/events/CCC/congress/21c3/audio/
File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
lectures/-2011-Mar-04 19:47
056 LiberTOS.mp3 02005-Oct-11 14:29
331 Biometrie ueberwinden Wdh.mp3 2M2005-Apr-25 11:49
249 Opening Event.mp3 7M2005-Apr-25 11:48
113 Automated Hacking via Google.mp3 8M2005-Apr-25 11:08
312 Wirklich selbst denken oder durchdrehen.mp3 11M2005-Apr-25 11:49
146 Mehr Sicherheit fuer HostAP-WLANs.mp3 14M2005-Apr-25 11:46
052 Die Ueblichen Verdaechtigen.mp3 14M2005-Apr-25 11:04
125 Old Skewl Hacking.mp3 14M2005-Apr-25 11:40
173 Closing Event.mp3 14M2005-Apr-25 11:47
058 The Blinking Suspects.mp3 14M2005-Apr-25 11:05
049 Zufallszahlengeneratoren.mp3 15M2005-Apr-25 11:04
057 SUN Bloody Daft Solaris Mechanisms.mp3 16M2005-Apr-25 11:05
142 Lightning Talks Day 1.mp3 17M2005-Apr-25 11:45
060 Digital Prosthetics.mp3 17M2005-Apr-25 11:05
101 XMPP - Jabber.mp3 17M2005-Apr-25 11:07
215 The Incomputable Alan Turing.mp3 17M2005-Apr-25 11:48
016 Phishing the Web.mp3 19M2005-Apr-25 11:02
081 Quantenmechanik fuer Nicht Physiker.mp3 19M2005-Apr-25 11:06
151 Side Channel Analysis of Smart Cards.mp3 19M2005-Apr-25 11:46
098 Portable Software-Installation with pkg sou..> 19M2005-Apr-25 11:07
141 Pirate Radio.mp3 20M2005-Apr-25 11:45
045 Internet Censorship in China.mp3 20M2005-Apr-25 11:04
051 Recent features to OpenBSD-ntpd and bgpd.mp3 20M2005-Apr-25 11:04
127 Security Frameworks.mp3 21M2005-Apr-25 11:41
111 The Kernel Accelerator Device.mp3 21M2005-Apr-25 11:08
063 Edit This Page.mp3 21M2005-Apr-25 11:05
099 GPL fuer Anfaenger.mp3 21M2005-Apr-25 11:07
015 Sicherheit bei VoIP-Systemen.mp3 21M2005-Apr-25 11:02
156 Videoueberwachung im europaeischen Vergleic..> 21M2005-Apr-25 11:46
131 Learning OpenPGP by Example.mp3 21M2005-Apr-25 11:41
037 GNOME Anwendungsentwicklung.mp3 21M2005-Apr-25 11:03
182 Radioaktive Paesse.mp3 21M2005-Apr-25 11:47
134 Secure Instant Messaging.mp3 22M2005-Apr-25 11:41
178 Humanoid Robots.mp3 23M2005-Apr-25 11:47
047 Datamining the NSA.mp3 23M2005-Apr-25 11:04
028 Biometrie ueberwinden.mp3 23M2005-Apr-25 11:03
308 MD5 To Be Considered Harmful Someday.mp3 23M2005-Apr-25 11:49
080 USB-Unbekannter Serieller Bus.mp3 23M2005-Apr-25 11:06
135 Voting Machine Technology.mp3 23M2005-Apr-25 11:41
244 High Speed Computing with FPGAs.mp3 23M2005-Apr-25 11:48
038 Free Software Usage in South America.mp3 23M2005-Apr-25 11:03
018 Computer und Robotik in Entenhausen.mp3 24M2005-Apr-25 11:02
153 Suchmaschinenpolitik.mp3 24M2005-Apr-25 11:46
023 Ciphire Mail.mp3 24M2005-Apr-25 11:03
100 Anonymous communications.mp3 24M2005-Apr-25 11:07
083 Quanteninformationstheorie fuer Nicht Physi..> 24M2005-Apr-25 11:06
029 Robocup.mp3 24M2005-Apr-25 11:03
123 Gentoo Hardened.mp3 24M2005-Apr-25 11:40
209 Freedom of expression in new Arab landscape..> 24M2005-Apr-25 11:48
157 Lightning Talks Day 2.mp3 24M2005-Apr-25 11:46
077 Weird Programming 2.mp3 24M2005-Apr-25 11:06
208 Gamecube Hacking.mp3 24M2005-Apr-25 11:48
165 Softwarepatente - Der Tag danach.mp3 25M2005-Apr-25 11:47
164 Barrierefreies Internet.mp3 25M2005-Apr-25 11:47
079 AVG aint vector graphics.mp3 25M2005-Apr-25 11:06
017 Next Generation Peer to Peer Systems.mp3 25M2005-Apr-25 11:02
039 Squeak and Croquet.mp3 25M2005-Apr-25 11:03
232 Positionsbezogene Ad-hoc Kollaboration uebe..> 25M2005-Apr-25 11:48
117 Kampagne Fair Sharing.mp3 25M2005-Apr-25 11:40
040 Firewall Piercing.mp3 25M2005-Apr-25 11:03
055 CCC-Jahresrueckblick.mp3 25M2005-Apr-25 11:04
115 The Fiasco Kernel.mp3 25M2005-Apr-25 11:41
246 RFID Technologie und Implikationen.mp3 25M2005-Apr-25 11:48
114 Der 2. Korb der Urheberrechtsnovelle.mp3 25M2005-Apr-25 11:08
118 Verified Fiasco.mp3 25M2005-Apr-25 11:40
041 Einfuehrung in Kryptographische Methoden.mp3 26M2005-Apr-25 11:03
310 Information-Wissen-Macht.mp3 26M2005-Apr-25 11:49
278 TKUeV-Das Ohr am Draht.mp3 26M2005-Apr-25 11:48
044 Machine Learning in Science and Engineering..> 26M2005-Apr-25 11:04
109 Anti-Honeypot Techniques.mp3 26M2005-Apr-25 11:08
250 Lightning Talks Day 3.mp3 26M2005-Apr-25 11:48
121 Black Ops of DNS.mp3 26M2005-Apr-25 11:40
183 Tor.mp3 26M2005-Apr-25 11:48
097 Das Literarische Code-Quartett.mp3 26M2005-Apr-25 11:07
072 The Reality of Network Address Translators.mp3 27M2005-Apr-25 11:05
168 Spampolitik.mp3 27M2005-Apr-25 11:47
019 Verdeckte Netzwerkanalyse.mp3 27M2005-Apr-25 11:03
078 Aspects of Elliptic Curve Cryptography.mp3 27M2005-Apr-25 11:06
159 State of Emergent Democracy.mp3 27M2005-Apr-25 11:46
013 The Art of Fingerprinting.mp3 28M2005-Apr-25 11:39
133 How to Herd Cats.mp3 28M2005-Apr-25 11:41
046 Tollcollect.mp3 28M2005-Apr-25 11:04
120 Softwarepatente - Ruestzeug zur Debatte.mp3 28M2005-Apr-25 11:40
171 Siegerehrung Lockpicking.mp3 28M2005-Apr-25 11:47
126 Apache Security.mp3 29M2005-Apr-25 11:41
059 Wikipedia Sociographics.mp3 29M2005-Apr-25 11:05
129 Die Propagandawueste des realen Krieges.mp3 31M2005-Apr-25 11:41
316 Bericht von den BigBrotherAwards.mp3 39M2005-Apr-25 11:49
158 How to find anything on the web.mp3 39M2005-Apr-25 11:46
090 Hacktivity.mp3 43M2005-Apr-25 11:07
066 Bluetooth Hacking.mp3 45M2005-Apr-25 11:05
095 Security Nightmares 2005.mp3 50M2005-Apr-25 11:07
074 Hacker-Jeopardy.mp3 60M2005-Apr-25 11:06