952-de-pflanzenhacken.mp4.md5                11-Jan-2009 21:43      66
25c3-2952-de-pflanzenhacken.mp4.torrent            18-Jan-2011 21:14     17K
25c3-2953-en-security_failures_in_smart_card_pa..> 22-Jan-2009 23:29    450M
25c3-2953-en-security_failures_in_smart_card_pa..> 22-Jan-2009 23:28      99
25c3-2953-en-security_failures_in_smart_card_pa..> 18-Jan-2011 21:14     18K
25c3-2958-de-hacker_jeopardy.mp4                   11-Jan-2009 21:53    790M
25c3-2958-de-hacker_jeopardy.mp4.md5               11-Jan-2009 21:43      67
25c3-2958-de-hacker_jeopardy.mp4.torrent           18-Jan-2011 21:15     32K
25c3-2963-de-handschellen_hacken.mp4               26-Jan-2009 11:40    471M
25c3-2963-de-handschellen_hacken.mp4.md5           26-Jan-2009 11:39      71
25c3-2963-de-handschellen_hacken.mp4.torrent       18-Jan-2011 21:15     19K
25c3-2970-en-coreboot_beyond_the_final_frontier..> 29-Dec-2008 22:02    390M
25c3-2970-en-coreboot_beyond_the_final_frontier..> 04-Jan-2009 12:18      86
25c3-2970-en-coreboot_beyond_the_final_frontier..> 18-Jan-2011 21:15     16K
25c3-2973-en-lightning_talks_day4.mp4              11-Jan-2009 21:54    469M
25c3-2973-en-lightning_talks_day4.mp4.md5          11-Jan-2009 21:43      72
25c3-2973-en-lightning_talks_day4.mp4.torrent      18-Jan-2011 21:16     19K
25c3-2975-de-zehn_big_brother_awards_in_at.mp4     13-Jan-2009 17:00    441M
25c3-2975-de-zehn_big_brother_awards_in_at.mp4.md5 13-Jan-2009 16:59      81
25c3-2975-de-zehn_big_brother_awards_in_at.mp4...> 18-Jan-2011 21:16     18K
25c3-2976-en-hacking_the_iphone.mp4                28-Dec-2008 11:06    447M
25c3-2976-en-hacking_the_iphone.mp4.md5            04-Jan-2009 12:18      70
25c3-2976-en-hacking_the_iphone.mp4.torrent        18-Jan-2011 21:16     18K
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 21:29    477M
25c3-2977-en-security_and_anonymity_vulnerabili..> 06-Jan-2009 20:50      97
25c3-2977-en-security_and_anonymity_vulnerabili..> 18-Jan-2011 21:17     19K
25c3-2979-en-embracing_post-privacy.mp4            07-Jan-2009 23:32    455M
25c3-2979-en-embracing_post-privacy.mp4.md5        07-Jan-2009 23:11      74
25c3-2979-en-embracing_post-privacy.mp4.torrent    18-Jan-2011 21:17     18K
25c3-2980-en-the_infinite_library.mp4              07-Jan-2009 23:33    450M
25c3-2980-en-the_infinite_library.mp4.md5          07-Jan-2009 23:11      72
25c3-2980-en-the_infinite_library.mp4.torrent      18-Jan-2011 21:17     18K
25c3-2988-en-just_estonia_and_georgia.mp4          06-Jan-2009 21:30    343M
25c3-2988-en-just_estonia_and_georgia.mp4.md5      06-Jan-2009 20:50      76
25c3-2988-en-just_estonia_and_georgia.mp4.torrent  18-Jan-2011 21:18     14K
25c3-2991-en-terrorist_all-stars.mp4               06-Jan-2009 21:31    500M
25c3-2991-en-terrorist_all-stars.mp4.md5           06-Jan-2009 20:50      71
25c3-2991-en-terrorist_all-stars.mp4.torrent       18-Jan-2011 21:18     20K
25c3-2992-en-tricks_makes_you_smile.mp4            07-Jan-2009 23:33    281M
25c3-2992-en-tricks_makes_you_smile.mp4.md5        07-Jan-2009 23:11      74
25c3-2992-en-tricks_makes_you_smile.mp4.torrent    18-Jan-2011 21:18     12K
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 07-Jan-2009 23:34    388M
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 07-Jan-2009 23:11     108
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 18-Jan-2011 21:18     16K
25c3-2997-en-locating_mobile_phones_using_ss7.mp4  30-Dec-2008 20:10    372M
25c3-2997-en-locating_mobile_phones_using_ss7.m..> 04-Jan-2009 12:18      84
25c3-2997-en-locating_mobile_phones_using_ss7.m..> 18-Jan-2011 21:19     15K
25c3-2999-en-closing_ceremony.mp4                  11-Jan-2009 21:55    384M
25c3-2999-en-closing_ceremony.mp4.md5              11-Jan-2009 21:43      68
25c3-2999-en-closing_ceremony.mp4.torrent          18-Jan-2011 21:19     16K
25c3-3000-en-stormfucker_owning_the_storm_botne..> 11-Jan-2009 21:55    619M
25c3-3000-en-stormfucker_owning_the_storm_botne..> 11-Jan-2009 21:43      87
25c3-3000-en-stormfucker_owning_the_storm_botne..> 18-Jan-2011 21:20     25K
25c3-3002-en-squeezing_attack_traces.mp4           11-Jan-2009 21:56    291M
25c3-3002-en-squeezing_attack_traces.mp4.md5       11-Jan-2009 21:43      75
25c3-3002-en-squeezing_attack_traces.mp4.torrent   18-Jan-2011 21:20     12K
25c3-3004-en-why_technology_sucks.mp4              06-Jan-2009 21:32    343M
25c3-3004-en-why_technology_sucks.mp4.md5          06-Jan-2009 20:50      72
25c3-3004-en-why_technology_sucks.mp4.torrent      18-Jan-2011 21:20     14K
25c3-3007-en-running_your_own_gsm_network.mp4      13-Jan-2009 17:01    343M
25c3-3007-en-running_your_own_gsm_network.mp4.md5  13-Jan-2009 16:59      80
25c3-3007-en-running_your_own_gsm_network.mp4.t..> 18-Jan-2011 21:20     14K
25c3-3008-en-anatomy_of_smartphone_hardware.mp4    07-Jan-2009 23:35    436M
25c3-3008-en-anatomy_of_smartphone_hardware.mp4..> 07-Jan-2009 23:11      82
25c3-3008-en-anatomy_of_smartphone_hardware.mp4..> 18-Jan-2011 21:21     18K
25c3-3015-en-rapid_prototype_your_life.mp4         30-Dec-2008 20:02    437M
25c3-3015-en-rapid_prototype_your_life.mp4.md5     04-Jan-2009 12:18      77
25c3-3015-en-rapid_prototype_your_life.mp4.torrent 18-Jan-2011 21:21     18K
25c3-3016-en-life_is_a_holodeck.mp4                11-Jan-2009 21:57    516M
25c3-3016-en-life_is_a_holodeck.mp4.md5            11-Jan-2009 21:43      70
25c3-3016-en-life_is_a_holodeck.mp4.torrent        18-Jan-2011 21:22     21K
25c3-3020-en-banking_malware_101.mp4               11-Jan-2009 21:58    485M
25c3-3020-en-banking_malware_101.mp4.md5           11-Jan-2009 21:43      71
25c3-3020-en-banking_malware_101.mp4.torrent       18-Jan-2011 21:22     20K
25c3-3021-de-security_nightmares_2009.mp4          11-Jan-2009 21:59    722M
25c3-3021-de-security_nightmares_2009.mp4.md5      11-Jan-2009 21:43      76
25c3-3021-de-security_nightmares_2009.mp4.torrent  18-Jan-2011 21:23     29K
25c3-3023-en-making_the_theoretical_possible.mp4   06-Jan-2009 21:33    473M
25c3-3023-en-making_the_theoretical_possible.mp..> 06-Jan-2009 20:50      83
25c3-3023-en-making_the_theoretical_possible.mp..> 18-Jan-2011 21:23     19K
25c3-3024-de-jahresrueckblick.mp4                  11-Jan-2009 22:01    957M
25c3-3024-de-jahresrueckblick.mp4.md5              11-Jan-2009 21:43      68
25c3-3024-de-jahresrueckblick.mp4.torrent          18-Jan-2011 21:24     38K
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:30    599M
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 22-Jan-2009 23:28      87
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 18-Jan-2011 21:24     24K
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4     06-Jan-2009 21:33    470M
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4.md5 06-Jan-2009 20:50      81
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4...> 18-Jan-2011 21:24     19K
25c3-3030-en-messing_around_with_garage_doors.mp4  11-Jan-2009 22:01    587M
25c3-3030-en-messing_around_with_garage_doors.m..> 11-Jan-2009 21:43      84
25c3-3030-en-messing_around_with_garage_doors.m..> 18-Jan-2011 21:25     24K
25c3-3032-en-analyzing_rfid_security.mp4           07-Jan-2009 23:35    414M
25c3-3032-en-analyzing_rfid_security.mp4.md5       07-Jan-2009 23:11      75
25c3-3032-en-analyzing_rfid_security.mp4.torrent   18-Jan-2011 21:25     17K
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 30-Dec-2008 11:56    498M
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 04-Jan-2009 12:18      87
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 18-Jan-2011 21:26     20K
25c3-3044-en-all_your_bases_are_belong_to_us.mp4   29-Dec-2008 23:38    425M
25c3-3044-en-all_your_bases_are_belong_to_us.mp..> 04-Jan-2009 12:18      83
25c3-3044-en-all_your_bases_are_belong_to_us.mp..> 18-Jan-2011 21:26     17K
25c3-3047-en-lightning_talks_day3_morning.mp4      30-Dec-2008 01:52    456M
25c3-3047-en-lightning_talks_day3_morning.mp4.md5  04-Jan-2009 12:18      80
25c3-3047-en-lightning_talks_day3_morning.mp4.t..> 18-Jan-2011 21:26     19K
25c3-3048-en-lightning_talks_day2.mp4              12-Jan-2009 01:41    393M
25c3-3048-en-lightning_talks_day2.mp4.md5          12-Jan-2009 01:40      72
25c3-3048-en-lightning_talks_day2.mp4.torrent      18-Jan-2011 21:26     16K
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 12-Jan-2009 01:41    366M
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 12-Jan-2009 01:40      96
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 18-Jan-2011 21:27     15K
25c3-3053-en-lightning_talks_day3_-_evening.mp4    07-Jan-2009 23:36    427M
25c3-3053-en-lightning_talks_day3_-_evening.mp4..> 07-Jan-2009 23:11      82
25c3-3053-en-lightning_talks_day3_-_evening.mp4..> 18-Jan-2011 21:27     17K
25c3-3056-en-fnord_news_show_english_interpreta..> 12-Jan-2009 01:42    386M
25c3-3056-en-fnord_news_show_english_interpreta..> 12-Jan-2009 01:40      90
25c3-3056-en-fnord_news_show_english_interpreta..> 18-Jan-2011 21:28     16K
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 17:02    787M
25c3-3057-en-hacker_jeopardy_english_interpreta..> 13-Jan-2009 16:59      90
25c3-3057-en-hacker_jeopardy_english_interpreta..> 18-Jan-2011 21:28     31K
25c3-3058-en-security_nightmares_2009_english_i..> 12-Jan-2009 01:43    709M
25c3-3058-en-security_nightmares_2009_english_i..> 12-Jan-2009 01:40      99
25c3-3058-en-security_nightmares_2009_english_i..> 18-Jan-2011 21:29     28K
25c3.mp4.all.md5                                   18-Jan-2011 20:54    7651
25c3.mp4.all.torrent                               04-Jan-2013 12:02      2M