Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https and ftp. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/mirrors/pub/cdn.media.ccc.de/congress/2009/mp4-ipod/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
26c3-3515-de-secubt_iProd.mp4.md564 B2010-01-01 22:15:49
26c3-3654-en-gsm_srsly_iProd.mp4.md567 B2010-01-01 22:34:08
26c3-3350-en-milkymist_iProd.mp4.md567 B2010-01-01 22:08:21
26c3-3302-en-i_internet_iProd.mp4.md568 B2010-01-01 22:06:17
26c3-3648-en-dect_part_ii_iProd.mp4.md570 B2010-01-08 09:18:34
26c3-3664-en-homewreckery_iProd.mp4.md570 B2010-01-25 12:35:09
26c3-3717-en-closing_event_iProd.mp4.md571 B2010-01-03 12:34:50
26c3-3481-de-leyen-rhetorik_iProd.mp4.md572 B2010-01-01 22:11:10
26c3-3520-en-conlanging_101_iProd.mp4.md572 B2010-01-15 15:18:02
26c3-3547-en-after_the_hype_iProd.mp4.md572 B2010-01-03 10:40:05
26c3-3700-de-here_be_dragons_iProd.mp4.md573 B2010-01-01 22:39:14
26c3-3594-de-internetsperren_iProd.mp4.md573 B2010-01-01 22:27:30
26c3-3668-en-hacker_jeopardy_iProd.mp4.md573 B2010-01-15 11:44:34
26c3-3669-de-hacker_jeopardy_iProd.mp4.md573 B2010-01-15 14:32:47
26c3-3464-de-liquid_democracy_iProd.mp4.md574 B2010-01-01 22:10:13
26c3-3658-en-black_ops_of_pki_iProd.mp4.md574 B2010-01-06 19:21:43
26c3-3540-en-a_hackers_utopia_iProd.mp4.md574 B2010-01-01 22:20:14
26c3-3657-en-optimised_to_fail_iProd.mp4.md575 B2010-02-09 18:44:08
26c3-3688-de-haste_man_netblock_iProd.mp4.md576 B2010-01-01 22:37:37
26c3-3685-de-im_herz_der_bestie_iProd.mp4.md576 B2010-01-03 09:15:32
26c3-3690-de-ccc-jahresrckblick_iProd.mp4.md576 B2010-01-01 22:38:12
26c3-3494-de-defending_the_poor_iProd.mp4.md576 B2010-01-01 22:12:12
26c3-3490-en-building_a_debugger_iProd.mp4.md577 B2010-01-01 22:11:37
26c3-3710-en-the_lost_cosmonauts_iProd.mp4.md577 B2010-01-01 22:40:40
26c3-3687-de-security_nightmares_iProd.mp4.md577 B2010-01-06 18:35:55
26c3-3266-de-hacking_the_universe_iProd.mp4.md578 B2010-01-03 10:44:47
26c3-3567-en-wikileaks_release_10_iProd.mp4.md578 B2010-01-01 22:22:54
26c3-3550-de-chaos-familien-duell_iProd.mp4.md578 B2010-01-01 22:21:09
26c3-3510-de-technik_des_neuen_epa_iProd.mp4.md579 B2010-01-01 22:15:10
26c3-3509-de-wofr_offenes_internet_iProd.mp4.md579 B2010-01-25 14:05:19
26c3-3711-de-computerspielepolitik_iProd.mp4.md579 B2010-01-01 22:41:21
26c3-3592-de-cybernetic_cannibalism_iProd.mp4.md580 B2010-01-01 22:26:54
26c3-3468-de-privacy_amp_stylometry_iProd.mp4.md580 B2010-01-01 22:10:42
26c3-3644-en-lightning_talks_-_day_3_iProd.mp4.md581 B2010-01-01 22:32:34
26c3-3563-en-lightning_talks_-_day_1_iProd.mp4.md581 B2010-01-06 19:21:32
26c3-3696-en-wireless_power_transfer_iProd.mp4.md581 B2010-01-01 22:38:53
26c3-3642-en-lightning_talks_-_day_2_iProd.mp4.md581 B2010-01-01 22:31:41
26c3-3645-en-lightning_talks_-_day_4_iProd.mp4.md581 B2010-01-03 10:17:13
26c3-3452-en-here_be_electric_dragons_iProd.mp4.md582 B2010-01-01 22:09:44
26c3-3523-de-eine_zensur_findet_statt_iProd.mp4.md582 B2010-01-01 22:16:54
26c3-3596-de-cat_procsysnetipv4fuckups_iProd.mp4.md583 B2010-01-01 22:27:50
26c3-3613-de-fnord-jahresrckblick_2009_iProd.mp4.md583 B2010-01-15 12:46:48
26c3-3725-en-stream_security_nightmares_iProd.mp4.md584 B2010-01-03 09:48:41
26c3-3501-en-why_net_neutrality_matters_iProd.mp4.md584 B2010-01-06 19:06:36
26c3-3691-de-vier_fuste_fr_ein_halleluja_iProd.mp4.md585 B2010-01-25 13:50:14
26c3-3573-en-playing_with_the_built_city_iProd.mp4.md585 B2010-01-01 22:24:00
26c3-3570-en-weaponizing_cultural_viruses_iProd.mp4.md586 B2010-01-01 22:23:31
26c3-3495-de-das_zugangserschwerungsgesetz_iProd.mp4.md587 B2010-01-01 22:12:59
26c3-3709-en-legic_prime_obscurity_in_depth_iProd.mp4.md588 B2010-01-01 22:40:20
26c3-3590-de-europische_biometriestrategien_iProd.mp4.md588 B2010-01-01 22:26:17
26c3-3600-de-location_tracking_does_scale_up_iProd.mp4.md589 B2010-01-01 22:29:03
26c3-3507-de-fuzzing_the_phone_in_your_phone_iProd.mp4.md589 B2010-01-03 11:43:41
26c3-3631-en-finding_the_key_in_the_haystack_iProd.mp4.md589 B2010-01-03 12:20:40
26c3-3504-en-our_darknet_and_its_bright_spots_iProd.mp4.md590 B2010-01-03 02:21:27
26c3-3723-en-stream_fnord-jahresrckblick_2009_iProd.mp4.md590 B2010-01-06 19:07:40
26c3-3713-de-unbild__pictures_and_non-pictures_iProd.mp4.md591 B2010-01-25 14:20:25
26c3-3577-de-privacy-enhanced_event_scheduling_iProd.mp4.md591 B2010-01-01 22:25:06
26c3-3670-en-blackbox_jtag_reverse_engineering_iProd.mp4.md591 B2010-01-03 09:21:41
26c3-3608-en-playing_with_the_gsm_rf_interface_iProd.mp4.md591 B2010-01-15 15:02:58
26c3-3721-de-etsi-vorratsdatenspeicherung_2009_iProd.mp4.md591 B2010-01-01 22:42:23
26c3-3554-de-tor_and_censorship_lessons_learned_iProd.mp4.md592 B2010-01-01 22:22:24
26c3-3647-de-ckan_apt-get_for_the_debian_of_data_iProd.mp4.md593 B2010-01-01 22:33:12
26c3-3672-de-advanced_microcontroller_programming_iProd.mp4.md594 B2010-01-01 22:36:30
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht_iProd.mp4.md594 B2010-01-03 10:12:38
26c3-3557-de-vom_kreationismus_zum_kollektivismus_iProd.mp4.md594 B2010-01-15 10:43:03
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen_iProd.mp4.md596 B2010-01-03 10:40:29
26c3-3340-de-wolpertinger_ein_verteilter_portscanner_iProd.mp4.md597 B2010-01-15 14:17:36
26c3-3353-de-reverse-engineering_displaylink_devices_iProd.mp4.md597 B2010-01-01 22:08:52
26c3-3496-de-fugngernavigation_mit_augmented_reality_iProd.mp4.md597 B2010-01-01 22:13:52
26c3-3579-en-photography_and_the_art_of_doing_it_wrong_iProd.mp4.md599 B2010-01-03 11:43:44
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets_iProd.mp4.md599 B2010-01-01 22:18:04
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd_iProd.mp4.md5100 B2010-01-01 22:29:39
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung_iProd.mp4.md5101 B2010-01-15 09:57:05
26c3-3661-de-coreboot_adding_support_for_a_system_near_you_iProd.mp4.md5103 B2010-01-01 22:35:33
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo_iProd.mp4.md5104 B2010-01-03 10:25:54
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution_iProd.mp4.md5105 B2010-01-01 22:29:59
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering_iProd.mp4.md5106 B2010-01-01 22:39:33
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology_iProd.mp4.md5106 B2010-01-03 09:57:31
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities_iProd.mp4.md5107 B2010-01-01 22:19:09
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht_iProd.mp4.md5107 B2010-01-01 22:37:06
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger_iProd.mp4.md5109 B2010-01-01 22:17:34
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon__iProd.mp4.md5116 B2010-01-01 22:07:35
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem_iProd.mp4.md5118 B2010-01-01 22:24:32
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography_iProd.mp4.md5119 B2010-01-01 22:21:48
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported_iProd.mp4.md5126 B2010-01-01 22:33:37
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems_iProd.mp4.md5131 B2010-01-03 10:26:05
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes_iProd.mp4.md5152 B2010-01-06 18:35:59
26c3-3555-en-sccp_hacking_attacking_the_ss7__sigtran_applications_one_step_further_and_mapping_the_phone_system_iProd.mp4.md5156 B2010-01-15 14:47:54
26c3-3717-en-closing_event_iProd.mp493.7 MiB2010-01-03 12:30:55
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution_iProd.mp4119.3 MiB2009-12-30 10:24:44
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering_iProd.mp4119.5 MiB2009-12-29 15:40:21
26c3-3596-de-cat_procsysnetipv4fuckups_iProd.mp4123.5 MiB2009-12-30 16:50:38
26c3-3608-en-playing_with_the_gsm_rf_interface_iProd.mp4137.9 MiB2010-01-15 14:55:49
26c3-3664-en-homewreckery_iProd.mp4138.5 MiB2010-01-25 12:33:53
26c3-3691-de-vier_fuste_fr_ein_halleluja_iProd.mp4141.1 MiB2010-01-25 13:49:00
26c3-3710-en-the_lost_cosmonauts_iProd.mp4150.5 MiB2009-12-30 10:27:49
26c3-3685-de-im_herz_der_bestie_iProd.mp4150.8 MiB2010-01-03 09:13:38
26c3-3670-en-blackbox_jtag_reverse_engineering_iProd.mp4157.4 MiB2010-01-03 09:20:31
26c3-3302-en-i_internet_iProd.mp4158.0 MiB2009-12-30 10:33:55
26c3-3700-de-here_be_dragons_iProd.mp4159.9 MiB2009-12-30 01:07:57
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported_iProd.mp4160.1 MiB2009-12-30 15:58:17
26c3-3501-en-why_net_neutrality_matters_iProd.mp4160.3 MiB2010-01-06 18:41:49
26c3-3613-de-fnord-jahresrckblick_2009_iProd.mp4166.5 MiB2010-01-15 12:39:35
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung_iProd.mp4167.4 MiB2010-01-15 09:50:58
26c3-3657-en-optimised_to_fail_iProd.mp4167.7 MiB2010-02-09 18:43:45
26c3-3523-de-eine_zensur_findet_statt_iProd.mp4171.1 MiB2009-12-29 15:28:27
26c3-3547-en-after_the_hype_iProd.mp4172.7 MiB2010-01-03 10:29:07
26c3-3631-en-finding_the_key_in_the_haystack_iProd.mp4173.2 MiB2010-01-03 12:19:24
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets_iProd.mp4173.2 MiB2009-12-30 10:19:22
26c3-3579-en-photography_and_the_art_of_doing_it_wrong_iProd.mp4177.6 MiB2010-01-03 11:38:56
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems_iProd.mp4178.7 MiB2010-01-03 10:23:58
26c3-3709-en-legic_prime_obscurity_in_depth_iProd.mp4179.8 MiB2009-12-29 17:36:50
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes_iProd.mp4179.9 MiB2010-01-06 18:34:13
26c3-3688-de-haste_man_netblock_iProd.mp4181.4 MiB2009-12-30 16:52:43
26c3-3648-en-dect_part_ii_iProd.mp4187.5 MiB2010-01-08 09:15:11
26c3-3504-en-our_darknet_and_its_bright_spots_iProd.mp4187.6 MiB2010-01-03 02:20:40
26c3-3567-en-wikileaks_release_10_iProd.mp4187.7 MiB2009-12-29 16:24:26
26c3-3713-de-unbild__pictures_and_non-pictures_iProd.mp4189.7 MiB2010-01-25 14:19:17
26c3-3654-en-gsm_srsly_iProd.mp4189.9 MiB2009-12-29 14:22:13
26c3-3573-en-playing_with_the_built_city_iProd.mp4196.3 MiB2009-12-30 10:30:29
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem_iProd.mp4197.2 MiB2009-12-29 16:27:08
26c3-3490-en-building_a_debugger_iProd.mp4197.7 MiB2009-12-30 13:32:48
26c3-3481-de-leyen-rhetorik_iProd.mp4205.7 MiB2009-12-29 13:48:51
26c3-3555-en-sccp_hacking_attacking_the_ss7__sigtran_applications_one_step_further_and_mapping_the_phone_system_iProd.mp4205.9 MiB2010-01-15 14:40:42
26c3-3577-de-privacy-enhanced_event_scheduling_iProd.mp4206.1 MiB2009-12-30 10:29:30
26c3-3515-de-secubt_iProd.mp4206.1 MiB2009-12-30 16:01:37
26c3-3594-de-internetsperren_iProd.mp4207.1 MiB2009-12-29 14:55:08
26c3-3464-de-liquid_democracy_iProd.mp4209.8 MiB2009-12-29 17:23:52
26c3-3510-de-technik_des_neuen_epa_iProd.mp4214.3 MiB2009-12-30 10:27:21
26c3-3468-de-privacy_amp_stylometry_iProd.mp4215.5 MiB2009-12-29 19:33:55
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht_iProd.mp4219.0 MiB2009-12-30 09:55:28
26c3-3570-en-weaponizing_cultural_viruses_iProd.mp4219.2 MiB2009-12-30 10:35:28
26c3-3554-de-tor_and_censorship_lessons_learned_iProd.mp4219.3 MiB2009-12-29 16:06:15
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd_iProd.mp4220.5 MiB2009-12-30 14:13:46
26c3-3507-de-fuzzing_the_phone_in_your_phone_iProd.mp4220.7 MiB2010-01-03 11:42:29
26c3-3592-de-cybernetic_cannibalism_iProd.mp4226.2 MiB2009-12-29 17:34:39
26c3-3509-de-wofr_offenes_internet_iProd.mp4227.8 MiB2010-01-25 14:04:09
26c3-3647-de-ckan_apt-get_for_the_debian_of_data_iProd.mp4229.1 MiB2009-12-29 23:40:57
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology_iProd.mp4229.8 MiB2010-01-03 09:55:27
26c3-3687-de-security_nightmares_iProd.mp4231.9 MiB2010-01-06 18:33:56
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger_iProd.mp4232.1 MiB2009-12-30 15:54:57
26c3-3690-de-ccc-jahresrckblick_iProd.mp4234.5 MiB2009-12-30 15:59:16
26c3-3494-de-defending_the_poor_iProd.mp4236.2 MiB2009-12-29 22:12:24
26c3-3353-de-reverse-engineering_displaylink_devices_iProd.mp4236.6 MiB2009-12-30 16:00:55
26c3-3557-de-vom_kreationismus_zum_kollektivismus_iProd.mp4250.0 MiB2010-01-15 10:36:50
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography_iProd.mp4255.1 MiB2009-12-29 19:43:01
26c3-3520-en-conlanging_101_iProd.mp4261.6 MiB2010-01-15 15:10:59
26c3-3711-de-computerspielepolitik_iProd.mp4279.0 MiB2009-12-29 16:45:08
26c3-3661-de-coreboot_adding_support_for_a_system_near_you_iProd.mp4279.2 MiB2009-12-29 15:32:10
26c3-3350-en-milkymist_iProd.mp4281.5 MiB2009-12-30 13:26:56
26c3-3340-de-wolpertinger_ein_verteilter_portscanner_iProd.mp4293.2 MiB2010-01-15 14:10:19
26c3-3696-en-wireless_power_transfer_iProd.mp4317.3 MiB2009-12-29 15:41:42
26c3-3495-de-das_zugangserschwerungsgesetz_iProd.mp4324.9 MiB2009-12-29 14:54:25
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon__iProd.mp4331.7 MiB2009-12-30 13:31:35
26c3-3668-en-hacker_jeopardy_iProd.mp4333.2 MiB2010-01-15 11:38:07
26c3-3496-de-fugngernavigation_mit_augmented_reality_iProd.mp4341.9 MiB2009-12-30 10:28:53
26c3-3672-de-advanced_microcontroller_programming_iProd.mp4345.7 MiB2009-12-30 15:55:30
26c3-3644-en-lightning_talks_-_day_3_iProd.mp4347.3 MiB2009-12-30 14:10:20
26c3-3550-de-chaos-familien-duell_iProd.mp4352.3 MiB2009-12-29 14:17:37
26c3-3540-en-a_hackers_utopia_iProd.mp4354.8 MiB2009-12-29 23:36:12
26c3-3669-de-hacker_jeopardy_iProd.mp4371.8 MiB2010-01-15 14:25:34
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo_iProd.mp4378.8 MiB2010-01-03 10:18:50
26c3-3452-en-here_be_electric_dragons_iProd.mp4383.3 MiB2009-12-29 23:39:11
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities_iProd.mp4411.1 MiB2009-12-30 10:17:06
26c3-3658-en-black_ops_of_pki_iProd.mp4417.5 MiB2010-01-06 19:11:27
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht_iProd.mp4418.4 MiB2010-01-03 10:01:04
26c3-3721-de-etsi-vorratsdatenspeicherung_2009_iProd.mp4434.1 MiB2009-12-30 15:59:55
26c3-3590-de-europische_biometriestrategien_iProd.mp4443.3 MiB2009-12-30 10:25:26
26c3-3600-de-location_tracking_does_scale_up_iProd.mp4467.1 MiB2009-12-30 10:23:19
26c3-3563-en-lightning_talks_-_day_1_iProd.mp4480.6 MiB2010-01-06 19:16:43
26c3-3266-de-hacking_the_universe_iProd.mp4484.5 MiB2010-01-03 10:42:39
26c3-3725-en-stream_security_nightmares_iProd.mp4503.7 MiB2010-01-03 09:37:47
26c3-3723-en-stream_fnord-jahresrckblick_2009_iProd.mp4650.9 MiB2010-01-06 18:40:38
26c3-3642-en-lightning_talks_-_day_2_iProd.mp4690.9 MiB2009-12-29 17:39:46
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen_iProd.mp4747.9 MiB2010-01-03 10:35:22
26c3-3645-en-lightning_talks_-_day_4_iProd.mp41.1 GiB2010-01-03 10:15:00