Index of /CCC/27C3/mp3-audio-only

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[SND]27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp330-Dec-2010 12:20 28M 
[   ]27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.md502-Jan-2011 21:25 89  
[   ]27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.sha102-Jan-2011 21:25 97  
[   ]27c3-3952-en-running_your_own_gsm_stack_on_a_phone.mp3.torrent04-Mar-2011 17:31 1.9K 
[SND]27c3-3957-en-ipv6_insecurities.mp302-Jan-2011 19:46 24M 
[   ]27c3-3957-en-ipv6_insecurities.mp3.md502-Jan-2011 20:34 69  
[   ]27c3-3957-en-ipv6_insecurities.mp3.sha102-Jan-2011 20:34 77  
[   ]27c3-3957-en-ipv6_insecurities.mp3.torrent04-Mar-2011 17:31 1.7K 
[SND]27c3-3983-en-hackers_and_computer_science.mp304-Jan-2011 11:07 16M 
[   ]27c3-3983-en-hackers_and_computer_science.mp3.md505-Jan-2011 01:12 80  
[   ]27c3-3983-en-hackers_and_computer_science.mp3.sha105-Jan-2011 01:12 88  
[   ]27c3-3983-en-hackers_and_computer_science.mp3.torrent04-Mar-2011 17:31 1.4K 
[SND]27c3-4003-en-cybernetics_for_the_masses.mp304-Jan-2011 21:53 18M 
[   ]27c3-4003-en-cybernetics_for_the_masses.mp3.md505-Jan-2011 01:12 78  
[   ]27c3-4003-en-cybernetics_for_the_masses.mp3.sha105-Jan-2011 01:12 86  
[   ]27c3-4003-en-cybernetics_for_the_masses.mp3.torrent04-Mar-2011 17:31 1.5K 
[SND]27c3-4006-en-diy_synthesizers_and_sound_generators.mp330-Dec-2010 14:10 11M 
[   ]27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.md502-Jan-2011 21:25 89  
[   ]27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.sha102-Jan-2011 21:25 97  
[   ]27c3-4006-en-diy_synthesizers_and_sound_generators.mp3.torrent04-Mar-2011 17:31 1.2K 
[SND]27c3-4011-en-embedded_reverse_engineering.mp330-Dec-2010 18:32 26M 
[   ]27c3-4011-en-embedded_reverse_engineering.mp3.md502-Jan-2011 21:25 80  
[   ]27c3-4011-en-embedded_reverse_engineering.mp3.sha102-Jan-2011 21:25 88  
[   ]27c3-4011-en-embedded_reverse_engineering.mp3.torrent04-Mar-2011 17:31 1.8K 
[SND]27c3-4017-en-desktop_on_the_linux.mp330-Dec-2010 18:06 25M 
[   ]27c3-4017-en-desktop_on_the_linux.mp3.md502-Jan-2011 21:25 72  
[   ]27c3-4017-en-desktop_on_the_linux.mp3.sha102-Jan-2011 21:25 80  
[   ]27c3-4017-en-desktop_on_the_linux.mp3.torrent04-Mar-2011 17:31 1.7K 
[SND]27c3-4018-en-frozencache.mp330-Dec-2010 18:06 25M 
[   ]27c3-4018-en-frozencache.mp3.md502-Jan-2011 21:25 63  
[   ]27c3-4018-en-frozencache.mp3.sha102-Jan-2011 21:25 71  
[   ]27c3-4018-en-frozencache.mp3.torrent04-Mar-2011 17:31 1.7K 
[SND]27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp330-Dec-2010 14:12 27M 
[   ]27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.md502-Jan-2011 21:25 104  
[   ]27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.sha102-Jan-2011 21:25 112  
[   ]27c3-4036-en-reverse_engineering_a_real-world_rfid_payment_system.mp3.torrent04-Mar-2011 17:31 1.8K 
[SND]27c3-4046-en-all_colours_are_beautiful.mp302-Jan-2011 19:33 16M 
[   ]27c3-4046-en-all_colours_are_beautiful.mp3.md502-Jan-2011 20:34 77  
[   ]27c3-4046-en-all_colours_are_beautiful.mp3.sha102-Jan-2011 20:34 85  
[   ]27c3-4046-en-all_colours_are_beautiful.mp3.torrent04-Mar-2011 17:31 1.4K 
[SND]27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp330-Dec-2010 14:14 29M 
[   ]27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.md502-Jan-2011 21:25 113  
[   ]27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.sha102-Jan-2011 21:25 121  
[   ]27c3-4055-en-terrorists_win_-_exploiting_telecommunications_data_retention.mp3.torrent04-Mar-2011 17:31 2.0K 
[SND]27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp330-Dec-2010 14:16 24M 
[   ]27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.md502-Jan-2011 21:25 95  
[   ]27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.sha102-Jan-2011 21:25 103  
[   ]27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp3.torrent04-Mar-2011 17:31 1.7K 
[SND]27c3-4060-en-attacking_mobile_phones.mp314-Jan-2011 00:15 28M 
[   ]27c3-4060-en-attacking_mobile_phones.mp3.md514-Jan-2011 10:24 75  
[   ]27c3-4060-en-attacking_mobile_phones.mp3.sha114-Jan-2011 10:24 83  
[   ]27c3-4060-en-attacking_mobile_phones.mp3.torrent04-Mar-2011 17:31 1.8K 
[SND]27c3-4061-en-building_custom_disassemblers.mp312-Jan-2011 13:05 33M 
[   ]27c3-4061-en-building_custom_disassemblers.mp3.md512-Jan-2011 13:27 81  
[   ]27c3-4061-en-building_custom_disassemblers.mp3.sha112-Jan-2011 13:27 89  
[   ]27c3-4061-en-building_custom_disassemblers.mp3.torrent04-Mar-2011 17:31 2.0K 
[SND]27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp304-Jan-2011 12:40 23M 
[   ]27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.md505-Jan-2011 01:12 93  
[   ]27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.sha105-Jan-2011 01:12 101  
[   ]27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp3.torrent04-Mar-2011 17:31 1.7K 
[SND]27c3-4070-de-fnord_jahresrueckblick.mp302-Jan-2011 20:19 38M 
[   ]27c3-4070-de-fnord_jahresrueckblick.mp3.md502-Jan-2011 20:38 74  
[   ]27c3-4070-de-fnord_jahresrueckblick.mp3.sha102-Jan-2011 20:38 82  
[   ]27c3-4070-de-fnord_jahresrueckblick.mp3.torrent04-Mar-2011 17:31 2.2K 
[SND]27c3-4073-de-logikschaltungen_ohne_elektronik.mp303-Jan-2011 23:59 16M 
[   ]27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.md504-Jan-2011 01:24 84  
[   ]27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.sha104-Jan-2011 01:24 92  
[   ]27c3-4073-de-logikschaltungen_ohne_elektronik.mp3.torrent04-Mar-2011 17:32 1.4K 
[SND]27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp330-Dec-2010 18:06 24M 
[   ]27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.md502-Jan-2011 21:25 93  
[   ]27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.sha102-Jan-2011 21:25 101  
[   ]27c3-4081-de-netzmedienrecht_lobbyismus_und_korruption.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4082-en-sap_landscape.mp330-Dec-2010 18:07 35M 
[   ]27c3-4082-en-sap_landscape.mp3.md502-Jan-2011 21:25 65  
[   ]27c3-4082-en-sap_landscape.mp3.sha102-Jan-2011 21:25 73  
[   ]27c3-4082-en-sap_landscape.mp3.torrent04-Mar-2011 17:32 2.1K 
[SND]27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp330-Dec-2010 18:07 14M 
[   ]27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.md502-Jan-2011 21:25 96  
[   ]27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.sha102-Jan-2011 21:25 104  
[   ]27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp3.torrent04-Mar-2011 17:32 1.3K 
[SND]27c3-4085-de-digitale_spaltung_per_gesetz.mp304-Jan-2011 21:25 19M 
[   ]27c3-4085-de-digitale_spaltung_per_gesetz.mp3.md505-Jan-2011 01:12 80  
[   ]27c3-4085-de-digitale_spaltung_per_gesetz.mp3.sha105-Jan-2011 01:12 88  
[   ]27c3-4085-de-digitale_spaltung_per_gesetz.mp3.torrent04-Mar-2011 17:32 1.5K 
[SND]27c3-4087-en-console_hacking_2010.mp330-Dec-2010 18:07 20M 
[   ]27c3-4087-en-console_hacking_2010.mp3.md502-Jan-2011 21:25 72  
[   ]27c3-4087-en-console_hacking_2010.mp3.sha102-Jan-2011 21:25 80  
[   ]27c3-4087-en-console_hacking_2010.mp3.torrent04-Mar-2011 17:32 1.5K 
[SND]27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp303-Jan-2011 23:53 29M 
[   ]27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.md504-Jan-2011 01:24 98  
[   ]27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.sha104-Jan-2011 01:24 106  
[   ]27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4090-en-the_baseband_apocalypse.mp330-Dec-2010 18:08 30M 
[   ]27c3-4090-en-the_baseband_apocalypse.mp3.md502-Jan-2011 21:25 75  
[   ]27c3-4090-en-the_baseband_apocalypse.mp3.sha102-Jan-2011 21:25 83  
[   ]27c3-4090-en-the_baseband_apocalypse.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4094-de-netzneutralitaet_und_qos.mp303-Jan-2011 01:01 36M 
[   ]27c3-4094-de-netzneutralitaet_und_qos.mp3.md503-Jan-2011 01:11 76  
[   ]27c3-4094-de-netzneutralitaet_und_qos.mp3.sha103-Jan-2011 01:11 84  
[   ]27c3-4094-de-netzneutralitaet_und_qos.mp3.torrent04-Mar-2011 17:32 2.2K 
[SND]27c3-4096-en-code_deobfuscation_by_optimization.mp330-Dec-2010 18:33 22M 
[   ]27c3-4096-en-code_deobfuscation_by_optimization.mp3.md502-Jan-2011 21:25 86  
[   ]27c3-4096-en-code_deobfuscation_by_optimization.mp3.sha102-Jan-2011 21:25 94  
[   ]27c3-4096-en-code_deobfuscation_by_optimization.mp3.torrent04-Mar-2011 17:32 1.6K 
[SND]27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp330-Dec-2010 18:08 20M 
[   ]27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.md502-Jan-2011 21:25 106  
[   ]27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.sha102-Jan-2011 21:25 114  
[   ]27c3-4097-de-techniken_zur_identifizierung_von_netzwerk-protokollen.mp3.torrent04-Mar-2011 17:32 1.6K 
[SND]27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp304-Jan-2011 00:38 29M 
[   ]27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.md504-Jan-2011 01:24 92  
[   ]27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.sha104-Jan-2011 01:24 100  
[   ]27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4099-en-file_-_print_-_electronics.mp330-Dec-2010 18:33 23M 
[   ]27c3-4099-en-file_-_print_-_electronics.mp3.md502-Jan-2011 21:25 78  
[   ]27c3-4099-en-file_-_print_-_electronics.mp3.sha102-Jan-2011 21:25 86  
[   ]27c3-4099-en-file_-_print_-_electronics.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4103-en-copyright_enforcement_versus_freedoms.mp305-Jan-2011 19:57 25M 
[   ]27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.md505-Jan-2011 20:32 89  
[   ]27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.sha105-Jan-2011 20:32 97  
[   ]27c3-4103-en-copyright_enforcement_versus_freedoms.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp330-Dec-2010 18:33 28M 
[   ]27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.md502-Jan-2011 21:25 82  
[   ]27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.sha102-Jan-2011 21:25 90  
[   ]27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp308-Jan-2011 12:05 26M 
[   ]27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.md508-Jan-2011 23:09 95  
[   ]27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.sha108-Jan-2011 23:09 103  
[   ]27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4121-en-is_the_ssliverse_a_safe_place.mp330-Dec-2010 18:33 26M 
[   ]27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.md502-Jan-2011 21:25 81  
[   ]27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.sha102-Jan-2011 21:25 89  
[   ]27c3-4121-en-is_the_ssliverse_a_safe_place.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4123-en-defense_is_not_dead.mp330-Dec-2010 18:33 29M 
[   ]27c3-4123-en-defense_is_not_dead.mp3.md502-Jan-2011 21:25 71  
[   ]27c3-4123-en-defense_is_not_dead.mp3.sha102-Jan-2011 21:25 79  
[   ]27c3-4123-en-defense_is_not_dead.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp305-Jan-2011 19:56 28M 
[   ]27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.md505-Jan-2011 20:32 95  
[   ]27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.sha105-Jan-2011 20:32 103  
[   ]27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4125-de-spinning_the_electornic_wheel.mp330-Dec-2010 18:33 29M 
[   ]27c3-4125-de-spinning_the_electornic_wheel.mp3.md502-Jan-2011 21:25 81  
[   ]27c3-4125-de-spinning_the_electornic_wheel.mp3.sha102-Jan-2011 21:25 89  
[   ]27c3-4125-de-spinning_the_electornic_wheel.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4138-en-secure_communications_below_the_hearing_threshold.mp330-Dec-2010 18:34 26M 
[   ]27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.md502-Jan-2011 21:25 101  
[   ]27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.sha102-Jan-2011 21:25 109  
[   ]27c3-4138-en-secure_communications_below_the_hearing_threshold.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4140-en-contemporary_profiling_of_web_users.mp303-Jan-2011 01:01 25M 
[   ]27c3-4140-en-contemporary_profiling_of_web_users.mp3.md503-Jan-2011 01:11 87  
[   ]27c3-4140-en-contemporary_profiling_of_web_users.mp3.sha103-Jan-2011 01:11 95  
[   ]27c3-4140-en-contemporary_profiling_of_web_users.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4141-de-hacker_jeopardy.mp330-Dec-2010 18:34 61M 
[   ]27c3-4141-de-hacker_jeopardy.mp3.md502-Jan-2011 21:25 67  
[   ]27c3-4141-de-hacker_jeopardy.mp3.sha102-Jan-2011 21:25 75  
[   ]27c3-4141-de-hacker_jeopardy.mp3.torrent04-Mar-2011 17:32 3.1K 
[SND]27c3-4142-en-nodejs_as_a_networking_tool.mp302-Jan-2011 20:03 15M 
[   ]27c3-4142-en-nodejs_as_a_networking_tool.mp3.md502-Jan-2011 20:38 79  
[   ]27c3-4142-en-nodejs_as_a_networking_tool.mp3.sha102-Jan-2011 20:38 87  
[   ]27c3-4142-en-nodejs_as_a_networking_tool.mp3.torrent04-Mar-2011 17:32 1.3K 
[SND]27c3-4143-en-part-time_scientists.mp330-Dec-2010 18:34 26M 
[   ]27c3-4143-en-part-time_scientists.mp3.md502-Jan-2011 21:25 72  
[   ]27c3-4143-en-part-time_scientists.mp3.sha102-Jan-2011 21:25 80  
[   ]27c3-4143-en-part-time_scientists.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4144-en-a_short_political_history_of_acoustics.mp330-Dec-2010 18:34 23M 
[   ]27c3-4144-en-a_short_political_history_of_acoustics.mp3.md502-Jan-2011 21:25 90  
[   ]27c3-4144-en-a_short_political_history_of_acoustics.mp3.sha102-Jan-2011 21:25 98  
[   ]27c3-4144-en-a_short_political_history_of_acoustics.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4145-en-spoilers_human_interfaces_airplanes.mp305-Jan-2011 19:56 31M 
[   ]27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.md505-Jan-2011 20:32 87  
[   ]27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.sha105-Jan-2011 20:32 95  
[   ]27c3-4145-en-spoilers_human_interfaces_airplanes.mp3.torrent04-Mar-2011 17:32 2.0K 
[SND]27c3-4149-en-i_control_your_code.mp330-Dec-2010 18:35 28M 
[   ]27c3-4149-en-i_control_your_code.mp3.md502-Jan-2011 21:25 71  
[   ]27c3-4149-en-i_control_your_code.mp3.sha102-Jan-2011 21:25 79  
[   ]27c3-4149-en-i_control_your_code.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4151-en-android_geolocation_using_gsm_network.mp330-Dec-2010 18:56 29M 
[   ]27c3-4151-en-android_geolocation_using_gsm_network.mp3.md502-Jan-2011 21:25 89  
[   ]27c3-4151-en-android_geolocation_using_gsm_network.mp3.sha102-Jan-2011 21:25 97  
[   ]27c3-4151-en-android_geolocation_using_gsm_network.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp330-Dec-2010 18:56 24M 
[   ]27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.md502-Jan-2011 21:25 88  
[   ]27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.sha102-Jan-2011 21:25 96  
[   ]27c3-4159-en-reverse_engineering_the_mos_6502_cpu.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4160-en-automatic_identification_cryptographic_primitives.mp305-Jan-2011 00:56 23M 
[   ]27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.md505-Jan-2011 01:12 101  
[   ]27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.sha105-Jan-2011 01:12 109  
[   ]27c3-4160-en-automatic_identification_cryptographic_primitives.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4164-de-friede_sei_mit_euren_daten.mp305-Jan-2011 19:57 25M 
[   ]27c3-4164-de-friede_sei_mit_euren_daten.mp3.md505-Jan-2011 20:32 78  
[   ]27c3-4164-de-friede_sei_mit_euren_daten.mp3.sha105-Jan-2011 20:32 86  
[   ]27c3-4164-de-friede_sei_mit_euren_daten.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4168-en-automated_architecture_independent_gadget_search.mp305-Jan-2011 19:56 17M 
[   ]27c3-4168-en-automated_architecture_independent_gadget_search.mp3.md505-Jan-2011 20:32 100  
[   ]27c3-4168-en-automated_architecture_independent_gadget_search.mp3.sha105-Jan-2011 20:32 108  
[   ]27c3-4168-en-automated_architecture_independent_gadget_search.mp3.torrent04-Mar-2011 17:32 1.4K 
[SND]27c3-4174-en-the_hidden_nemesis.mp330-Dec-2010 18:56 21M 
[   ]27c3-4174-en-the_hidden_nemesis.mp3.md502-Jan-2011 21:25 70  
[   ]27c3-4174-en-the_hidden_nemesis.mp3.sha102-Jan-2011 21:25 78  
[   ]27c3-4174-en-the_hidden_nemesis.mp3.torrent04-Mar-2011 17:32 1.6K 
[SND]27c3-4175-en-from_robot_to_robot.mp302-Jan-2011 19:38 21M 
[   ]27c3-4175-en-from_robot_to_robot.mp3.md502-Jan-2011 20:38 71  
[   ]27c3-4175-en-from_robot_to_robot.mp3.sha102-Jan-2011 20:38 79  
[   ]27c3-4175-en-from_robot_to_robot.mp3.torrent04-Mar-2011 17:32 1.6K 
[SND]27c3-4176-de-hacking_ibuttons.mp302-Jan-2011 19:54 24M 
[   ]27c3-4176-de-hacking_ibuttons.mp3.md502-Jan-2011 20:38 68  
[   ]27c3-4176-de-hacking_ibuttons.mp3.sha102-Jan-2011 20:38 76  
[   ]27c3-4176-de-hacking_ibuttons.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4181-en-sip_home_gateways_under_fire.mp330-Dec-2010 18:56 11M 
[   ]27c3-4181-en-sip_home_gateways_under_fire.mp3.md502-Jan-2011 21:25 80  
[   ]27c3-4181-en-sip_home_gateways_under_fire.mp3.sha102-Jan-2011 21:25 88  
[   ]27c3-4181-en-sip_home_gateways_under_fire.mp3.torrent04-Mar-2011 17:32 1.2K 
[SND]27c3-4183-en-safety_on_the_open_sea.mp330-Dec-2010 18:57 27M 
[   ]27c3-4183-en-safety_on_the_open_sea.mp3.md502-Jan-2011 21:25 74  
[   ]27c3-4183-en-safety_on_the_open_sea.mp3.sha102-Jan-2011 21:25 82  
[   ]27c3-4183-en-safety_on_the_open_sea.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4184-de-stanislaw_lem_weltverbesserer.mp312-Jan-2011 13:12 20M 
[   ]27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.md512-Jan-2011 13:27 81  
[   ]27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.sha112-Jan-2011 13:27 89  
[   ]27c3-4184-de-stanislaw_lem_weltverbesserer.mp3.torrent04-Mar-2011 17:32 1.5K 
[SND]27c3-4185-de-whistleblowing_licht_ins_dunkel.mp330-Dec-2010 18:57 27M 
[   ]27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.md502-Jan-2011 21:25 83  
[   ]27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.sha102-Jan-2011 21:25 91  
[   ]27c3-4185-de-whistleblowing_licht_ins_dunkel.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4187-en-your_infrastructure_will_kill_you.mp330-Dec-2010 18:57 31M 
[   ]27c3-4187-en-your_infrastructure_will_kill_you.mp3.md502-Jan-2011 21:26 85  
[   ]27c3-4187-en-your_infrastructure_will_kill_you.mp3.sha102-Jan-2011 21:26 93  
[   ]27c3-4187-en-your_infrastructure_will_kill_you.mp3.torrent04-Mar-2011 17:32 2.0K 
[SND]27c3-4190-en-data_retention_in_the_eu.mp330-Dec-2010 18:57 27M 
[   ]27c3-4190-en-data_retention_in_the_eu.mp3.md502-Jan-2011 21:26 76  
[   ]27c3-4190-en-data_retention_in_the_eu.mp3.sha102-Jan-2011 21:26 84  
[   ]27c3-4190-en-data_retention_in_the_eu.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4193-en-having_fun_with_rtp.mp308-Jan-2011 11:26 16M 
[   ]27c3-4193-en-having_fun_with_rtp.mp3.md508-Jan-2011 23:09 71  
[   ]27c3-4193-en-having_fun_with_rtp.mp3.sha108-Jan-2011 23:09 79  
[   ]27c3-4193-en-having_fun_with_rtp.mp3.torrent04-Mar-2011 17:32 1.4K 
[SND]27c3-4195-de-literarischer_abend.mp330-Dec-2010 18:57 26M 
[   ]27c3-4195-de-literarischer_abend.mp3.md502-Jan-2011 21:26 71  
[   ]27c3-4195-de-literarischer_abend.mp3.sha102-Jan-2011 21:26 79  
[   ]27c3-4195-de-literarischer_abend.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp310-Jan-2011 22:13 26M 
[   ]27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.md510-Jan-2011 22:16 103  
[   ]27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.sha110-Jan-2011 22:16 111  
[   ]27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp330-Dec-2010 18:58 26M 
[   ]27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.md502-Jan-2011 21:26 100  
[   ]27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.sha102-Jan-2011 21:26 108  
[   ]27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4206-en-immi_from_concept_to_reality.mp330-Dec-2010 18:58 26M 
[   ]27c3-4206-en-immi_from_concept_to_reality.mp3.md502-Jan-2011 21:26 80  
[   ]27c3-4206-en-immi_from_concept_to_reality.mp3.sha102-Jan-2011 21:26 88  
[   ]27c3-4206-en-immi_from_concept_to_reality.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4208-en-wideband_gsm_sniffing.mp330-Dec-2010 18:58 29M 
[   ]27c3-4208-en-wideband_gsm_sniffing.mp3.md502-Jan-2011 21:26 73  
[   ]27c3-4208-en-wideband_gsm_sniffing.mp3.sha102-Jan-2011 21:26 81  
[   ]27c3-4208-en-wideband_gsm_sniffing.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp302-Jan-2011 20:15 30M 
[   ]27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.md502-Jan-2011 20:38 102  
[   ]27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.sha102-Jan-2011 20:38 110  
[   ]27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp3.torrent04-Mar-2011 17:32 2.0K 
[SND]27c3-4210-en-lying_to_the_neighbours.mp308-Jan-2011 15:14 16M 
[   ]27c3-4210-en-lying_to_the_neighbours.mp3.md508-Jan-2011 23:10 75  
[   ]27c3-4210-en-lying_to_the_neighbours.mp3.sha108-Jan-2011 23:10 83  
[   ]27c3-4210-en-lying_to_the_neighbours.mp3.torrent04-Mar-2011 17:32 1.4K 
[SND]27c3-4211-en-chip_and_pin_is_broken.mp305-Jan-2011 20:30 26M 
[   ]27c3-4211-en-chip_and_pin_is_broken.mp3.md505-Jan-2011 20:32 74  
[   ]27c3-4211-en-chip_and_pin_is_broken.mp3.sha105-Jan-2011 20:32 82  
[   ]27c3-4211-en-chip_and_pin_is_broken.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4221-en-omg_wtf_pdf.mp305-Jan-2011 19:56 26M 
[   ]27c3-4221-en-omg_wtf_pdf.mp3.md505-Jan-2011 20:32 63  
[   ]27c3-4221-en-omg_wtf_pdf.mp3.sha105-Jan-2011 20:32 71  
[   ]27c3-4221-en-omg_wtf_pdf.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4230-de-security_nightmares.mp305-Jan-2011 19:56 39M 
[   ]27c3-4230-de-security_nightmares.mp3.md505-Jan-2011 20:32 71  
[   ]27c3-4230-de-security_nightmares.mp3.sha105-Jan-2011 20:32 79  
[   ]27c3-4230-de-security_nightmares.mp3.torrent04-Mar-2011 17:32 2.2K 
[SND]27c3-4231-en-datenrettung_fun_with_hard_drives.mp305-Jan-2011 00:58 28M 
[   ]27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.md505-Jan-2011 01:12 85  
[   ]27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.sha105-Jan-2011 01:12 93  
[   ]27c3-4231-en-datenrettung_fun_with_hard_drives.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4234-en-usb_and_libusb.mp302-Jan-2011 22:15 25M 
[   ]27c3-4234-en-usb_and_libusb.mp3.md503-Jan-2011 01:11 66  
[   ]27c3-4234-en-usb_and_libusb.mp3.sha103-Jan-2011 01:11 74  
[   ]27c3-4234-en-usb_and_libusb.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4236-en-international_cyber_jurisdiction.mp305-Jan-2011 00:58 27M 
[   ]27c3-4236-en-international_cyber_jurisdiction.mp3.md505-Jan-2011 01:12 84  
[   ]27c3-4236-en-international_cyber_jurisdiction.mp3.sha105-Jan-2011 01:12 92  
[   ]27c3-4236-en-international_cyber_jurisdiction.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4237-en-indect_eu_surveillance_project.mp308-Jan-2011 20:24 30M 
[   ]27c3-4237-en-indect_eu_surveillance_project.mp3.md508-Jan-2011 23:10 82  
[   ]27c3-4237-en-indect_eu_surveillance_project.mp3.sha108-Jan-2011 23:10 90  
[   ]27c3-4237-en-indect_eu_surveillance_project.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4239-en-lightning_talks_d3.mp305-Jan-2011 00:58 33M 
[   ]27c3-4239-en-lightning_talks_d3.mp3.md505-Jan-2011 01:12 70  
[   ]27c3-4239-en-lightning_talks_d3.mp3.sha105-Jan-2011 01:12 78  
[   ]27c3-4239-en-lightning_talks_d3.mp3.torrent04-Mar-2011 17:32 2.0K 
[SND]27c3-4244-en-critical_overview_of_10_years_pet.mp305-Jan-2011 00:58 25M 
[   ]27c3-4244-en-critical_overview_of_10_years_pet.mp3.md505-Jan-2011 01:12 85  
[   ]27c3-4244-en-critical_overview_of_10_years_pet.mp3.sha105-Jan-2011 01:12 93  
[   ]27c3-4244-en-critical_overview_of_10_years_pet.mp3.torrent04-Mar-2011 17:32 1.7K 
[SND]27c3-4245-en-adventures_in_analyzing_stuxnet.mp308-Jan-2011 11:47 27M 
[   ]27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.md508-Jan-2011 23:10 83  
[   ]27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.sha108-Jan-2011 23:10 91  
[   ]27c3-4245-en-adventures_in_analyzing_stuxnet.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp302-Jan-2011 20:28 27M 
[   ]27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.md502-Jan-2011 20:39 95  
[   ]27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.sha102-Jan-2011 20:39 103  
[   ]27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4253-en-pentanews_game_show.mp302-Jan-2011 19:34 30M 
[   ]27c3-4253-en-pentanews_game_show.mp3.md502-Jan-2011 20:39 71  
[   ]27c3-4253-en-pentanews_game_show.mp3.sha102-Jan-2011 20:39 79  
[   ]27c3-4253-en-pentanews_game_show.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4261-en-key_recovery_attacks_rc4.mp308-Jan-2011 11:40 19M 
[   ]27c3-4261-en-key_recovery_attacks_rc4.mp3.md508-Jan-2011 23:10 76  
[   ]27c3-4261-en-key_recovery_attacks_rc4.mp3.sha108-Jan-2011 23:10 84  
[   ]27c3-4261-en-key_recovery_attacks_rc4.mp3.torrent04-Mar-2011 17:32 1.5K 
[SND]27c3-4263-en-resisting_excessive_government_surveillance.mp302-Jan-2011 22:04 26M 
[   ]27c3-4263-en-resisting_excessive_government_surveillance.mp3.md503-Jan-2011 01:11 95  
[   ]27c3-4263-en-resisting_excessive_government_surveillance.mp3.sha103-Jan-2011 01:11 103  
[   ]27c3-4263-en-resisting_excessive_government_surveillance.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4265-en-hacking_smart_phones.mp302-Jan-2011 20:11 34M 
[   ]27c3-4265-en-hacking_smart_phones.mp3.md502-Jan-2011 20:39 72  
[   ]27c3-4265-en-hacking_smart_phones.mp3.sha102-Jan-2011 20:39 80  
[   ]27c3-4265-en-hacking_smart_phones.mp3.torrent04-Mar-2011 17:32 2.1K 
[SND]27c3-4276-en-cognitive_psychology_for_hackers.mp308-Jan-2011 12:00 30M 
[   ]27c3-4276-en-cognitive_psychology_for_hackers.mp3.md508-Jan-2011 23:10 84  
[   ]27c3-4276-en-cognitive_psychology_for_hackers.mp3.sha108-Jan-2011 23:10 92  
[   ]27c3-4276-en-cognitive_psychology_for_hackers.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4295-en-high_speed_high_security_cryptography.mp304-Jan-2011 13:44 28M 
[   ]27c3-4295-en-high_speed_high_security_cryptography.mp3.md505-Jan-2011 01:12 89  
[   ]27c3-4295-en-high_speed_high_security_cryptography.mp3.sha105-Jan-2011 01:12 97  
[   ]27c3-4295-en-high_speed_high_security_cryptography.mp3.torrent04-Mar-2011 17:32 1.9K 
[SND]27c3-4296-en-lightning_days_d2.mp308-Jan-2011 11:50 23M 
[   ]27c3-4296-en-lightning_days_d2.mp3.md508-Jan-2011 23:10 69  
[   ]27c3-4296-en-lightning_days_d2.mp3.sha108-Jan-2011 23:10 77  
[   ]27c3-4296-en-lightning_days_d2.mp3.torrent04-Mar-2011 17:32 1.6K 
[SND]27c3-4297-de-die_gesamte_technik_ist_sicher.mp304-Jan-2011 17:12 27M 
[   ]27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.md505-Jan-2011 01:12 82  
[   ]27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.sha105-Jan-2011 01:12 90  
[   ]27c3-4297-de-die_gesamte_technik_ist_sicher.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4298-de-ccc_jahresrueckblick_2010.mp304-Jan-2011 16:37 46M 
[   ]27c3-4298-de-ccc_jahresrueckblick_2010.mp3.md505-Jan-2011 01:12 77  
[   ]27c3-4298-de-ccc_jahresrueckblick_2010.mp3.sha105-Jan-2011 01:12 85  
[   ]27c3-4298-de-ccc_jahresrueckblick_2010.mp3.torrent04-Mar-2011 17:32 2.5K 
[SND]27c3-4299-en-closing_event.mp304-Jan-2011 13:22 13M 
[   ]27c3-4299-en-closing_event.mp3.md505-Jan-2011 01:12 65  
[   ]27c3-4299-en-closing_event.mp3.sha105-Jan-2011 01:12 73  
[   ]27c3-4299-en-closing_event.mp3.torrent04-Mar-2011 17:32 1.2K 
[SND]27c3-4300-en-lightning_talks_d4.mp308-Jan-2011 11:39 55M 
[   ]27c3-4300-en-lightning_talks_d4.mp3.md508-Jan-2011 23:10 70  
[   ]27c3-4300-en-lightning_talks_d4.mp3.sha108-Jan-2011 23:10 78  
[   ]27c3-4300-en-lightning_talks_d4.mp3.torrent04-Mar-2011 17:32 2.9K 
[SND]27c3-4301-en-flow_analysis_of_internet_activities.mp305-Jan-2011 19:56 27M 
[   ]27c3-4301-en-flow_analysis_of_internet_activities.mp3.md505-Jan-2011 20:32 88  
[   ]27c3-4301-en-flow_analysis_of_internet_activities.mp3.sha105-Jan-2011 20:32 96  
[   ]27c3-4301-en-flow_analysis_of_internet_activities.mp3.torrent04-Mar-2011 17:32 1.8K 
[SND]27c3-4302-en-27c3_keynote_we_come_in_peace.mp302-Jan-2011 19:33 18M 
[   ]27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.md502-Jan-2011 20:39 81  
[   ]27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.sha102-Jan-2011 20:39 89  
[   ]27c3-4302-en-27c3_keynote_we_come_in_peace.mp3.torrent04-Mar-2011 17:32 1.4K 
[SND]27c3-4326-de-radio_der_zukunft.mp303-Jan-2011 00:57 36M 
[   ]27c3-4326-de-radio_der_zukunft.mp3.md503-Jan-2011 01:11 69  
[   ]27c3-4326-de-radio_der_zukunft.mp3.sha103-Jan-2011 01:11 77  
[   ]27c3-4326-de-radio_der_zukunft.mp3.torrent04-Mar-2011 17:32 2.1K 
[SND]27c3-4333-en-hacker_jeopardy_translation.mp304-Jan-2011 16:40 61M 
[   ]27c3-4333-en-hacker_jeopardy_translation.mp3.md505-Jan-2011 01:12 79  
[   ]27c3-4333-en-hacker_jeopardy_translation.mp3.sha105-Jan-2011 01:12 87  
[   ]27c3-4333-en-hacker_jeopardy_translation.mp3.torrent04-Mar-2011 17:32 3.1K 
[SND]27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp310-Jan-2011 13:56 38M 
[   ]27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.md510-Jan-2011 17:00 91  
[   ]27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.sha110-Jan-2011 17:00 99  
[   ]27c3-4334-en-fnord_jahresrueckblick_2010_translation.mp3.torrent04-Mar-2011 17:32 2.2K 
[SND]27c3-4338-de-wikileaks_und_mehr.mp304-Jan-2011 13:53 19M 
[   ]27c3-4338-de-wikileaks_und_mehr.mp3.md505-Jan-2011 01:12 70  
[   ]27c3-4338-de-wikileaks_und_mehr.mp3.sha105-Jan-2011 01:12 78  
[   ]27c3-4338-de-wikileaks_und_mehr.mp3.torrent04-Mar-2011 17:32 1.5K 
[SND]27c3-4339-en-openleaks.mp308-Jan-2011 11:44 28M 
[   ]27c3-4339-en-openleaks.mp3.md508-Jan-2011 23:10 61  
[   ]27c3-4339-en-openleaks.mp3.sha108-Jan-2011 23:10 69  
[   ]27c3-4339-en-openleaks.mp3.torrent04-Mar-2011 17:32 1.8K 
[   ]27c3.mp3.all.md518-Jan-2011 07:41 7.6K 
[   ]27c3.mp3.all.sha118-Jan-2011 07:45 8.3K 
[   ]27c3.mp3.all.torrent04-Mar-2011 17:57 205K 

Apache/2.2.22 (Debian) Server at mirror.fem-net.de Port 80