/events/CCC/congress/25c3/audio_only/
File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
25c3-2596-en-swf_and_the_malware_tragedy.mp3 22M2009-Jan-11 21:42
25c3-2596-en-swf_and_the_malware_tragedy.mp3.md5 792009-Jan-11 21:42
25c3-2596-en-swf_and_the_malware_tragedy.ogg 20M2009-Jan-11 21:42
25c3-2596-en-swf_and_the_malware_tragedy.ogg.md5 792009-Jan-11 21:42
25c3-2639-en-attacking_nfc_mobile_phones.mp3 38M2009-Jan-12 01:38
25c3-2639-en-attacking_nfc_mobile_phones.mp3.md5 792009-Jan-12 01:38
25c3-2639-en-attacking_nfc_mobile_phones.ogg 34M2009-Jan-12 01:39
25c3-2639-en-attacking_nfc_mobile_phones.ogg.md5 792009-Jan-12 01:38
25c3-2665-en-the_trust_situation.mp3 28M2008-Dec-29 12:25
25c3-2665-en-the_trust_situation.mp3.md5 712009-Jan-06 20:21
25c3-2665-en-the_trust_situation.ogg 25M2008-Dec-29 15:36
25c3-2665-en-the_trust_situation.ogg.md5 712009-Jan-06 20:21
25c3-2669-en-collapsing_the_european_security_a..> 27M2009-Jan-12 01:38
25c3-2669-en-collapsing_the_european_security_a..> 972009-Jan-12 01:38
25c3-2669-en-collapsing_the_european_security_a..> 24M2009-Jan-12 01:39
25c3-2669-en-collapsing_the_european_security_a..> 972009-Jan-12 01:38
25c3-2678-en-vulnerability_discovery_in_encrypt..> 27M2008-Dec-29 02:11
25c3-2678-en-vulnerability_discovery_in_encrypt..> 1192009-Jan-06 20:21
25c3-2678-en-vulnerability_discovery_in_encrypt..> 24M2008-Dec-29 13:53
25c3-2678-en-vulnerability_discovery_in_encrypt..> 1192009-Jan-06 20:21
25c3-2680-en-not_soy_fast_genetically_modified_..> 22M2009-Jan-06 20:42
25c3-2680-en-not_soy_fast_genetically_modified_..> 1382009-Jan-06 20:41
25c3-2680-en-not_soy_fast_genetically_modified_..> 20M2009-Jan-06 20:46
25c3-2680-en-not_soy_fast_genetically_modified_..> 1382009-Jan-06 20:41
25c3-2681-en-repurposing_the_ti_ez430u.mp3 15M2008-Dec-29 23:06
25c3-2681-en-repurposing_the_ti_ez430u.mp3.md5 772009-Jan-06 20:21
25c3-2681-en-repurposing_the_ti_ez430u.ogg 14M2008-Dec-30 01:51
25c3-2681-en-repurposing_the_ti_ez430u.ogg.md5 772009-Jan-06 20:21
25c3-2734-en-short_attention_span_security.mp3 24M2009-Jan-12 01:38
25c3-2734-en-short_attention_span_security.mp3.md5 812009-Jan-12 01:38
25c3-2734-en-short_attention_span_security.ogg 22M2009-Jan-12 01:39
25c3-2734-en-short_attention_span_security.ogg.md5 812009-Jan-12 01:38
25c3-2773-en-soviet_unterzoegersdorf.mp3 36M2008-Dec-29 23:20
25c3-2773-en-soviet_unterzoegersdorf.mp3.md5 752009-Jan-06 20:21
25c3-2773-en-soviet_unterzoegersdorf.ogg 32M2008-Dec-30 01:47
25c3-2773-en-soviet_unterzoegersdorf.ogg.md5 752009-Jan-06 20:21
25c3-2777-en-crafting_and_hacking_separated_at_..> 16M2009-Jan-12 01:38
25c3-2777-en-crafting_and_hacking_separated_at_..> 912009-Jan-12 01:38
25c3-2777-en-crafting_and_hacking_separated_at_..> 15M2009-Jan-12 01:39
25c3-2777-en-crafting_and_hacking_separated_at_..> 912009-Jan-12 01:38
25c3-2781-en-objects_as_software_the_coming_rev..> 24M2009-Jan-11 21:42
25c3-2781-en-objects_as_software_the_coming_rev..> 932009-Jan-11 21:42
25c3-2781-en-objects_as_software_the_coming_rev..> 21M2009-Jan-11 21:42
25c3-2781-en-objects_as_software_the_coming_rev..> 932009-Jan-11 21:42
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 30M2009-Jan-06 20:42
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 1062009-Jan-06 20:41
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 27M2009-Jan-06 20:46
25c3-2791-en-la_quadrature_du_net_-_campaigning..> 1062009-Jan-06 20:41
25c3-2799-en-console_hacking_2008_wii_fail.mp3 26M2008-Dec-29 15:38
25c3-2799-en-console_hacking_2008_wii_fail.mp3.md5 812009-Jan-06 20:21
25c3-2799-en-console_hacking_2008_wii_fail.ogg 23M2008-Dec-29 13:53
25c3-2799-en-console_hacking_2008_wii_fail.ogg.md5 812009-Jan-06 20:21
25c3-2806-en-building_an_international_movement..> 30M2008-Dec-29 13:16
25c3-2806-en-building_an_international_movement..> 1022009-Jan-06 20:21
25c3-2806-en-building_an_international_movement..> 27M2008-Dec-29 13:16
25c3-2806-en-building_an_international_movement..> 1022009-Jan-06 20:21
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 24M2009-Jan-22 23:28
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 982009-Jan-22 23:28
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 21M2009-Jan-22 23:28
25c3-2807-de-erich_muehsams_tagebuecher_in_der_..> 982009-Jan-22 23:28
25c3-2812-de-fnord_news_show.mp3 23M2008-Dec-29 22:08
25c3-2812-de-fnord_news_show.mp3.md5 672009-Jan-06 20:21
25c3-2812-de-fnord_news_show.ogg 20M2008-Dec-29 22:08
25c3-2812-de-fnord_news_show.ogg.md5 672009-Jan-06 20:21
25c3-2814-de-datenpannen.mp3 24M2008-Dec-29 15:12
25c3-2814-de-datenpannen.mp3.md5 632009-Jan-06 20:21
25c3-2814-de-datenpannen.ogg 22M2008-Dec-29 15:16
25c3-2814-de-datenpannen.ogg.md5 632009-Jan-06 20:21
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp3 22M2008-Dec-29 15:10
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp..> 832009-Jan-06 20:21
25c3-2815-en-beyond_asimov_-_laws_for_robots.ogg 20M2008-Dec-29 15:21
25c3-2815-en-beyond_asimov_-_laws_for_robots.og..> 832009-Jan-06 20:21
25c3-2816-en-cisco_ios_attack_and_defense.mp3 30M2009-Jan-06 20:42
25c3-2816-en-cisco_ios_attack_and_defense.mp3.md5 802009-Jan-06 20:41
25c3-2816-en-cisco_ios_attack_and_defense.ogg 25M2009-Jan-06 20:46
25c3-2816-en-cisco_ios_attack_and_defense.ogg.md5 802009-Jan-06 20:41
25c3-2827-de-u23.mp3 23M2008-Dec-29 23:19
25c3-2827-de-u23.mp3.md5 552009-Jan-06 20:21
25c3-2827-de-u23.ogg 20M2008-Dec-30 01:46
25c3-2827-de-u23.ogg.md5 552009-Jan-06 20:21
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 20M2009-Jan-07 23:08
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 862009-Jan-07 23:08
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 18M2009-Jan-07 23:09
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn..> 862009-Jan-07 23:08
25c3-2831-en-security_of_mica-based_wireless_se..> 17M2009-Jan-06 20:42
25c3-2831-en-security_of_mica-based_wireless_se..> 992009-Jan-06 20:41
25c3-2831-en-security_of_mica-based_wireless_se..> 15M2009-Jan-06 20:46
25c3-2831-en-security_of_mica-based_wireless_se..> 992009-Jan-06 20:41
25c3-2832-en-exploiting_symbian.mp3 29M2008-Dec-29 14:22
25c3-2832-en-exploiting_symbian.mp3.md5 702009-Jan-06 20:21
25c3-2832-en-exploiting_symbian.ogg 26M2008-Dec-29 14:22
25c3-2832-en-exploiting_symbian.ogg.md5 702009-Jan-06 20:21
25c3-2839-en-cracking_the_msp430_bsl.mp3 17M2008-Dec-29 15:08
25c3-2839-en-cracking_the_msp430_bsl.mp3.md5 752009-Jan-06 20:21
25c3-2839-en-cracking_the_msp430_bsl.ogg 15M2008-Dec-29 13:24
25c3-2839-en-cracking_the_msp430_bsl.ogg.md5 752009-Jan-06 20:21
25c3-2843-en-algorithmic_music_in_a_box.mp3 23M2009-Jan-07 23:09
25c3-2843-en-algorithmic_music_in_a_box.mp3.md5 782009-Jan-07 23:08
25c3-2843-en-algorithmic_music_in_a_box.ogg 21M2009-Jan-07 23:10
25c3-2843-en-algorithmic_music_in_a_box.ogg.md5 782009-Jan-07 23:08
25c3-2845-en-rf_fingerprinting_of_rfid.mp3 20M2008-Dec-29 14:34
25c3-2845-en-rf_fingerprinting_of_rfid.mp3.md5 772009-Jan-06 20:21
25c3-2845-en-rf_fingerprinting_of_rfid.ogg 18M2008-Dec-29 13:21
25c3-2845-en-rf_fingerprinting_of_rfid.ogg.md5 772009-Jan-06 20:21
25c3-2860-de-neusprech_im_berwachungsstaat.mp3 32M2008-Dec-30 01:47
25c3-2860-de-neusprech_im_berwachungsstaat.mp3.md5 812009-Jan-06 20:21
25c3-2860-de-neusprech_im_berwachungsstaat.ogg 29M2008-Dec-30 01:48
25c3-2860-de-neusprech_im_berwachungsstaat.ogg.md5 812009-Jan-06 20:21
25c3-2863-en-climate_change_-_state_of_the_scie..> 30M2009-Jan-13 16:59
25c3-2863-en-climate_change_-_state_of_the_scie..> 892009-Jan-13 16:59
25c3-2863-en-climate_change_-_state_of_the_scie..> 26M2009-Jan-13 16:59
25c3-2863-en-climate_change_-_state_of_the_scie..> 892009-Jan-13 16:59
25c3-2872-en-the_privacy_workshop_project.mp3 22M2008-Dec-29 23:20
25c3-2872-en-the_privacy_workshop_project.mp3.md5 802009-Jan-06 20:21
25c3-2872-en-the_privacy_workshop_project.ogg 20M2008-Dec-30 01:50
25c3-2872-en-the_privacy_workshop_project.ogg.md5 802009-Jan-06 20:21
25c3-2873-en-privacy_in_the_social_semantic_web..> 21M2008-Dec-29 23:02
25c3-2873-en-privacy_in_the_social_semantic_web..> 862009-Jan-06 20:21
25c3-2873-en-privacy_in_the_social_semantic_web..> 19M2008-Dec-30 01:45
25c3-2873-en-privacy_in_the_social_semantic_web..> 862009-Jan-06 20:21
25c3-2874-en-the_ultimate_commodore_64_talk.mp3 28M2009-Jan-11 21:42
25c3-2874-en-the_ultimate_commodore_64_talk.mp3..> 822009-Jan-11 21:42
25c3-2874-en-the_ultimate_commodore_64_talk.ogg 25M2009-Jan-11 21:42
25c3-2874-en-the_ultimate_commodore_64_talk.ogg..> 822009-Jan-11 21:42
25c3-2875-en-an_introduction_to_new_stream_ciph..> 21M2009-Jan-07 23:09
25c3-2875-en-an_introduction_to_new_stream_ciph..> 962009-Jan-07 23:08
25c3-2875-en-an_introduction_to_new_stream_ciph..> 19M2009-Jan-07 23:10
25c3-2875-en-an_introduction_to_new_stream_ciph..> 962009-Jan-07 23:08
25c3-2882-en-full-disk-encryption_crash-course.mp3 22M2008-Dec-29 13:54
25c3-2882-en-full-disk-encryption_crash-course...> 852009-Jan-06 20:21
25c3-2882-en-full-disk-encryption_crash-course.ogg 20M2008-Dec-29 14:01
25c3-2882-en-full-disk-encryption_crash-course...> 852009-Jan-06 20:21
25c3-2890-en-scalable_swarm_robotics.mp3 18M2008-Dec-29 14:28
25c3-2890-en-scalable_swarm_robotics.mp3.md5 752009-Jan-06 20:21
25c3-2890-en-scalable_swarm_robotics.ogg 16M2008-Dec-29 13:19
25c3-2890-en-scalable_swarm_robotics.ogg.md5 752009-Jan-06 20:21
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3 20M2008-Dec-29 14:11
25c3-2892-en-about_cyborgs_and_gargoyles_.mp3.md5 802009-Jan-06 20:21
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg 19M2008-Dec-29 14:11
25c3-2892-en-about_cyborgs_and_gargoyles_.ogg.md5 802009-Jan-06 20:21
25c3-2893-en-attacking_rich_internet_applicatio..> 28M2009-Jan-06 20:42
25c3-2893-en-attacking_rich_internet_applicatio..> 882009-Jan-06 20:41
25c3-2893-en-attacking_rich_internet_applicatio..> 25M2009-Jan-06 20:46
25c3-2893-en-attacking_rich_internet_applicatio..> 882009-Jan-06 20:41
25c3-2895-de-der_elektronische_personalausweis.mp3 27M2009-Jan-11 21:42
25c3-2895-de-der_elektronische_personalausweis...> 852009-Jan-11 21:42
25c3-2895-de-der_elektronische_personalausweis.ogg 24M2009-Jan-11 21:42
25c3-2895-de-der_elektronische_personalausweis...> 852009-Jan-11 21:42
25c3-2896-en-chip_reverse_engineering.mp3 20M2008-Dec-29 12:17
25c3-2896-en-chip_reverse_engineering.mp3.md5 762009-Jan-06 20:21
25c3-2896-en-chip_reverse_engineering.ogg 18M2008-Dec-29 13:07
25c3-2896-en-chip_reverse_engineering.ogg.md5 762009-Jan-06 20:21
25c3-2899-en-mining_social_contacts_with_active..> 27M2009-Jan-06 20:43
25c3-2899-en-mining_social_contacts_with_active..> 912009-Jan-06 20:41
25c3-2899-en-mining_social_contacts_with_active..> 24M2009-Jan-06 20:46
25c3-2899-en-mining_social_contacts_with_active..> 912009-Jan-06 20:41
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 23M2008-Dec-29 12:55
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 862009-Jan-06 20:21
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 20M2008-Dec-29 15:29
25c3-2901-en-faifa_a_first_open_source_plc_tool..> 862009-Jan-06 20:21
25c3-2904-en-solar-powering_your_geek_gear.mp3 13M2008-Dec-29 12:05
25c3-2904-en-solar-powering_your_geek_gear.mp3.md5 812009-Jan-06 20:21
25c3-2904-en-solar-powering_your_geek_gear.ogg 12M2008-Dec-29 18:27
25c3-2904-en-solar-powering_your_geek_gear.ogg.md5 812009-Jan-06 20:21
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 33M2009-Jan-12 01:39
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 1022009-Jan-12 01:38
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 30M2009-Jan-12 01:39
25c3-2906-en-why_were_we_so_vulnerable_to_the_d..> 1022009-Jan-12 01:38
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 14M2008-Dec-29 15:11
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 892009-Jan-06 20:21
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 12M2008-Dec-29 13:12
25c3-2909-en-tcp_denial_of_service_vulnerabilit..> 892009-Jan-06 20:21
25c3-2916-en-wikileaks.mp3 27M2009-Jan-11 21:42
25c3-2916-en-wikileaks.mp3.md5 612009-Jan-11 21:42
25c3-2916-en-wikileaks.ogg 24M2009-Jan-11 21:42
25c3-2916-en-wikileaks.ogg.md5 612009-Jan-11 21:42
25c3-2922-en-advanced_memory_forensics_the_cold..> 27M2008-Dec-29 15:13
25c3-2922-en-advanced_memory_forensics_the_cold..> 992009-Jan-06 20:21
25c3-2922-en-advanced_memory_forensics_the_cold..> 24M2008-Dec-29 15:22
25c3-2922-en-advanced_memory_forensics_the_cold..> 992009-Jan-06 20:21
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 25M2009-Jan-06 20:43
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 922009-Jan-06 20:41
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 22M2009-Jan-06 20:47
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 922009-Jan-06 20:41
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 29M2008-Dec-29 13:16
25c3-2923-de-das_grundrecht_auf_digitale_intims..> 902009-Jan-06 20:21
25c3-2934-en-blinkenlights_stereoscope.mp3 30M2009-Jan-06 20:43
25c3-2934-en-blinkenlights_stereoscope.mp3.md5 772009-Jan-06 20:41
25c3-2934-en-blinkenlights_stereoscope.ogg 26M2009-Jan-06 20:47
25c3-2934-en-blinkenlights_stereoscope.ogg.md5 772009-Jan-06 20:41
25c3-2937-en-dect.mp3 31M2009-Jan-06 20:43
25c3-2937-en-dect.mp3.md5 562009-Jan-06 20:41
25c3-2937-en-dect.ogg 27M2009-Jan-06 20:47
25c3-2937-en-dect.ogg.md5 562009-Jan-06 20:41
25c3-2938-en-methods_for_understanding_targeted..> 23M2009-Jan-06 20:44
25c3-2938-en-methods_for_understanding_targeted..> 1162009-Jan-06 20:41
25c3-2938-en-methods_for_understanding_targeted..> 21M2009-Jan-06 20:48
25c3-2938-en-methods_for_understanding_targeted..> 1162009-Jan-06 20:41
25c3-2940-en-flying_for_free.mp3 28M2009-Jan-22 23:28
25c3-2940-en-flying_for_free.mp3.md5 672009-Jan-22 23:28
25c3-2940-en-flying_for_free.ogg 25M2009-Jan-22 23:28
25c3-2940-en-flying_for_free.ogg.md5 672009-Jan-22 23:28
25c3-2942-de-vertex_hacking.mp3 22M2009-Jan-06 20:44
25c3-2942-de-vertex_hacking.mp3.md5 662009-Jan-06 20:41
25c3-2942-de-vertex_hacking.ogg 20M2009-Jan-06 20:48
25c3-2942-de-vertex_hacking.ogg.md5 662009-Jan-06 20:41
25c3-2952-de-pflanzenhacken.mp3 25M2009-Jan-11 21:42
25c3-2952-de-pflanzenhacken.mp3.md5 662009-Jan-11 21:42
25c3-2952-de-pflanzenhacken.ogg 22M2009-Jan-11 21:42
25c3-2952-de-pflanzenhacken.ogg.md5 662009-Jan-11 21:42
25c3-2953-en-security_failures_in_smart_card_pa..> 28M2008-Dec-29 15:08
25c3-2953-en-security_failures_in_smart_card_pa..> 992009-Jan-06 20:21
25c3-2953-en-security_failures_in_smart_card_pa..> 25M2008-Dec-29 15:06
25c3-2953-en-security_failures_in_smart_card_pa..> 992009-Jan-06 20:21
25c3-2958-de-hacker_jeopardy.mp3 47M2009-Jan-12 01:39
25c3-2958-de-hacker_jeopardy.mp3.md5 672009-Jan-12 01:38
25c3-2958-de-hacker_jeopardy.ogg 42M2009-Jan-12 01:39
25c3-2958-de-hacker_jeopardy.ogg.md5 672009-Jan-12 01:38
25c3-2963-de-handschellen_hacken.mp3 28M2009-Jan-26 11:39
25c3-2963-de-handschellen_hacken.mp3.md5 712009-Jan-26 11:39
25c3-2963-de-handschellen_hacken.ogg 25M2009-Jan-26 11:39
25c3-2963-de-handschellen_hacken.ogg.md5 712009-Jan-26 11:39
25c3-2970-en-coreboot_beyond_the_final_frontier..> 23M2008-Dec-29 00:52
25c3-2970-en-coreboot_beyond_the_final_frontier..> 862009-Jan-06 20:21
25c3-2970-en-coreboot_beyond_the_final_frontier..> 21M2008-Dec-29 15:23
25c3-2970-en-coreboot_beyond_the_final_frontier..> 862009-Jan-06 20:21
25c3-2973-en-lightning_talks_day4.mp3 28M2009-Jan-11 21:42
25c3-2973-en-lightning_talks_day4.mp3.md5 722009-Jan-11 21:42
25c3-2973-en-lightning_talks_day4.ogg 25M2009-Jan-11 21:42
25c3-2973-en-lightning_talks_day4.ogg.md5 722009-Jan-11 21:42
25c3-2975-de-zehn_big_brother_awards_in_at.mp3 26M2009-Jan-06 20:44
25c3-2975-de-zehn_big_brother_awards_in_at.mp3.md5 812009-Jan-06 20:41
25c3-2975-de-zehn_big_brother_awards_in_at.ogg 23M2009-Jan-06 20:48
25c3-2975-de-zehn_big_brother_awards_in_at.ogg.md5 812009-Jan-06 20:41
25c3-2976-en-hacking_the_iphone.mp3 27M2008-Dec-29 12:59
25c3-2976-en-hacking_the_iphone.mp3.md5 702009-Jan-06 20:21
25c3-2976-en-hacking_the_iphone.ogg 24M2008-Dec-29 15:24
25c3-2976-en-hacking_the_iphone.ogg.md5 702009-Jan-06 20:21
25c3-2977-en-security_and_anonymity_vulnerabili..> 28M2009-Jan-06 20:44
25c3-2977-en-security_and_anonymity_vulnerabili..> 972009-Jan-06 20:41
25c3-2977-en-security_and_anonymity_vulnerabili..> 25M2009-Jan-06 20:48
25c3-2977-en-security_and_anonymity_vulnerabili..> 972009-Jan-06 20:41
25c3-2979-en-embracing_post-privacy.mp3 27M2009-Jan-06 20:44
25c3-2979-en-embracing_post-privacy.mp3.md5 742009-Jan-06 20:41
25c3-2979-en-embracing_post-privacy.ogg 24M2009-Jan-06 20:48
25c3-2979-en-embracing_post-privacy.ogg.md5 742009-Jan-06 20:41
25c3-2980-en-the_infinite_library.mp3 27M2009-Jan-06 22:25
25c3-2980-en-the_infinite_library.mp3.md5 722009-Jan-06 22:25
25c3-2980-en-the_infinite_library.ogg 24M2009-Jan-07 23:10
25c3-2980-en-the_infinite_library.ogg.md5 722009-Jan-07 23:08
25c3-2988-en-just_estonia_and_georgia.mp3 20M2009-Jan-06 20:45
25c3-2988-en-just_estonia_and_georgia.mp3.md5 762009-Jan-06 20:41
25c3-2988-en-just_estonia_and_georgia.ogg 18M2009-Jan-06 20:48
25c3-2988-en-just_estonia_and_georgia.ogg.md5 762009-Jan-06 20:41
25c3-2991-en-terrorist_all-stars.mp3 30M2009-Jan-06 20:45
25c3-2991-en-terrorist_all-stars.mp3.md5 712009-Jan-06 20:41
25c3-2991-en-terrorist_all-stars.ogg 27M2009-Jan-06 20:48
25c3-2991-en-terrorist_all-stars.ogg.md5 712009-Jan-06 20:41
25c3-2992-en-tricks_makes_you_smile.mp3 16M2009-Jan-07 23:09
25c3-2992-en-tricks_makes_you_smile.mp3.md5 742009-Jan-07 23:08
25c3-2992-en-tricks_makes_you_smile.ogg 14M2009-Jan-07 23:10
25c3-2992-en-tricks_makes_you_smile.ogg.md5 742009-Jan-07 23:08
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 23M2009-Jan-06 20:45
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 1082009-Jan-06 20:41
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 21M2009-Jan-06 20:49
25c3-2995-en-predictable_rng_in_the_vulnerable_..> 1082009-Jan-06 20:41
25c3-2997-en-locating_mobile_phones_using_ss7.mp3 22M2008-Dec-29 15:15
25c3-2997-en-locating_mobile_phones_using_ss7.m..> 842009-Jan-06 20:21
25c3-2997-en-locating_mobile_phones_using_ss7.ogg 20M2008-Dec-29 15:18
25c3-2997-en-locating_mobile_phones_using_ss7.o..> 842009-Jan-06 20:21
25c3-2999-en-closing_ceremony.mp3 23M2009-Jan-11 21:42
25c3-2999-en-closing_ceremony.mp3.md5 682009-Jan-11 21:42
25c3-2999-en-closing_ceremony.ogg 20M2009-Jan-11 21:42
25c3-2999-en-closing_ceremony.ogg.md5 682009-Jan-11 21:42
25c3-3000-en-stormfucker_owning_the_storm_botne..> 37M2009-Jan-12 01:39
25c3-3000-en-stormfucker_owning_the_storm_botne..> 872009-Jan-12 01:38
25c3-3000-en-stormfucker_owning_the_storm_botne..> 33M2009-Jan-12 01:39
25c3-3000-en-stormfucker_owning_the_storm_botne..> 872009-Jan-12 01:38
25c3-3002-en-squeezing_attack_traces.mp3 17M2009-Jan-11 21:42
25c3-3002-en-squeezing_attack_traces.mp3.md5 752009-Jan-11 21:42
25c3-3002-en-squeezing_attack_traces.ogg 15M2009-Jan-11 21:43
25c3-3002-en-squeezing_attack_traces.ogg.md5 752009-Jan-11 21:42
25c3-3004-en-why_technology_sucks.mp3 20M2009-Jan-06 20:45
25c3-3004-en-why_technology_sucks.mp3.md5 722009-Jan-06 20:41
25c3-3004-en-why_technology_sucks.ogg 18M2009-Jan-06 20:49
25c3-3004-en-why_technology_sucks.ogg.md5 722009-Jan-06 20:42
25c3-3007-en-running_your_own_gsm_network.mp3 20M2008-Dec-30 17:16
25c3-3007-en-running_your_own_gsm_network.mp3.md5 802009-Jan-06 20:21
25c3-3007-en-running_your_own_gsm_network.ogg 18M2008-Dec-30 17:16
25c3-3007-en-running_your_own_gsm_network.ogg.md5 802009-Jan-06 20:21
25c3-3008-en-anatomy_of_smartphone_hardware.mp3 26M2009-Jan-06 20:45
25c3-3008-en-anatomy_of_smartphone_hardware.mp3..> 822009-Jan-06 20:42
25c3-3008-en-anatomy_of_smartphone_hardware.ogg 23M2009-Jan-06 20:49
25c3-3008-en-anatomy_of_smartphone_hardware.ogg..> 822009-Jan-06 20:42
25c3-3015-en-rapid_prototype_your_life.mp3 26M2008-Dec-29 13:10
25c3-3015-en-rapid_prototype_your_life.mp3.md5 772009-Jan-06 20:21
25c3-3015-en-rapid_prototype_your_life.ogg 23M2008-Dec-29 13:09
25c3-3015-en-rapid_prototype_your_life.ogg.md5 772009-Jan-06 20:21
25c3-3016-en-life_is_a_holodeck.mp3 31M2009-Jan-11 21:42
25c3-3016-en-life_is_a_holodeck.mp3.md5 702009-Jan-11 21:42
25c3-3016-en-life_is_a_holodeck.ogg 27M2009-Jan-11 21:43
25c3-3016-en-life_is_a_holodeck.ogg.md5 702009-Jan-11 21:42
25c3-3020-en-banking_malware_101.mp3 29M2009-Jan-12 01:39
25c3-3020-en-banking_malware_101.mp3.md5 712009-Jan-12 01:38
25c3-3020-en-banking_malware_101.ogg 26M2009-Jan-12 01:40
25c3-3020-en-banking_malware_101.ogg.md5 712009-Jan-12 01:38
25c3-3021-de-security_nightmares_2009.mp3 43M2009-Jan-12 01:39
25c3-3021-de-security_nightmares_2009.mp3.md5 762009-Jan-12 01:38
25c3-3021-de-security_nightmares_2009.ogg 38M2009-Jan-12 01:40
25c3-3021-de-security_nightmares_2009.ogg.md5 762009-Jan-12 01:38
25c3-3023-en-making_the_theoretical_possible.mp3 28M2009-Jan-06 20:46
25c3-3023-en-making_the_theoretical_possible.mp..> 832009-Jan-06 20:42
25c3-3023-en-making_the_theoretical_possible.ogg 25M2009-Jan-06 20:49
25c3-3023-en-making_the_theoretical_possible.og..> 832009-Jan-06 20:42
25c3-3024-de-jahresrueckblick.mp3 57M2009-Jan-12 01:39
25c3-3024-de-jahresrueckblick.mp3.md5 682009-Jan-12 01:38
25c3-3024-de-jahresrueckblick.ogg 51M2009-Jan-12 01:40
25c3-3024-de-jahresrueckblick.ogg.md5 682009-Jan-12 01:38
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 36M2009-Jan-22 23:28
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 872009-Jan-22 23:28
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 32M2009-Jan-22 23:28
25c3-3025-en-opening_and_keynote_nothing_to_hid..> 872009-Jan-22 23:28
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3 28M2008-Dec-29 15:14
25c3-3028-de-der_hackerparagraph_202c_stgb.mp3.md5 812009-Jan-06 20:21
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg 25M2008-Dec-29 15:19
25c3-3028-de-der_hackerparagraph_202c_stgb.ogg.md5 812009-Jan-06 20:21
25c3-3030-en-messing_around_with_garage_doors.mp3 35M2009-Jan-12 01:39
25c3-3030-en-messing_around_with_garage_doors.m..> 842009-Jan-12 01:38
25c3-3030-en-messing_around_with_garage_doors.ogg 31M2009-Jan-12 01:40
25c3-3030-en-messing_around_with_garage_doors.o..> 842009-Jan-12 01:38
25c3-3032-en-analyzing_rfid_security.mp3 25M2009-Jan-06 20:46
25c3-3032-en-analyzing_rfid_security.mp3.md5 752009-Jan-06 20:42
25c3-3032-en-analyzing_rfid_security.ogg 22M2009-Jan-06 20:50
25c3-3032-en-analyzing_rfid_security.ogg.md5 752009-Jan-06 20:42
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 30M2008-Dec-29 23:00
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 872009-Jan-06 20:21
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 26M2008-Dec-30 01:45
25c3-3041-en-evoting_after_nedap_and_digital_pe..> 872009-Jan-06 20:21
25c3-3044-en-all_your_bases_are_belong_to_us.mp3 25M2008-Dec-29 11:53
25c3-3044-en-all_your_bases_are_belong_to_us.mp..> 832009-Jan-06 20:21
25c3-3044-en-all_your_bases_are_belong_to_us.ogg 22M2008-Dec-29 12:27
25c3-3044-en-all_your_bases_are_belong_to_us.og..> 832009-Jan-06 20:21
25c3-3047-en-lightning_talks_day3_morning.mp3 27M2008-Dec-29 22:56
25c3-3047-en-lightning_talks_day3_morning.mp3.md5 802009-Jan-06 20:21
25c3-3047-en-lightning_talks_day3_morning.ogg 24M2008-Dec-29 23:05
25c3-3047-en-lightning_talks_day3_morning.ogg.md5 802009-Jan-06 20:21
25c3-3048-en-lightning_talks_day2.mp3 23M2008-Dec-29 15:25
25c3-3048-en-lightning_talks_day2.mp3.md5 722009-Jan-06 20:21
25c3-3048-en-lightning_talks_day2.ogg 21M2008-Dec-29 15:35
25c3-3048-en-lightning_talks_day2.ogg.md5 722009-Jan-06 20:21
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 22M2009-Jan-11 21:42
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 962009-Jan-11 21:42
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 19M2009-Jan-11 21:43
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_th..> 962009-Jan-11 21:42
25c3-3053-en-lightning_talks_day3_-_evening.mp3 25M2009-Jan-07 23:09
25c3-3053-en-lightning_talks_day3_-_evening.mp3..> 822009-Jan-07 23:08
25c3-3053-en-lightning_talks_day3_-_evening.ogg 22M2009-Jan-07 23:10
25c3-3053-en-lightning_talks_day3_-_evening.ogg..> 822009-Jan-07 23:08
25c3-3056-en-fnord_news_show_english_interpreta..> 23M2009-Jan-13 16:59
25c3-3056-en-fnord_news_show_english_interpreta..> 902009-Jan-13 16:59
25c3-3056-en-fnord_news_show_english_interpreta..> 20M2009-Jan-13 16:59
25c3-3056-en-fnord_news_show_english_interpreta..> 902009-Jan-13 16:59
25c3-3057-en-hacker_jeopardy_english_interpreta..> 47M2009-Jan-13 16:59
25c3-3057-en-hacker_jeopardy_english_interpreta..> 902009-Jan-13 16:59
25c3-3057-en-hacker_jeopardy_english_interpreta..> 42M2009-Jan-13 16:59
25c3-3057-en-hacker_jeopardy_english_interpreta..> 902009-Jan-13 16:59
25c3-3058-en-security_nightmares_2009_english_i..> 42M2009-Jan-13 16:59
25c3-3058-en-security_nightmares_2009_english_i..> 992009-Jan-13 16:59
25c3-3058-en-security_nightmares_2009_english_i..> 38M2009-Jan-13 16:59
25c3-3058-en-security_nightmares_2009_english_i..> 992009-Jan-13 16:59