http://dewy.fem.tu-ilmenau.de/CCC/25C3/audio_only/

Index of /CCC/25C3/audio_only/

Name Last Modified Size
../ 27-Dec-2008 22:37 70
25c3-2665-en-the_trust_situation.mp3 29-Dec-2008 12:25 27.7M
25c3-2665-en-the_trust_situation.mp3.md5 29-Dec-2008 12:25 71
25c3-2665-en-the_trust_situation.ogg 29-Dec-2008 15:36 24.7M
25c3-2665-en-the_trust_situation.ogg.md5 29-Dec-2008 15:36 71
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3 29-Dec-2008 02:11 27.4M
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3.md5 29-Dec-2008 02:11 119
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg 29-Dec-2008 13:53 24.4M
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg.md5 29-Dec-2008 13:53 119
25c3-2681-en-repurposing_the_ti_ez430u.mp3 29-Dec-2008 23:06 15.2M
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5 29-Dec-2008 23:06 77
25c3-2681-en-repurposing_the_ti_ez430u.ogg 30-Dec-2008 01:51 13.6M
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5 30-Dec-2008 01:51 77
25c3-2773-en-soviet_unterzoegersdorf.mp3 29-Dec-2008 23:20 35.8M
25c3-2773-en-soviet_unterzoegersdorf.mp3.md5 29-Dec-2008 23:20 75
25c3-2773-en-soviet_unterzoegersdorf.ogg 30-Dec-2008 01:47 31.9M
25c3-2773-en-soviet_unterzoegersdorf.ogg.md5 30-Dec-2008 01:47 75
25c3-2799-en-console_hacking_2008_wii_fail.mp3 29-Dec-2008 15:38 25.8M
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5 29-Dec-2008 15:38 81
25c3-2799-en-console_hacking_2008_wii_fail.ogg 29-Dec-2008 13:53 23.0M
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5 29-Dec-2008 13:53 81
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3 29-Dec-2008 13:16 29.9M
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3.md5 29-Dec-2008 13:16 102
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg 29-Dec-2008 13:16 26.7M
25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg.md5 29-Dec-2008 13:16 102
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3 29-Dec-2008 22:08 23.9M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3.md5 29-Dec-2008 22:08 98
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg 29-Dec-2008 22:08 21.3M
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg.md5 29-Dec-2008 22:08 98
25c3-2812-de-fnord_news_show.mp3 29-Dec-2008 22:08 22.9M
25c3-2812-de-fnord_news_show.mp3.md5 29-Dec-2008 22:08 67
25c3-2812-de-fnord_news_show.ogg 29-Dec-2008 22:08 20.4M
25c3-2812-de-fnord_news_show.ogg.md5 29-Dec-2008 22:08 67
25c3-2814-de-datenpannen.mp3 29-Dec-2008 15:12 24.1M
25c3-2814-de-datenpannen.mp3.md5 29-Dec-2008 15:12 63
25c3-2814-de-datenpannen.ogg 29-Dec-2008 15:16 21.5M
25c3-2814-de-datenpannen.ogg.md5 29-Dec-2008 15:16 63
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3 29-Dec-2008 15:10 22.5M
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3.md5 29-Dec-2008 15:10 83
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg 29-Dec-2008 15:21 20.0M
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg.md5 29-Dec-2008 15:21 83
25c3-2827-de-u23.mp3 29-Dec-2008 23:19 22.7M
25c3-2827-de-u23.mp3.md5 29-Dec-2008 23:19 55
25c3-2827-de-u23.ogg 30-Dec-2008 01:46 20.3M
25c3-2827-de-u23.ogg.md5 30-Dec-2008 01:46 55
25c3-2832-en-exploiting_symbian.mp3 29-Dec-2008 14:22 28.7M
25c3-2832-en-exploiting_symbian.mp3.md5 29-Dec-2008 14:22 70
25c3-2832-en-exploiting_symbian.ogg 29-Dec-2008 14:22 25.6M
25c3-2832-en-exploiting_symbian.ogg.md5 29-Dec-2008 14:22 70
25c3-2839-en-cracking_the_msp430_bsl.mp3 29-Dec-2008 15:08 17.0M
25c3-2839-en-cracking_the_msp430_bsl.mp3.md5 29-Dec-2008 15:08 75
25c3-2839-en-cracking_the_msp430_bsl.ogg 29-Dec-2008 13:24 15.2M
25c3-2839-en-cracking_the_msp430_bsl.ogg.md5 29-Dec-2008 13:24 75
25c3-2845-en-rf_fingerprinting_of_rfid.mp3 29-Dec-2008 14:34 20.3M
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5 29-Dec-2008 14:34 77
25c3-2845-en-rf_fingerprinting_of_rfid.ogg 29-Dec-2008 13:21 18.1M
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5 29-Dec-2008 13:21 77
25c3-2860-de-neusprech_im_berwachungsstaat.mp3 30-Dec-2008 01:47 32.0M
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5 30-Dec-2008 01:47 81
25c3-2860-de-neusprech_im_berwachungsstaat.ogg 30-Dec-2008 01:48 28.5M
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5 30-Dec-2008 01:48 81
25c3-2872-en-the_privacy_workshop_project.mp3 29-Dec-2008 23:20 22.0M
25c3-2872-en-the_privacy_workshop_project.mp3.md5 29-Dec-2008 23:20 80
25c3-2872-en-the_privacy_workshop_project.ogg 30-Dec-2008 01:50 19.6M
25c3-2872-en-the_privacy_workshop_project.ogg.md5 30-Dec-2008 01:50 80
25c3-2873-en-privacy_in_the_social_semantic_web.mp3 29-Dec-2008 23:02 20.9M
25c3-2873-en-privacy_in_the_social_semantic_web.mp3.md5 29-Dec-2008 23:02 86
25c3-2873-en-privacy_in_the_social_semantic_web.ogg 30-Dec-2008 01:45 18.6M
25c3-2873-en-privacy_in_the_social_semantic_web.ogg.md5 30-Dec-2008 01:45 86
25c3-2882-en-full-disk-encryption_crash-course.mp3 29-Dec-2008 13:54 21.9M
25c3-2882-en-full-disk-encryption_crash-course.mp3.md5 29-Dec-2008 13:54 85
25c3-2882-en-full-disk-encryption_crash-course.ogg 29-Dec-2008 14:01 19.5M
25c3-2882-en-full-disk-encryption_crash-course.ogg.md5 29-Dec-2008 14:01 85
25c3-2890-en-scalable_swarm_robotics.mp3 29-Dec-2008 14:28 17.8M
25c3-2890-en-scalable_swarm_robotics.mp3.md5 29-Dec-2008 14:28 75
25c3-2890-en-scalable_swarm_robotics.ogg 29-Dec-2008 13:19 15.9M
25c3-2890-en-scalable_swarm_robotics.ogg.md5 29-Dec-2008 13:19 75
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3 29-Dec-2008 14:11 20.5M
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5 29-Dec-2008 14:11 80
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg 29-Dec-2008 14:11 18.5M
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5 29-Dec-2008 14:11 80
25c3-2896-en-chip_reverse_engineering.mp3 29-Dec-2008 12:17 20.4M
25c3-2896-en-chip_reverse_engineering.mp3.md5 29-Dec-2008 12:17 76
25c3-2896-en-chip_reverse_engineering.ogg 29-Dec-2008 13:07 18.2M
25c3-2896-en-chip_reverse_engineering.ogg.md5 29-Dec-2008 13:07 76
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3 29-Dec-2008 12:55 22.8M
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3.md5 29-Dec-2008 12:55 86
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg 29-Dec-2008 15:29 20.3M
25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg.md5 29-Dec-2008 15:29 86
25c3-2904-en-solar-powering_your_geek_gear.mp3 29-Dec-2008 12:05 13.1M
25c3-2904-en-solar-powering_your_geek_gear.mp3.md5 29-Dec-2008 12:05 81
25c3-2904-en-solar-powering_your_geek_gear.ogg 29-Dec-2008 18:27 11.9M
25c3-2904-en-solar-powering_your_geek_gear.ogg.md5 29-Dec-2008 18:27 81
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3 29-Dec-2008 15:11 13.8M
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3.md5 29-Dec-2008 15:11 89
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg 29-Dec-2008 13:12 12.3M
25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg.md5 29-Dec-2008 13:12 89
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3 29-Dec-2008 15:13 26.7M
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3.md5 29-Dec-2008 15:13 99
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg 29-Dec-2008 15:22 23.8M
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg.md5 29-Dec-2008 15:22 99
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg 29-Dec-2008 13:16 29.2M
25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg.md5 29-Dec-2008 13:16 90
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3 29-Dec-2008 15:08 28.1M
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3.md5 29-Dec-2008 15:08 99
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg 29-Dec-2008 15:06 25.1M
25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg.md5 29-Dec-2008 15:06 99
25c3-2963-de-handschellen_hacken.mp3 29-Dec-2008 18:26 27.7M
25c3-2963-de-handschellen_hacken.mp3.md5 29-Dec-2008 18:26 71
25c3-2963-de-handschellen_hacken.ogg 29-Dec-2008 12:59 24.7M
25c3-2963-de-handschellen_hacken.ogg.md5 29-Dec-2008 12:59 71
25c3-2970-en-coreboot_beyond_the_final_frontier.mp3 29-Dec-2008 00:52 23.1M
25c3-2970-en-coreboot_beyond_the_final_frontier.mp3.md5 29-Dec-2008 00:52 86
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg 29-Dec-2008 15:23 20.6M
25c3-2970-en-coreboot_beyond_the_final_frontier.ogg.md5 29-Dec-2008 15:23 86
25c3-2976-en-hacking_the_iphone.mp3 29-Dec-2008 12:59 26.6M
25c3-2976-en-hacking_the_iphone.mp3.md5 29-Dec-2008 12:59 70
25c3-2976-en-hacking_the_iphone.ogg 29-Dec-2008 15:24 23.7M
25c3-2976-en-hacking_the_iphone.ogg.md5 29-Dec-2008 15:24 70
25c3-2988-en-just_estonia_and_georgia.mp3 28-Dec-2008 17:24 16.0M
25c3-2988-en-just_estonia_and_georgia.mp3.md5 28-Dec-2008 17:24 76
25c3-2988-en-just_estonia_and_georgia.ogg 28-Dec-2008 18:13 23.8M
25c3-2988-en-just_estonia_and_georgia.ogg.md5 28-Dec-2008 18:13 76
25c3-2997-en-locating_mobile_phones_using_ss7.mp3 29-Dec-2008 15:15 22.1M
25c3-2997-en-locating_mobile_phones_using_ss7.mp3.md5 29-Dec-2008 15:15 84
25c3-2997-en-locating_mobile_phones_using_ss7.ogg 29-Dec-2008 15:18 19.7M
25c3-2997-en-locating_mobile_phones_using_ss7.ogg.md5 29-Dec-2008 15:18 84
25c3-3007-en-running_your_own_gsm_network.mp3 30-Dec-2008 17:16 20.4M
25c3-3007-en-running_your_own_gsm_network.mp3.md5 30-Dec-2008 17:16 80
25c3-3007-en-running_your_own_gsm_network.ogg 30-Dec-2008 17:16 18.2M
25c3-3007-en-running_your_own_gsm_network.ogg.md5 30-Dec-2008 17:16 80
25c3-3015-en-rapid_prototype_your_life.mp3 29-Dec-2008 13:10 26.0M
25c3-3015-en-rapid_prototype_your_life.mp3.md5 29-Dec-2008 13:10 77
25c3-3015-en-rapid_prototype_your_life.ogg 29-Dec-2008 13:09 23.2M
25c3-3015-en-rapid_prototype_your_life.ogg.md5 29-Dec-2008 13:09 77
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3 29-Dec-2008 15:14 27.9M
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5 29-Dec-2008 15:14 81
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg 29-Dec-2008 15:19 24.9M
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5 29-Dec-2008 15:19 81
25c3-3030-en-messing_around_with_garage_doors.mp3 30-Dec-2008 01:46 32.8M
25c3-3030-en-messing_around_with_garage_doors.mp3.md5 30-Dec-2008 01:46 84
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3 29-Dec-2008 23:00 29.7M
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3.md5 29-Dec-2008 23:00 87
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg 30-Dec-2008 01:45 26.5M
25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg.md5 30-Dec-2008 01:45 87
25c3-3044-en-all_your_bases_are_belong_to_us.mp3 29-Dec-2008 11:53 25.3M
25c3-3044-en-all_your_bases_are_belong_to_us.mp3.md5 29-Dec-2008 11:53 83
25c3-3044-en-all_your_bases_are_belong_to_us.ogg 29-Dec-2008 12:27 22.5M
25c3-3044-en-all_your_bases_are_belong_to_us.ogg.md5 29-Dec-2008 12:27 83
25c3-3047-en-lightning_talks_day3_morning.mp3 29-Dec-2008 22:56 27.1M
25c3-3047-en-lightning_talks_day3_morning.mp3.md5 29-Dec-2008 22:56 80
25c3-3047-en-lightning_talks_day3_morning.ogg 29-Dec-2008 23:05 24.1M
25c3-3047-en-lightning_talks_day3_morning.ogg.md5 29-Dec-2008 23:05 80
25c3-3048-en-lightning_talks_day2.mp3 29-Dec-2008 15:25 23.4M
25c3-3048-en-lightning_talks_day2.mp3.md5 29-Dec-2008 15:25 72
25c3-3048-en-lightning_talks_day2.ogg 29-Dec-2008 15:35 20.8M
25c3-3048-en-lightning_talks_day2.ogg.md5

Reply via email to