| Name |
Last
Modified |
Size |
| ../ |
27-Dec-2008 22:37 |
70 |
| 25c3-2665-en-the_trust_situation.mp3 |
29-Dec-2008 12:25 |
27.7M |
| 25c3-2665-en-the_trust_situation.mp3.md5 |
29-Dec-2008 12:25 |
71 |
| 25c3-2665-en-the_trust_situation.ogg |
29-Dec-2008 15:36 |
24.7M |
| 25c3-2665-en-the_trust_situation.ogg.md5 |
29-Dec-2008 15:36 |
71 |
| 25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3 |
29-Dec-2008 02:11 |
27.4M |
| 25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp3.md5 |
29-Dec-2008 02:11 |
119 |
| 25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg |
29-Dec-2008 13:53 |
24.4M |
| 25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.ogg.md5 |
29-Dec-2008 13:53 |
119 |
| 25c3-2681-en-repurposing_the_ti_ez430u.mp3 |
29-Dec-2008 23:06 |
15.2M |
| 25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5 |
29-Dec-2008 23:06 |
77 |
| 25c3-2681-en-repurposing_the_ti_ez430u.ogg |
30-Dec-2008 01:51 |
13.6M |
| 25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5 |
30-Dec-2008 01:51 |
77 |
| 25c3-2773-en-soviet_unterzoegersdorf.mp3 |
29-Dec-2008 23:20 |
35.8M |
| 25c3-2773-en-soviet_unterzoegersdorf.mp3.md5 |
29-Dec-2008 23:20 |
75 |
| 25c3-2773-en-soviet_unterzoegersdorf.ogg |
30-Dec-2008 01:47 |
31.9M |
| 25c3-2773-en-soviet_unterzoegersdorf.ogg.md5 |
30-Dec-2008 01:47 |
75 |
| 25c3-2799-en-console_hacking_2008_wii_fail.mp3 |
29-Dec-2008 15:38 |
25.8M |
| 25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5 |
29-Dec-2008 15:38 |
81 |
| 25c3-2799-en-console_hacking_2008_wii_fail.ogg |
29-Dec-2008 13:53 |
23.0M |
| 25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5 |
29-Dec-2008 13:53 |
81 |
| 25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3 |
29-Dec-2008 13:16 |
29.9M |
| 25c3-2806-en-building_an_international_movement_hackerspacesorg.mp3.md5 |
29-Dec-2008 13:16 |
102 |
| 25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg |
29-Dec-2008 13:16 |
26.7M |
| 25c3-2806-en-building_an_international_movement_hackerspacesorg.ogg.md5 |
29-Dec-2008 13:16 |
102 |
| 25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3 |
29-Dec-2008 22:08 |
23.9M |
| 25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp3.md5 |
29-Dec-2008 22:08 |
98 |
| 25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg |
29-Dec-2008 22:08 |
21.3M |
| 25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.ogg.md5 |
29-Dec-2008 22:08 |
98 |
| 25c3-2812-de-fnord_news_show.mp3 |
29-Dec-2008 22:08 |
22.9M |
| 25c3-2812-de-fnord_news_show.mp3.md5 |
29-Dec-2008 22:08 |
67 |
| 25c3-2812-de-fnord_news_show.ogg |
29-Dec-2008 22:08 |
20.4M |
| 25c3-2812-de-fnord_news_show.ogg.md5 |
29-Dec-2008 22:08 |
67 |
| 25c3-2814-de-datenpannen.mp3 |
29-Dec-2008 15:12 |
24.1M |
| 25c3-2814-de-datenpannen.mp3.md5 |
29-Dec-2008 15:12 |
63 |
| 25c3-2814-de-datenpannen.ogg |
29-Dec-2008 15:16 |
21.5M |
| 25c3-2814-de-datenpannen.ogg.md5 |
29-Dec-2008 15:16 |
63 |
| 25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3 |
29-Dec-2008 15:10 |
22.5M |
| 25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3.md5 |
29-Dec-2008 15:10 |
83 |
| 25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg |
29-Dec-2008 15:21 |
20.0M |
| 25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg.md5 |
29-Dec-2008 15:21 |
83 |
| 25c3-2827-de-u23.mp3 |
29-Dec-2008 23:19 |
22.7M |
| 25c3-2827-de-u23.mp3.md5 |
29-Dec-2008 23:19 |
55 |
| 25c3-2827-de-u23.ogg |
30-Dec-2008 01:46 |
20.3M |
| 25c3-2827-de-u23.ogg.md5 |
30-Dec-2008 01:46 |
55 |
| 25c3-2832-en-exploiting_symbian.mp3 |
29-Dec-2008 14:22 |
28.7M |
| 25c3-2832-en-exploiting_symbian.mp3.md5 |
29-Dec-2008 14:22 |
70 |
| 25c3-2832-en-exploiting_symbian.ogg |
29-Dec-2008 14:22 |
25.6M |
| 25c3-2832-en-exploiting_symbian.ogg.md5 |
29-Dec-2008 14:22 |
70 |
| 25c3-2839-en-cracking_the_msp430_bsl.mp3 |
29-Dec-2008 15:08 |
17.0M |
| 25c3-2839-en-cracking_the_msp430_bsl.mp3.md5 |
29-Dec-2008 15:08 |
75 |
| 25c3-2839-en-cracking_the_msp430_bsl.ogg |
29-Dec-2008 13:24 |
15.2M |
| 25c3-2839-en-cracking_the_msp430_bsl.ogg.md5 |
29-Dec-2008 13:24 |
75 |
| 25c3-2845-en-rf_fingerprinting_of_rfid.mp3 |
29-Dec-2008 14:34 |
20.3M |
| 25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5 |
29-Dec-2008 14:34 |
77 |
| 25c3-2845-en-rf_fingerprinting_of_rfid.ogg |
29-Dec-2008 13:21 |
18.1M |
| 25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5 |
29-Dec-2008 13:21 |
77 |
| 25c3-2860-de-neusprech_im_berwachungsstaat.mp3 |
30-Dec-2008 01:47 |
32.0M |
| 25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5 |
30-Dec-2008 01:47 |
81 |
| 25c3-2860-de-neusprech_im_berwachungsstaat.ogg |
30-Dec-2008 01:48 |
28.5M |
| 25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5 |
30-Dec-2008 01:48 |
81 |
| 25c3-2872-en-the_privacy_workshop_project.mp3 |
29-Dec-2008 23:20 |
22.0M |
| 25c3-2872-en-the_privacy_workshop_project.mp3.md5 |
29-Dec-2008 23:20 |
80 |
| 25c3-2872-en-the_privacy_workshop_project.ogg |
30-Dec-2008 01:50 |
19.6M |
| 25c3-2872-en-the_privacy_workshop_project.ogg.md5 |
30-Dec-2008 01:50 |
80 |
| 25c3-2873-en-privacy_in_the_social_semantic_web.mp3 |
29-Dec-2008 23:02 |
20.9M |
| 25c3-2873-en-privacy_in_the_social_semantic_web.mp3.md5 |
29-Dec-2008 23:02 |
86 |
| 25c3-2873-en-privacy_in_the_social_semantic_web.ogg |
30-Dec-2008 01:45 |
18.6M |
| 25c3-2873-en-privacy_in_the_social_semantic_web.ogg.md5 |
30-Dec-2008 01:45 |
86 |
| 25c3-2882-en-full-disk-encryption_crash-course.mp3 |
29-Dec-2008 13:54 |
21.9M |
| 25c3-2882-en-full-disk-encryption_crash-course.mp3.md5 |
29-Dec-2008 13:54 |
85 |
| 25c3-2882-en-full-disk-encryption_crash-course.ogg |
29-Dec-2008 14:01 |
19.5M |
| 25c3-2882-en-full-disk-encryption_crash-course.ogg.md5 |
29-Dec-2008 14:01 |
85 |
| 25c3-2890-en-scalable_swarm_robotics.mp3 |
29-Dec-2008 14:28 |
17.8M |
| 25c3-2890-en-scalable_swarm_robotics.mp3.md5 |
29-Dec-2008 14:28 |
75 |
| 25c3-2890-en-scalable_swarm_robotics.ogg |
29-Dec-2008 13:19 |
15.9M |
| 25c3-2890-en-scalable_swarm_robotics.ogg.md5 |
29-Dec-2008 13:19 |
75 |
| 25c3-2892-en-about_cyborgs_and_gargoyles_.mp3 |
29-Dec-2008 14:11 |
20.5M |
| 25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5 |
29-Dec-2008 14:11 |
80 |
| 25c3-2892-en-about_cyborgs_and_gargoyles_.ogg |
29-Dec-2008 14:11 |
18.5M |
| 25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5 |
29-Dec-2008 14:11 |
80 |
| 25c3-2896-en-chip_reverse_engineering.mp3 |
29-Dec-2008 12:17 |
20.4M |
| 25c3-2896-en-chip_reverse_engineering.mp3.md5 |
29-Dec-2008 12:17 |
76 |
| 25c3-2896-en-chip_reverse_engineering.ogg |
29-Dec-2008 13:07 |
18.2M |
| 25c3-2896-en-chip_reverse_engineering.ogg.md5 |
29-Dec-2008 13:07 |
76 |
| 25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3 |
29-Dec-2008 12:55 |
22.8M |
| 25c3-2901-en-faifa_a_first_open_source_plc_tool.mp3.md5 |
29-Dec-2008 12:55 |
86 |
| 25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg |
29-Dec-2008 15:29 |
20.3M |
| 25c3-2901-en-faifa_a_first_open_source_plc_tool.ogg.md5 |
29-Dec-2008 15:29 |
86 |
| 25c3-2904-en-solar-powering_your_geek_gear.mp3 |
29-Dec-2008 12:05 |
13.1M |
| 25c3-2904-en-solar-powering_your_geek_gear.mp3.md5 |
29-Dec-2008 12:05 |
81 |
| 25c3-2904-en-solar-powering_your_geek_gear.ogg |
29-Dec-2008 18:27 |
11.9M |
| 25c3-2904-en-solar-powering_your_geek_gear.ogg.md5 |
29-Dec-2008 18:27 |
81 |
| 25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3 |
29-Dec-2008 15:11 |
13.8M |
| 25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp3.md5 |
29-Dec-2008 15:11 |
89 |
| 25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg |
29-Dec-2008 13:12 |
12.3M |
| 25c3-2909-en-tcp_denial_of_service_vulnerabilities.ogg.md5 |
29-Dec-2008 13:12 |
89 |
| 25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3 |
29-Dec-2008 15:13 |
26.7M |
| 25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp3.md5 |
29-Dec-2008 15:13 |
99 |
| 25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg |
29-Dec-2008 15:22 |
23.8M |
| 25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.ogg.md5 |
29-Dec-2008 15:22 |
99 |
| 25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg |
29-Dec-2008 13:16 |
29.2M |
| 25c3-2923-de-das_grundrecht_auf_digitale_intimsphre.ogg.md5 |
29-Dec-2008 13:16 |
90 |
| 25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3 |
29-Dec-2008 15:08 |
28.1M |
| 25c3-2953-en-security_failures_in_smart_card_payment_systems.mp3.md5 |
29-Dec-2008 15:08 |
99 |
| 25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg |
29-Dec-2008 15:06 |
25.1M |
| 25c3-2953-en-security_failures_in_smart_card_payment_systems.ogg.md5 |
29-Dec-2008 15:06 |
99 |
| 25c3-2963-de-handschellen_hacken.mp3 |
29-Dec-2008 18:26 |
27.7M |
| 25c3-2963-de-handschellen_hacken.mp3.md5 |
29-Dec-2008 18:26 |
71 |
| 25c3-2963-de-handschellen_hacken.ogg |
29-Dec-2008 12:59 |
24.7M |
| 25c3-2963-de-handschellen_hacken.ogg.md5 |
29-Dec-2008 12:59 |
71 |
| 25c3-2970-en-coreboot_beyond_the_final_frontier.mp3 |
29-Dec-2008 00:52 |
23.1M |
| 25c3-2970-en-coreboot_beyond_the_final_frontier.mp3.md5 |
29-Dec-2008 00:52 |
86 |
| 25c3-2970-en-coreboot_beyond_the_final_frontier.ogg |
29-Dec-2008 15:23 |
20.6M |
| 25c3-2970-en-coreboot_beyond_the_final_frontier.ogg.md5 |
29-Dec-2008 15:23 |
86 |
| 25c3-2976-en-hacking_the_iphone.mp3 |
29-Dec-2008 12:59 |
26.6M |
| 25c3-2976-en-hacking_the_iphone.mp3.md5 |
29-Dec-2008 12:59 |
70 |
| 25c3-2976-en-hacking_the_iphone.ogg |
29-Dec-2008 15:24 |
23.7M |
| 25c3-2976-en-hacking_the_iphone.ogg.md5 |
29-Dec-2008 15:24 |
70 |
| 25c3-2988-en-just_estonia_and_georgia.mp3 |
28-Dec-2008 17:24 |
16.0M |
| 25c3-2988-en-just_estonia_and_georgia.mp3.md5 |
28-Dec-2008 17:24 |
76 |
| 25c3-2988-en-just_estonia_and_georgia.ogg |
28-Dec-2008 18:13 |
23.8M |
| 25c3-2988-en-just_estonia_and_georgia.ogg.md5 |
28-Dec-2008 18:13 |
76 |
| 25c3-2997-en-locating_mobile_phones_using_ss7.mp3 |
29-Dec-2008 15:15 |
22.1M |
| 25c3-2997-en-locating_mobile_phones_using_ss7.mp3.md5 |
29-Dec-2008 15:15 |
84 |
| 25c3-2997-en-locating_mobile_phones_using_ss7.ogg |
29-Dec-2008 15:18 |
19.7M |
| 25c3-2997-en-locating_mobile_phones_using_ss7.ogg.md5 |
29-Dec-2008 15:18 |
84 |
| 25c3-3007-en-running_your_own_gsm_network.mp3 |
30-Dec-2008 17:16 |
20.4M |
| 25c3-3007-en-running_your_own_gsm_network.mp3.md5 |
30-Dec-2008 17:16 |
80 |
| 25c3-3007-en-running_your_own_gsm_network.ogg |
30-Dec-2008 17:16 |
18.2M |
| 25c3-3007-en-running_your_own_gsm_network.ogg.md5 |
30-Dec-2008 17:16 |
80 |
| 25c3-3015-en-rapid_prototype_your_life.mp3 |
29-Dec-2008 13:10 |
26.0M |
| 25c3-3015-en-rapid_prototype_your_life.mp3.md5 |
29-Dec-2008 13:10 |
77 |
| 25c3-3015-en-rapid_prototype_your_life.ogg |
29-Dec-2008 13:09 |
23.2M |
| 25c3-3015-en-rapid_prototype_your_life.ogg.md5 |
29-Dec-2008 13:09 |
77 |
| 25c3-3028-de-der_hackerparagraph_202c_stgb.mp3 |
29-Dec-2008 15:14 |
27.9M |
| 25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5 |
29-Dec-2008 15:14 |
81 |
| 25c3-3028-de-der_hackerparagraph_202c_stgb.ogg |
29-Dec-2008 15:19 |
24.9M |
| 25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5 |
29-Dec-2008 15:19 |
81 |
| 25c3-3030-en-messing_around_with_garage_doors.mp3 |
30-Dec-2008 01:46 |
32.8M |
| 25c3-3030-en-messing_around_with_garage_doors.mp3.md5 |
30-Dec-2008 01:46 |
84 |
| 25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3 |
29-Dec-2008 23:00 |
29.7M |
| 25c3-3041-en-evoting_after_nedap_and_digital_pen.mp3.md5 |
29-Dec-2008 23:00 |
87 |
| 25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg |
30-Dec-2008 01:45 |
26.5M |
| 25c3-3041-en-evoting_after_nedap_and_digital_pen.ogg.md5 |
30-Dec-2008 01:45 |
87 |
| 25c3-3044-en-all_your_bases_are_belong_to_us.mp3 |
29-Dec-2008 11:53 |
25.3M |
| 25c3-3044-en-all_your_bases_are_belong_to_us.mp3.md5 |
29-Dec-2008 11:53 |
83 |
| 25c3-3044-en-all_your_bases_are_belong_to_us.ogg |
29-Dec-2008 12:27 |
22.5M |
| 25c3-3044-en-all_your_bases_are_belong_to_us.ogg.md5 |
29-Dec-2008 12:27 |
83 |
| 25c3-3047-en-lightning_talks_day3_morning.mp3 |
29-Dec-2008 22:56 |
27.1M |
| 25c3-3047-en-lightning_talks_day3_morning.mp3.md5 |
29-Dec-2008 22:56 |
80 |
| 25c3-3047-en-lightning_talks_day3_morning.ogg |
29-Dec-2008 23:05 |
24.1M |
| 25c3-3047-en-lightning_talks_day3_morning.ogg.md5 |
29-Dec-2008 23:05 |
80 |
| 25c3-3048-en-lightning_talks_day2.mp3 |
29-Dec-2008 15:25 |
23.4M |
| 25c3-3048-en-lightning_talks_day2.mp3.md5 |
29-Dec-2008 15:25 |
72 |
| 25c3-3048-en-lightning_talks_day2.ogg |
29-Dec-2008 15:35 |
20.8M |
| 25c3-3048-en-lightning_talks_day2.ogg.md5 |