Index of /CCC/27C3/ogg-audio-only

Icon  Name                                                                         Last modified      Size  Description
[PARENTDIR] Parent Directory - [SND] 27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg 2010-12-30 12:36 28M [SND] 27c3-4046-en-all_colours_are_beautiful.ogg 2011-01-02 19:33 16M [SND] 27c3-4302-en-27c3_keynote_we_come_in_peace.ogg 2011-01-02 19:33 18M [SND] 27c3-4253-en-pentanews_game_show.ogg 2011-01-02 19:34 30M [SND] 27c3-4175-en-from_robot_to_robot.ogg 2011-01-02 19:38 22M [SND] 27c3-3957-en-ipv6_insecurities.ogg 2011-01-02 19:46 25M [SND] 27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg 2011-01-02 19:50 27M [SND] 27c3-4176-de-hacking_ibuttons.ogg 2011-01-02 19:54 25M [SND] 27c3-4142-en-nodejs_as_a_networking_tool.ogg 2011-01-02 20:03 15M [SND] 27c3-4265-en-hacking_smart_phones.ogg 2011-01-02 20:11 34M [SND] 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg 2011-01-02 20:15 30M [SND] 27c3-4070-de-fnord_jahresrueckblick.ogg 2011-01-02 20:19 39M [SND] 27c3-4190-en-data_retention_in_the_eu.ogg 2011-01-02 20:23 28M [SND] 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg 2011-01-02 20:28 28M [SND] 27c3-3957-en-ipv6_insecurities.ogg.md5 2011-01-02 20:32 69 [SND] 27c3-3957-en-ipv6_insecurities.ogg.sha1 2011-01-02 20:32 77 [SND] 27c3-4046-en-all_colours_are_beautiful.ogg.md5 2011-01-02 20:38 77 [SND] 27c3-4046-en-all_colours_are_beautiful.ogg.sha1 2011-01-02 20:38 85 [SND] 27c3-4070-de-fnord_jahresrueckblick.ogg.md5 2011-01-02 20:38 74 [SND] 27c3-4070-de-fnord_jahresrueckblick.ogg.sha1 2011-01-02 20:38 82 [SND] 27c3-4142-en-nodejs_as_a_networking_tool.ogg.md5 2011-01-02 20:38 79 [SND] 27c3-4142-en-nodejs_as_a_networking_tool.ogg.sha1 2011-01-02 20:38 87 [SND] 27c3-4175-en-from_robot_to_robot.ogg.md5 2011-01-02 20:38 71 [SND] 27c3-4175-en-from_robot_to_robot.ogg.sha1 2011-01-02 20:39 79 [SND] 27c3-4176-de-hacking_ibuttons.ogg.md5 2011-01-02 20:39 68 [SND] 27c3-4176-de-hacking_ibuttons.ogg.sha1 2011-01-02 20:39 76 [SND] 27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg.md5 2011-01-02 20:39 83 [SND] 27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg.sha1 2011-01-02 20:39 91 [SND] 27c3-4190-en-data_retention_in_the_eu.ogg.md5 2011-01-02 20:39 76 [SND] 27c3-4190-en-data_retention_in_the_eu.ogg.sha1 2011-01-02 20:39 84 [SND] 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg.md5 2011-01-02 20:39 102 [SND] 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg.sha1 2011-01-02 20:39 110 [SND] 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg.md5 2011-01-02 20:39 95 [SND] 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg.sha1 2011-01-02 20:39 103 [SND] 27c3-4253-en-pentanews_game_show.ogg.md5 2011-01-02 20:39 71 [SND] 27c3-4253-en-pentanews_game_show.ogg.sha1 2011-01-02 20:39 79 [SND] 27c3-4265-en-hacking_smart_phones.ogg.md5 2011-01-02 20:39 72 [SND] 27c3-4265-en-hacking_smart_phones.ogg.sha1 2011-01-02 20:39 80 [SND] 27c3-4302-en-27c3_keynote_we_come_in_peace.ogg.md5 2011-01-02 20:39 81 [SND] 27c3-4302-en-27c3_keynote_we_come_in_peace.ogg.sha1 2011-01-02 20:39 89 [SND] 27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg.md5 2011-01-02 21:25 89 [SND] 27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg.sha1 2011-01-02 21:25 97 [SND] 27c3-4263-en-resisting_excessive_government_surveillance.ogg 2011-01-02 22:04 26M [SND] 27c3-4234-en-usb_and_libusb.ogg 2011-01-02 22:15 26M [SND] 27c3-4326-de-radio_der_zukunft.ogg 2011-01-03 00:57 36M [SND] 27c3-4140-en-contemporary_profiling_of_web_users.ogg 2011-01-03 01:01 25M [SND] 27c3-4094-de-netzneutralitaet_und_qos.ogg 2011-01-03 01:01 37M [SND] 27c3-4094-de-netzneutralitaet_und_qos.ogg.md5 2011-01-03 01:11 76 [SND] 27c3-4094-de-netzneutralitaet_und_qos.ogg.sha1 2011-01-03 01:11 84 [SND] 27c3-4140-en-contemporary_profiling_of_web_users.ogg.md5 2011-01-03 01:11 87 [SND] 27c3-4140-en-contemporary_profiling_of_web_users.ogg.sha1 2011-01-03 01:11 95 [SND] 27c3-4234-en-usb_and_libusb.ogg.md5 2011-01-03 01:11 66 [SND] 27c3-4234-en-usb_and_libusb.ogg.sha1 2011-01-03 01:11 74 [SND] 27c3-4263-en-resisting_excessive_government_surveillance.ogg.md5 2011-01-03 01:11 95 [SND] 27c3-4263-en-resisting_excessive_government_surveillance.ogg.sha1 2011-01-03 01:11 103 [SND] 27c3-4326-de-radio_der_zukunft.ogg.md5 2011-01-03 01:11 69 [SND] 27c3-4326-de-radio_der_zukunft.ogg.sha1 2011-01-03 01:11 77 [SND] 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg 2011-01-03 23:53 29M [SND] 27c3-4073-de-logikschaltungen_ohne_elektronik.ogg 2011-01-03 23:59 16M [SND] 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg 2011-01-04 00:38 30M [SND] 27c3-4073-de-logikschaltungen_ohne_elektronik.ogg.md5 2011-01-04 01:24 84 [SND] 27c3-4073-de-logikschaltungen_ohne_elektronik.ogg.sha1 2011-01-04 01:24 92 [SND] 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg.md5 2011-01-04 01:24 98 [SND] 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg.sha1 2011-01-04 01:24 106 [SND] 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg.md5 2011-01-04 01:24 92 [SND] 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg.sha1 2011-01-04 01:24 100 [SND] 27c3-3983-en-hackers_and_computer_science.ogg 2011-01-04 11:07 16M [SND] 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg 2011-01-04 12:40 23M [SND] 27c3-4299-en-closing_event.ogg 2011-01-04 13:23 13M [SND] 27c3-4295-en-high_speed_high_security_cryptography.ogg 2011-01-04 13:44 29M [SND] 27c3-4338-de-wikileaks_und_mehr.ogg 2011-01-04 13:53 19M [SND] 27c3-4298-de-ccc_jahresrueckblick_2010.ogg 2011-01-04 16:37 46M [SND] 27c3-4333-en-hacker_jeopardy_translation.ogg 2011-01-04 16:40 62M [SND] 27c3-4297-de-die_gesamte_technik_ist_sicher.ogg 2011-01-04 17:12 28M [SND] 27c3-4085-de-digitale_spaltung_per_gesetz.ogg 2011-01-04 21:25 19M [SND] 27c3-4003-en-cybernetics_for_the_masses.ogg 2011-01-04 21:53 18M [SND] 27c3-4160-en-automatic_identification_cryptographic_primitives.ogg 2011-01-05 00:56 24M [SND] 27c3-4236-en-international_cyber_jurisdiction.ogg 2011-01-05 00:58 27M [SND] 27c3-4244-en-critical_overview_of_10_years_pet.ogg 2011-01-05 00:58 25M [SND] 27c3-4239-en-lightning_talks_d3.ogg 2011-01-05 00:58 34M [SND] 27c3-4231-en-datenrettung_fun_with_hard_drives.ogg 2011-01-05 00:58 28M [SND] 27c3-3983-en-hackers_and_computer_science.ogg.md5 2011-01-05 01:12 80 [SND] 27c3-3983-en-hackers_and_computer_science.ogg.sha1 2011-01-05 01:12 88 [SND] 27c3-4003-en-cybernetics_for_the_masses.ogg.md5 2011-01-05 01:12 78 [SND] 27c3-4003-en-cybernetics_for_the_masses.ogg.sha1 2011-01-05 01:12 86 [SND] 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg.md5 2011-01-05 01:12 93 [SND] 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg.sha1 2011-01-05 01:12 101 [SND] 27c3-4085-de-digitale_spaltung_per_gesetz.ogg.md5 2011-01-05 01:12 80 [SND] 27c3-4085-de-digitale_spaltung_per_gesetz.ogg.sha1 2011-01-05 01:12 88 [SND] 27c3-4160-en-automatic_identification_cryptographic_primitives.ogg.md5 2011-01-05 01:12 101 [SND] 27c3-4160-en-automatic_identification_cryptographic_primitives.ogg.sha1 2011-01-05 01:12 109 [SND] 27c3-4231-en-datenrettung_fun_with_hard_drives.ogg.md5 2011-01-05 01:12 85 [SND] 27c3-4231-en-datenrettung_fun_with_hard_drives.ogg.sha1 2011-01-05 01:12 93 [SND] 27c3-4236-en-international_cyber_jurisdiction.ogg.md5 2011-01-05 01:12 84 [SND] 27c3-4236-en-international_cyber_jurisdiction.ogg.sha1 2011-01-05 01:12 92 [SND] 27c3-4239-en-lightning_talks_d3.ogg.md5 2011-01-05 01:12 70 [SND] 27c3-4239-en-lightning_talks_d3.ogg.sha1 2011-01-05 01:12 78 [SND] 27c3-4244-en-critical_overview_of_10_years_pet.ogg.md5 2011-01-05 01:13 85 [SND] 27c3-4244-en-critical_overview_of_10_years_pet.ogg.sha1 2011-01-05 01:13 93 [SND] 27c3-4295-en-high_speed_high_security_cryptography.ogg.md5 2011-01-05 01:13 89 [SND] 27c3-4295-en-high_speed_high_security_cryptography.ogg.sha1 2011-01-05 01:13 97 [SND] 27c3-4297-de-die_gesamte_technik_ist_sicher.ogg.md5 2011-01-05 01:13 82 [SND] 27c3-4297-de-die_gesamte_technik_ist_sicher.ogg.sha1 2011-01-05 01:13 90 [SND] 27c3-4298-de-ccc_jahresrueckblick_2010.ogg.md5 2011-01-05 01:13 77 [SND] 27c3-4298-de-ccc_jahresrueckblick_2010.ogg.sha1 2011-01-05 01:13 85 [SND] 27c3-4299-en-closing_event.ogg.md5 2011-01-05 01:13 65 [SND] 27c3-4299-en-closing_event.ogg.sha1 2011-01-05 01:13 73 [SND] 27c3-4333-en-hacker_jeopardy_translation.ogg.md5 2011-01-05 01:13 79 [SND] 27c3-4333-en-hacker_jeopardy_translation.ogg.sha1 2011-01-05 01:13 87 [SND] 27c3-4338-de-wikileaks_und_mehr.ogg.md5 2011-01-05 01:13 70 [SND] 27c3-4338-de-wikileaks_und_mehr.ogg.sha1 2011-01-05 01:13 78 [SND] 27c3-4230-de-security_nightmares.ogg 2011-01-05 19:56 39M [SND] 27c3-4301-en-flow_analysis_of_internet_activities.ogg 2011-01-05 19:56 27M [SND] 27c3-4168-en-automated_architecture_independent_gadget_search.ogg 2011-01-05 19:56 17M [SND] 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg 2011-01-05 19:56 28M [SND] 27c3-4221-en-omg_wtf_pdf.ogg 2011-01-05 19:56 26M [SND] 27c3-4145-en-spoilers_human_interfaces_airplanes.ogg 2011-01-05 19:56 32M [SND] 27c3-4164-de-friede_sei_mit_euren_daten.ogg 2011-01-05 19:57 25M [SND] 27c3-4103-en-copyright_enforcement_versus_freedoms.ogg 2011-01-05 19:57 26M [SND] 27c3-4211-en-chip_and_pin_is_broken.ogg 2011-01-05 20:30 27M [SND] 27c3-4103-en-copyright_enforcement_versus_freedoms.ogg.md5 2011-01-05 20:32 89 [SND] 27c3-4103-en-copyright_enforcement_versus_freedoms.ogg.sha1 2011-01-05 20:32 97 [SND] 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg.md5 2011-01-05 20:32 95 [SND] 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg.sha1 2011-01-05 20:32 103 [SND] 27c3-4145-en-spoilers_human_interfaces_airplanes.ogg.md5 2011-01-05 20:32 87 [SND] 27c3-4145-en-spoilers_human_interfaces_airplanes.ogg.sha1 2011-01-05 20:32 95 [SND] 27c3-4164-de-friede_sei_mit_euren_daten.ogg.md5 2011-01-05 20:32 78 [SND] 27c3-4164-de-friede_sei_mit_euren_daten.ogg.sha1 2011-01-05 20:32 86 [SND] 27c3-4168-en-automated_architecture_independent_gadget_search.ogg.md5 2011-01-05 20:32 100 [SND] 27c3-4168-en-automated_architecture_independent_gadget_search.ogg.sha1 2011-01-05 20:32 108 [SND] 27c3-4211-en-chip_and_pin_is_broken.ogg.md5 2011-01-05 20:32 74 [SND] 27c3-4211-en-chip_and_pin_is_broken.ogg.sha1 2011-01-05 20:32 82 [SND] 27c3-4221-en-omg_wtf_pdf.ogg.md5 2011-01-05 20:32 63 [SND] 27c3-4221-en-omg_wtf_pdf.ogg.sha1 2011-01-05 20:32 71 [SND] 27c3-4230-de-security_nightmares.ogg.md5 2011-01-05 20:32 71 [SND] 27c3-4230-de-security_nightmares.ogg.sha1 2011-01-05 20:32 79 [SND] 27c3-4301-en-flow_analysis_of_internet_activities.ogg.md5 2011-01-05 20:32 88 [SND] 27c3-4301-en-flow_analysis_of_internet_activities.ogg.sha1 2011-01-05 20:33 96 [SND] 27c3-4193-en-having_fun_with_rtp.ogg 2011-01-08 11:26 17M [SND] 27c3-4300-en-lightning_talks_d4.ogg 2011-01-08 11:39 56M [SND] 27c3-4261-en-key_recovery_attacks_rc4.ogg 2011-01-08 11:40 19M [SND] 27c3-4339-en-openleaks.ogg 2011-01-08 11:44 29M [SND] 27c3-4245-en-adventures_in_analyzing_stuxnet.ogg 2011-01-08 11:47 27M [SND] 27c3-4296-en-lightning_days_d2.ogg 2011-01-08 11:50 23M [SND] 27c3-4276-en-cognitive_psychology_for_hackers.ogg 2011-01-08 12:00 30M [SND] 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg 2011-01-08 12:05 27M [SND] 27c3-4210-en-lying_to_the_neighbours.ogg 2011-01-08 15:14 16M [SND] 27c3-4237-en-indect_eu_surveillance_project.ogg 2011-01-08 20:24 31M [SND] 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg.md5 2011-01-08 23:09 95 [SND] 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg.sha1 2011-01-08 23:09 103 [SND] 27c3-4193-en-having_fun_with_rtp.ogg.md5 2011-01-08 23:09 71 [SND] 27c3-4193-en-having_fun_with_rtp.ogg.sha1 2011-01-08 23:09 79 [SND] 27c3-4210-en-lying_to_the_neighbours.ogg.md5 2011-01-08 23:10 75 [SND] 27c3-4210-en-lying_to_the_neighbours.ogg.sha1 2011-01-08 23:10 83 [SND] 27c3-4237-en-indect_eu_surveillance_project.ogg.md5 2011-01-08 23:10 82 [SND] 27c3-4237-en-indect_eu_surveillance_project.ogg.sha1 2011-01-08 23:10 90 [SND] 27c3-4245-en-adventures_in_analyzing_stuxnet.ogg.md5 2011-01-08 23:10 83 [SND] 27c3-4245-en-adventures_in_analyzing_stuxnet.ogg.sha1 2011-01-08 23:10 91 [SND] 27c3-4261-en-key_recovery_attacks_rc4.ogg.md5 2011-01-08 23:10 76 [SND] 27c3-4261-en-key_recovery_attacks_rc4.ogg.sha1 2011-01-08 23:10 84 [SND] 27c3-4276-en-cognitive_psychology_for_hackers.ogg.md5 2011-01-08 23:10 84 [SND] 27c3-4276-en-cognitive_psychology_for_hackers.ogg.sha1 2011-01-08 23:10 92 [SND] 27c3-4296-en-lightning_days_d2.ogg.md5 2011-01-08 23:10 69 [SND] 27c3-4296-en-lightning_days_d2.ogg.sha1 2011-01-08 23:10 77 [SND] 27c3-4300-en-lightning_talks_d4.ogg.md5 2011-01-08 23:10 70 [SND] 27c3-4300-en-lightning_talks_d4.ogg.sha1 2011-01-08 23:10 78 [SND] 27c3-4339-en-openleaks.ogg.md5 2011-01-08 23:10 61 [SND] 27c3-4339-en-openleaks.ogg.sha1 2011-01-08 23:10 69 [SND] 27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg 2011-01-10 13:56 39M [SND] 27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg.md5 2011-01-10 17:02 91 [SND] 27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg.sha1 2011-01-10 17:02 99 [SND] 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg 2011-01-10 22:13 26M [SND] 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg.md5 2011-01-10 22:16 103 [SND] 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg.sha1 2011-01-10 22:16 111 [SND] 27c3-4061-en-building_custom_disassemblers.ogg 2011-01-12 13:05 34M [SND] 27c3-4184-de-stanislaw_lem_weltverbesserer.ogg 2011-01-12 13:12 21M [SND] 27c3-4061-en-building_custom_disassemblers.ogg.md5 2011-01-12 13:28 81 [SND] 27c3-4061-en-building_custom_disassemblers.ogg.sha1 2011-01-12 13:28 89 [SND] 27c3-4184-de-stanislaw_lem_weltverbesserer.ogg.md5 2011-01-12 13:29 81 [SND] 27c3-4184-de-stanislaw_lem_weltverbesserer.ogg.sha1 2011-01-12 13:29 89 [SND] 27c3-4018-en-frozencache.ogg 2011-01-13 23:34 26M [SND] 27c3-4141-de-hacker_jeopardy.ogg 2011-01-13 23:37 62M [SND] 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg 2011-01-13 23:38 27M [SND] 27c3-4187-en-your_infrastructure_will_kill_you.ogg 2011-01-14 00:05 31M [SND] 27c3-4151-en-android_geolocation_using_gsm_network.ogg 2011-01-14 00:07 29M [SND] 27c3-4206-en-immi_from_concept_to_reality.ogg 2011-01-14 00:07 26M [SND] 27c3-4087-en-console_hacking_2010.ogg 2011-01-14 00:07 20M [SND] 27c3-4006-en-diy_synthesizers_and_sound_generators.ogg 2011-01-14 00:07 11M [SND] 27c3-4183-en-safety_on_open_sea.ogg 2011-01-14 00:07 28M [SND] 27c3-4181-en-sip_home_gateways_under_fire.ogg 2011-01-14 00:07 11M [SND] 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg 2011-01-14 00:07 14M [SND] 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg 2011-01-14 00:10 30M [SND] 27c3-4174-en-the_hidden_nemesis.ogg 2011-01-14 00:12 22M [SND] 27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg 2011-01-14 00:12 24M [SND] 27c3-4090-en-baseband_apocalypse.ogg 2011-01-14 00:12 30M [SND] 27c3-4123-en-defense_is_not_dead.ogg 2011-01-14 00:13 30M [SND] 27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg 2011-01-14 00:13 20M [SND] 27c3-4195-de-literarischer_abend.ogg 2011-01-14 00:13 26M [SND] 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg 2011-01-14 00:13 24M [SND] 27c3-4143-en-parttimescientists.ogg 2011-01-14 00:13 27M [SND] 27c3-4121-en-is_the_ssliverse_a_safe_place.ogg 2011-01-14 00:14 27M [SND] 27c3-4144-en-short_political_history_of_acoustics.ogg 2011-01-14 00:14 23M [SND] 27c3-4208-en-wideband_gsm_sniffing.ogg 2011-01-14 00:14 29M [SND] 27c3-4149-en-i_control_your_code.ogg 2011-01-14 00:14 29M [SND] 27c3-4159-en-reverse_engineering_mos_6502.ogg 2011-01-14 00:14 24M [SND] 27c3-4099-en-file_print_electronics.ogg 2011-01-14 00:14 24M [SND] 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg 2011-01-14 00:14 26M [SND] 27c3-4125-de-spinning_the_electronic_wheel.ogg 2011-01-14 00:15 29M [SND] 27c3-4082-en-sap_landscape.ogg 2011-01-14 00:15 36M [SND] 27c3-4017-en-desktop_on_the_linux.ogg 2011-01-14 00:15 26M [SND] 27c3-4060-en-attacking_mobile_phones.ogg 2011-01-14 00:15 29M [SND] 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg 2011-01-14 00:15 29M [SND] 27c3-4011-en-embedded_reverse_engineering.ogg 2011-01-14 00:15 26M [SND] 27c3-4096-en-code_deobfuscation_by_optimization.ogg 2011-01-14 00:16 23M [SND] 27c3-4006-en-diy_synthesizers_and_sound_generators.ogg.md5 2011-01-14 10:19 89 [SND] 27c3-4006-en-diy_synthesizers_and_sound_generators.ogg.sha1 2011-01-14 10:19 97 [SND] 27c3-4011-en-embedded_reverse_engineering.ogg.md5 2011-01-14 10:19 80 [SND] 27c3-4011-en-embedded_reverse_engineering.ogg.sha1 2011-01-14 10:19 88 [SND] 27c3-4017-en-desktop_on_the_linux.ogg.md5 2011-01-14 10:19 72 [SND] 27c3-4017-en-desktop_on_the_linux.ogg.sha1 2011-01-14 10:19 80 [SND] 27c3-4018-en-frozencache.ogg.md5 2011-01-14 10:19 63 [SND] 27c3-4018-en-frozencache.ogg.sha1 2011-01-14 10:19 71 [SND] 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg.md5 2011-01-14 10:19 103 [SND] 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg.sha1 2011-01-14 10:19 111 [SND] 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg.md5 2011-01-14 10:19 101 [SND] 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg.sha1 2011-01-14 10:19 109 [SND] 27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg.md5 2011-01-14 10:19 95 [SND] 27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg.sha1 2011-01-14 10:19 103 [SND] 27c3-4060-en-attacking_mobile_phones.ogg.md5 2011-01-14 10:19 75 [SND] 27c3-4060-en-attacking_mobile_phones.ogg.sha1 2011-01-14 10:19 83 [SND] 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg.md5 2011-01-14 10:19 89 [SND] 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg.sha1 2011-01-14 10:19 97 [SND] 27c3-4082-en-sap_landscape.ogg.md5 2011-01-14 10:19 65 [SND] 27c3-4082-en-sap_landscape.ogg.sha1 2011-01-14 10:19 73 [SND] 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg.md5 2011-01-14 10:19 96 [SND] 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg.sha1 2011-01-14 10:19 104 [SND] 27c3-4087-en-console_hacking_2010.ogg.md5 2011-01-14 10:19 72 [SND] 27c3-4087-en-console_hacking_2010.ogg.sha1 2011-01-14 10:19 80 [SND] 27c3-4090-en-baseband_apocalypse.ogg.md5 2011-01-14 10:19 71 [SND] 27c3-4090-en-baseband_apocalypse.ogg.sha1 2011-01-14 10:19 79 [SND] 27c3-4096-en-code_deobfuscation_by_optimization.ogg.md5 2011-01-14 10:19 86 [SND] 27c3-4096-en-code_deobfuscation_by_optimization.ogg.sha1 2011-01-14 10:19 94 [SND] 27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg.md5 2011-01-14 10:19 91 [SND] 27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg.sha1 2011-01-14 10:19 99 [SND] 27c3-4099-en-file_print_electronics.ogg.md5 2011-01-14 10:19 74 [SND] 27c3-4099-en-file_print_electronics.ogg.sha1 2011-01-14 10:19 82 [SND] 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg.md5 2011-01-14 10:19 82 [SND] 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg.sha1 2011-01-14 10:19 90 [SND] 27c3-4121-en-is_the_ssliverse_a_safe_place.ogg.md5 2011-01-14 10:19 81 [SND] 27c3-4121-en-is_the_ssliverse_a_safe_place.ogg.sha1 2011-01-14 10:19 89 [SND] 27c3-4123-en-defense_is_not_dead.ogg.md5 2011-01-14 10:19 71 [SND] 27c3-4123-en-defense_is_not_dead.ogg.sha1 2011-01-14 10:19 79 [SND] 27c3-4125-de-spinning_the_electronic_wheel.ogg.md5 2011-01-14 10:19 81 [SND] 27c3-4125-de-spinning_the_electronic_wheel.ogg.sha1 2011-01-14 10:19 89 [SND] 27c3-4141-de-hacker_jeopardy.ogg.md5 2011-01-14 10:19 67 [SND] 27c3-4141-de-hacker_jeopardy.ogg.sha1 2011-01-14 10:19 75 [SND] 27c3-4143-en-parttimescientists.ogg.md5 2011-01-14 10:19 70 [SND] 27c3-4143-en-parttimescientists.ogg.sha1 2011-01-14 10:19 78 [SND] 27c3-4144-en-short_political_history_of_acoustics.ogg.md5 2011-01-14 10:19 88 [SND] 27c3-4144-en-short_political_history_of_acoustics.ogg.sha1 2011-01-14 10:19 96 [SND] 27c3-4149-en-i_control_your_code.ogg.md5 2011-01-14 10:19 71 [SND] 27c3-4149-en-i_control_your_code.ogg.sha1 2011-01-14 10:19 79 [SND] 27c3-4151-en-android_geolocation_using_gsm_network.ogg.md5 2011-01-14 10:19 89 [SND] 27c3-4151-en-android_geolocation_using_gsm_network.ogg.sha1 2011-01-14 10:19 97 [SND] 27c3-4159-en-reverse_engineering_mos_6502.ogg.md5 2011-01-14 10:19 80 [SND] 27c3-4159-en-reverse_engineering_mos_6502.ogg.sha1 2011-01-14 10:19 88 [SND] 27c3-4174-en-the_hidden_nemesis.ogg.md5 2011-01-14 10:19 70 [SND] 27c3-4174-en-the_hidden_nemesis.ogg.sha1 2011-01-14 10:19 78 [SND] 27c3-4181-en-sip_home_gateways_under_fire.ogg.md5 2011-01-14 10:19 80 [SND] 27c3-4181-en-sip_home_gateways_under_fire.ogg.sha1 2011-01-14 10:19 88 [SND] 27c3-4183-en-safety_on_open_sea.ogg.md5 2011-01-14 10:19 70 [SND] 27c3-4183-en-safety_on_open_sea.ogg.sha1 2011-01-14 10:19 78 [SND] 27c3-4187-en-your_infrastructure_will_kill_you.ogg.md5 2011-01-14 10:19 85 [SND] 27c3-4187-en-your_infrastructure_will_kill_you.ogg.sha1 2011-01-14 10:19 93 [SND] 27c3-4195-de-literarischer_abend.ogg.md5 2011-01-14 10:19 71 [SND] 27c3-4195-de-literarischer_abend.ogg.sha1 2011-01-14 10:19 79 [SND] 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg.md5 2011-01-14 10:19 100 [SND] 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg.sha1 2011-01-14 10:19 108 [SND] 27c3-4206-en-immi_from_concept_to_reality.ogg.md5 2011-01-14 10:19 80 [SND] 27c3-4206-en-immi_from_concept_to_reality.ogg.sha1 2011-01-14 10:20 88 [SND] 27c3-4208-en-wideband_gsm_sniffing.ogg.md5 2011-01-14 10:20 73 [SND] 27c3-4208-en-wideband_gsm_sniffing.ogg.sha1 2011-01-14 10:20 81 [SND] 27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg 2011-01-17 01:37 26M [SND] 27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg.md5 2011-01-18 07:26 101 [SND] 27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg.sha1 2011-01-18 07:26 109 [SND] 27c3.ogg.all.md5 2011-01-18 07:43 7.5K [SND] 27c3.ogg.all.sha1 2011-01-18 07:44 8.3K [   ] 27c3-3952-en-running_your_own_gsm_stack_on_a_phone.ogg.torrent 2011-03-04 17:32 1.9K [   ] 27c3-3957-en-ipv6_insecurities.ogg.torrent 2011-03-04 17:32 1.7K [   ] 27c3-3983-en-hackers_and_computer_science.ogg.torrent 2011-03-04 17:32 1.4K [   ] 27c3-4003-en-cybernetics_for_the_masses.ogg.torrent 2011-03-04 17:32 1.5K [   ] 27c3-4006-en-diy_synthesizers_and_sound_generators.ogg.torrent 2011-03-04 17:32 1.2K [   ] 27c3-4011-en-embedded_reverse_engineering.ogg.torrent 2011-03-04 17:32 1.8K [   ] 27c3-4017-en-desktop_on_the_linux.ogg.torrent 2011-03-04 17:32 1.7K [   ] 27c3-4018-en-frozencache.ogg.torrent 2011-03-04 17:32 1.7K [   ] 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.ogg.torrent 2011-03-04 17:32 1.9K [   ] 27c3-4046-en-all_colours_are_beautiful.ogg.torrent 2011-03-04 17:32 1.4K [   ] 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4057-en-adventures_in_mapping_afghanistan_elections.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4060-en-attacking_mobile_phones.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4061-en-building_custom_disassemblers.ogg.torrent 2011-03-04 17:33 2.1K [   ] 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4070-de-fnord_jahresrueckblick.ogg.torrent 2011-03-04 17:33 2.3K [   ] 27c3-4073-de-logikschaltungen_ohne_elektronik.ogg.torrent 2011-03-04 17:33 1.4K [   ] 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4082-en-sap_landscape.ogg.torrent 2011-03-04 17:33 2.1K [   ] 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.ogg.torrent 2011-03-04 17:33 1.3K [   ] 27c3-4085-de-digitale_spaltung_per_gesetz.ogg.torrent 2011-03-04 17:33 1.5K [   ] 27c3-4087-en-console_hacking_2010.ogg.torrent 2011-03-04 17:33 1.5K [   ] 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4090-en-baseband_apocalypse.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4094-de-netzneutralitaet_und_qos.ogg.torrent 2011-03-04 17:33 2.2K [   ] 27c3-4096-en-code_deobfuscation_by_optimization.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4097-de-identifizierung_von_netzwerkprotokollen.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4099-en-file_print_electronics.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4103-en-copyright_enforcement_versus_freedoms.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4121-en-is_the_ssliverse_a_safe_place.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4123-en-defense_is_not_dead.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4125-de-spinning_the_electronic_wheel.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4138-en-secure_communications_below_the_hearing_threshold.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4140-en-contemporary_profiling_of_web_users.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4141-de-hacker_jeopardy.ogg.torrent 2011-03-04 17:33 3.2K [   ] 27c3-4142-en-nodejs_as_a_networking_tool.ogg.torrent 2011-03-04 17:33 1.3K [   ] 27c3-4143-en-parttimescientists.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4144-en-short_political_history_of_acoustics.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4145-en-spoilers_human_interfaces_airplanes.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4149-en-i_control_your_code.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4151-en-android_geolocation_using_gsm_network.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4159-en-reverse_engineering_mos_6502.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4160-en-automatic_identification_cryptographic_primitives.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4164-de-friede_sei_mit_euren_daten.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4168-en-automated_architecture_independent_gadget_search.ogg.torrent 2011-03-04 17:33 1.4K [   ] 27c3-4174-en-the_hidden_nemesis.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4175-en-from_robot_to_robot.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4176-de-hacking_ibuttons.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4181-en-sip_home_gateways_under_fire.ogg.torrent 2011-03-04 17:33 1.2K [   ] 27c3-4183-en-safety_on_open_sea.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4184-de-stanislaw_lem_weltverbesserer.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4185-de-whistleblowing_licht_ins_dunkel.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4187-en-your_infrastructure_will_kill_you.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4190-en-data_retention_in_the_eu.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4193-en-having_fun_with_rtp.ogg.torrent 2011-03-04 17:33 1.4K [   ] 27c3-4195-de-literarischer_abend.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4206-en-immi_from_concept_to_reality.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4208-en-wideband_gsm_sniffing.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4210-en-lying_to_the_neighbours.ogg.torrent 2011-03-04 17:33 1.4K [   ] 27c3-4211-en-chip_and_pin_is_broken.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4221-en-omg_wtf_pdf.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4230-de-security_nightmares.ogg.torrent 2011-03-04 17:33 2.3K [   ] 27c3-4231-en-datenrettung_fun_with_hard_drives.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4234-en-usb_and_libusb.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4236-en-international_cyber_jurisdiction.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4237-en-indect_eu_surveillance_project.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4239-en-lightning_talks_d3.ogg.torrent 2011-03-04 17:33 2.0K [   ] 27c3-4244-en-critical_overview_of_10_years_pet.ogg.torrent 2011-03-04 17:33 1.7K [   ] 27c3-4245-en-adventures_in_analyzing_stuxnet.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4253-en-pentanews_game_show.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4261-en-key_recovery_attacks_rc4.ogg.torrent 2011-03-04 17:33 1.5K [   ] 27c3-4263-en-resisting_excessive_government_surveillance.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4265-en-hacking_smart_phones.ogg.torrent 2011-03-04 17:33 2.1K [   ] 27c3-4276-en-cognitive_psychology_for_hackers.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4295-en-high_speed_high_security_cryptography.ogg.torrent 2011-03-04 17:33 1.9K [   ] 27c3-4296-en-lightning_days_d2.ogg.torrent 2011-03-04 17:33 1.6K [   ] 27c3-4297-de-die_gesamte_technik_ist_sicher.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4298-de-ccc_jahresrueckblick_2010.ogg.torrent 2011-03-04 17:33 2.5K [   ] 27c3-4299-en-closing_event.ogg.torrent 2011-03-04 17:33 1.2K [   ] 27c3-4300-en-lightning_talks_d4.ogg.torrent 2011-03-04 17:33 2.9K [   ] 27c3-4301-en-flow_analysis_of_internet_activities.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3-4302-en-27c3_keynote_we_come_in_peace.ogg.torrent 2011-03-04 17:33 1.4K [   ] 27c3-4326-de-radio_der_zukunft.ogg.torrent 2011-03-04 17:33 2.1K [   ] 27c3-4333-en-hacker_jeopardy_translation.ogg.torrent 2011-03-04 17:33 3.2K [   ] 27c3-4334-en-fnord_jahresrueckblick_2010_translation.ogg.torrent 2011-03-04 17:33 2.3K [   ] 27c3-4338-de-wikileaks_und_mehr.ogg.torrent 2011-03-04 17:33 1.5K [   ] 27c3-4339-en-openleaks.ogg.torrent 2011-03-04 17:33 1.8K [   ] 27c3.ogg.all.torrent 2011-03-08 11:16 208K
Apache/2.4.41 (Ubuntu) Server at ftp.rrze.uni-erlangen.de Port 443