Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/mirrors/pub/cdn.media.ccc.de/congress/2010/mp4-h264-512x288-LQ/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
27c3-4339-en-openleaks_iProd.mp4.md567 B2011-02-06 13:49:14
27c3-4018-en-frozencache_iProd.mp4.md569 B2011-02-06 13:31:41
27c3-4221-en-omg_wtf_pdf_iProd.mp4.md569 B2011-02-06 13:36:57
27c3-4082-en-sap_landscape_iProd.mp4.md571 B2011-01-31 20:29:59
27c3-4299-en-closing_event_iProd.mp4.md571 B2011-01-31 00:26:17
27c3-4234-en-usb_and_libusb_iProd.mp4.md572 B2011-01-31 00:23:25
27c3-4141-de-hacker_jeopardy_iProd.mp4.md573 B2011-02-06 13:34:20
27c3-4176-de-hacking_ibuttons_iProd.mp4.md574 B2011-01-31 00:20:53
27c3-4339-en-openleaks_iProd.mp4.sha175 B2011-02-06 13:49:19
27c3-3957-en-ipv6_insecurities_iProd.mp4.md575 B2011-01-31 20:28:53
27c3-4296-en-lightning_days_d2_iProd.mp4.md575 B2011-02-06 13:48:29
27c3-4326-de-radio_der_zukunft_iProd.mp4.md575 B2011-01-31 20:41:18
27c3-4300-en-lightning_talks_d4_iProd.mp4.md576 B2011-02-06 13:37:40
27c3-4338-de-wikileaks_und_mehr_iProd.mp4.md576 B2011-01-31 20:41:42
27c3-4239-en-lightning_talks_d3_iProd.mp4.md576 B2011-02-06 13:47:22
27c3-4143-en-parttimescientists_iProd.mp4.md576 B2011-01-31 20:35:19
27c3-4174-en-the_hidden_nemesis_iProd.mp4.md576 B2011-02-06 13:46:04
27c3-4183-en-safety_on_open_sea_iProd.mp4.md576 B2011-02-06 13:35:18
27c3-4149-en-i_control_your_code_iProd.mp4.md577 B2011-02-06 13:45:46
27c3-4221-en-omg_wtf_pdf_iProd.mp4.sha177 B2011-02-06 13:37:03
27c3-4253-en-pentanews_game_show_iProd.mp4.md577 B2011-01-31 00:25:29
27c3-4193-en-having_fun_with_rtp_iProd.mp4.md577 B2011-01-31 00:22:40
27c3-4195-de-literarischer_abend_iProd.mp4.md577 B2011-02-06 13:46:22
27c3-4090-en-baseband_apocalypse_iProd.mp4.md577 B2011-02-06 13:44:20
27c3-4123-en-defense_is_not_dead_iProd.mp4.md577 B2011-01-31 20:32:46
27c3-4230-de-security_nightmares_iProd.mp4.md577 B2011-01-31 00:22:59
27c3-4018-en-frozencache_iProd.mp4.sha177 B2011-02-06 13:31:47
27c3-4175-en-from_robot_to_robot_iProd.mp4.md577 B2011-01-31 00:19:35
27c3-4017-en-desktop_on_the_linux_iProd.mp4.md578 B2011-01-31 20:29:16
27c3-4087-en-console_hacking_2010_iProd.mp4.md578 B2011-02-06 13:44:09
27c3-4265-en-hacking_smart_phones_iProd.mp4.md578 B2011-01-31 20:39:48
27c3-4299-en-closing_event_iProd.mp4.sha179 B2011-01-31 00:26:22
27c3-4208-en-wideband_gsm_sniffing_iProd.mp4.md579 B2011-02-06 13:47:00
27c3-4082-en-sap_landscape_iProd.mp4.sha179 B2011-01-31 20:30:18
27c3-4234-en-usb_and_libusb_iProd.mp4.sha180 B2011-01-31 00:23:39
27c3-4070-de-fnord_jahresrueckblick_iProd.mp4.md580 B2011-02-06 13:32:41
27c3-4099-en-file_print_electronics_iProd.mp4.md580 B2011-01-31 20:32:15
27c3-4334-en-fnord_jahresrueckblick_iProd.mp4.md580 B2011-02-06 13:38:49
27c3-4211-en-chip_and_pin_is_broken_iProd.mp4.md580 B2011-02-06 13:36:49
27c3-4210-en-lying_to_the_neighbours_iProd.mp4.md581 B2011-02-06 13:47:09
27c3-4141-de-hacker_jeopardy_iProd.mp4.sha181 B2011-02-06 13:34:33
27c3-4060-en-attacking_mobile_phones_iProd.mp4.md581 B2011-01-31 20:29:36
27c3-4176-de-hacking_ibuttons_iProd.mp4.sha182 B2011-01-31 00:21:11
27c3-4094-de-netzneutralitaet_und_qos_iProd.mp4.md582 B2011-01-31 00:16:07
27c3-4261-en-key_recovery_attacks_rc4_iProd.mp4.md582 B2011-01-31 00:26:06
27c3-4190-en-data_retention_in_the_eu_iProd.mp4.md582 B2011-01-31 00:22:09
27c3-4326-de-radio_der_zukunft_iProd.mp4.sha183 B2011-01-31 20:41:28
27c3-3957-en-ipv6_insecurities_iProd.mp4.sha183 B2011-01-31 20:29:03
27c3-4296-en-lightning_days_d2_iProd.mp4.sha183 B2011-02-06 13:48:36
27c3-4046-en-all_colours_are_beautiful_iProd.mp4.md583 B2011-01-31 00:15:22
27c3-4298-de-ccc_jahresrueckblick_2010_iProd.mp4.md583 B2011-01-31 20:40:59
27c3-4300-en-lightning_talks_d4_iProd.mp4.sha184 B2011-02-06 13:38:02
27c3-4174-en-the_hidden_nemesis_iProd.mp4.sha184 B2011-02-06 13:46:09
27c3-4164-de-friede_sei_mit_euren_daten_iProd.mp4.md584 B2011-01-31 00:17:36
27c3-4143-en-parttimescientists_iProd.mp4.sha184 B2011-01-31 20:35:30
27c3-4239-en-lightning_talks_d3_iProd.mp4.sha184 B2011-02-06 13:47:31
27c3-4003-en-cybernetics_for_the_masses_iProd.mp4.md584 B2011-02-06 13:31:24
27c3-4338-de-wikileaks_und_mehr_iProd.mp4.sha184 B2011-01-31 20:41:50
27c3-4183-en-safety_on_open_sea_iProd.mp4.sha184 B2011-02-06 13:35:29
27c3-4149-en-i_control_your_code_iProd.mp4.sha185 B2011-02-06 13:45:53
27c3-4123-en-defense_is_not_dead_iProd.mp4.sha185 B2011-01-31 20:33:03
27c3-4175-en-from_robot_to_robot_iProd.mp4.sha185 B2011-01-31 00:19:53
27c3-4142-en-nodejs_as_a_networking_tool_iProd.mp4.md585 B2011-02-06 13:45:22
27c3-4090-en-baseband_apocalypse_iProd.mp4.sha185 B2011-02-06 13:44:28
27c3-4230-de-security_nightmares_iProd.mp4.sha185 B2011-01-31 00:23:07
27c3-4193-en-having_fun_with_rtp_iProd.mp4.sha185 B2011-01-31 00:22:44
27c3-4253-en-pentanews_game_show_iProd.mp4.sha185 B2011-01-31 00:25:43
27c3-4195-de-literarischer_abend_iProd.mp4.sha185 B2011-02-06 13:46:27
27c3-4333-en-hacker_jeopardy_translation_iProd.mp4.md585 B2011-02-06 13:38:22
27c3-4159-en-reverse_engineering_mos_6502_iProd.mp4.md586 B2011-01-31 20:37:19
27c3-4181-en-sip_home_gateways_under_fire_iProd.mp4.md586 B2011-02-06 13:46:15
27c3-4087-en-console_hacking_2010_iProd.mp4.sha186 B2011-02-06 13:44:11
27c3-4011-en-embedded_reverse_engineering_iProd.mp4.md586 B2011-01-31 00:15:00
27c3-4017-en-desktop_on_the_linux_iProd.mp4.sha186 B2011-01-31 20:29:26
27c3-4085-de-digitale_spaltung_per_gesetz_iProd.mp4.md586 B2011-02-06 13:33:00
27c3-3983-en-hackers_and_computer_science_iProd.mp4.md586 B2011-02-06 13:31:12
27c3-4206-en-immi_from_concept_to_reality_iProd.mp4.md586 B2011-02-06 13:36:05
27c3-4265-en-hacking_smart_phones_iProd.mp4.sha186 B2011-01-31 20:40:00
27c3-4208-en-wideband_gsm_sniffing_iProd.mp4.sha187 B2011-02-06 13:47:04
27c3-4302-en-27c3_keynote_we_come_in_peace_iProd.mp4.md587 B2011-01-14 18:58:36
27c3-4121-en-is_the_ssliverse_a_safe_place_iProd.mp4.md587 B2011-02-06 13:44:40
27c3-4061-en-building_custom_disassemblers_iProd.mp4.md587 B2011-02-06 13:43:26
27c3-4125-de-spinning_the_electronic_wheel_iProd.mp4.md587 B2011-02-06 13:44:56
27c3-4184-de-stanislaw_lem_weltverbesserer_iProd.mp4.md587 B2011-01-31 20:39:02
27c3-4334-en-fnord_jahresrueckblick_iProd.mp4.sha188 B2011-02-06 13:38:58
27c3-4297-de-die_gesamte_technik_ist_sicher_iProd.mp4.md588 B2011-01-31 20:40:33
27c3-4111-de-eins_zwei_drei_alle_sind_dabei_iProd.mp4.md588 B2011-01-31 00:17:01
27c3-4237-en-indect_eu_surveillance_project_iProd.mp4.md588 B2011-02-06 13:37:12
27c3-4211-en-chip_and_pin_is_broken_iProd.mp4.sha188 B2011-02-06 13:36:52
27c3-4099-en-file_print_electronics_iProd.mp4.sha188 B2011-01-31 20:32:26
27c3-4070-de-fnord_jahresrueckblick_iProd.mp4.sha188 B2011-02-06 13:32:46
27c3-4060-en-attacking_mobile_phones_iProd.mp4.sha189 B2011-01-31 20:29:40
27c3-4245-en-adventures_in_analyzing_stuxnet_iProd.mp4.md589 B2011-02-06 13:47:53
27c3-4185-de-whistleblowing_licht_ins_dunkel_iProd.mp4.md589 B2011-01-31 00:21:42
27c3-4210-en-lying_to_the_neighbours_iProd.mp4.sha189 B2011-02-06 13:47:13
27c3-4261-en-key_recovery_attacks_rc4_iProd.mp4.sha190 B2011-01-31 00:26:12
27c3-4236-en-international_cyber_jurisdiction_iProd.mp4.md590 B2011-01-31 00:24:03
27c3-4190-en-data_retention_in_the_eu_iProd.mp4.sha190 B2011-01-31 00:22:20
27c3-4276-en-cognitive_psychology_for_hackers_iProd.mp4.md590 B2011-02-06 13:48:16
27c3-4094-de-netzneutralitaet_und_qos_iProd.mp4.sha190 B2011-01-31 00:16:19
27c3-4073-de-logikschaltungen_ohne_elektronik_iProd.mp4.md590 B2011-02-06 13:43:37
27c3-4231-en-datenrettung_fun_with_hard_drives_iProd.mp4.md591 B2011-01-31 20:39:25
27c3-4298-de-ccc_jahresrueckblick_2010_iProd.mp4.sha191 B2011-01-31 20:41:08
27c3-4046-en-all_colours_are_beautiful_iProd.mp4.sha191 B2011-01-31 00:15:31
27c3-4244-en-critical_overview_of_10_years_pet_iProd.mp4.md591 B2011-02-06 13:47:43
27c3-4187-en-your_infrastructure_will_kill_you_iProd.mp4.md591 B2011-02-06 13:35:40
27c3-4164-de-friede_sei_mit_euren_daten_iProd.mp4.sha192 B2011-01-31 00:17:52
27c3-4003-en-cybernetics_for_the_masses_iProd.mp4.sha192 B2011-02-06 13:31:32
27c3-4096-en-code_deobfuscation_by_optimization_iProd.mp4.md592 B2011-01-31 20:31:34
27c3-4140-en-contemporary_profiling_of_web_users_iProd.mp4.md593 B2011-01-31 20:34:07
27c3-4142-en-nodejs_as_a_networking_tool_iProd.mp4.sha193 B2011-02-06 13:45:26
27c3-4145-en-spoilers_human_interfaces_airplanes_iProd.mp4.md593 B2011-01-31 20:36:03
27c3-4333-en-hacker_jeopardy_translation_iProd.mp4.sha193 B2011-02-06 13:38:33
27c3-4085-de-digitale_spaltung_per_gesetz_iProd.mp4.sha194 B2011-02-06 13:33:16
27c3-3983-en-hackers_and_computer_science_iProd.mp4.sha194 B2011-02-06 13:31:16
27c3-4144-en-short_political_history_of_acoustics_iProd.mp4.md594 B2011-02-06 13:45:31
27c3-4181-en-sip_home_gateways_under_fire_iProd.mp4.sha194 B2011-02-06 13:46:17
27c3-4301-en-flow_analysis_of_internet_activities_iProd.mp4.md594 B2011-01-31 00:26:30
27c3-4159-en-reverse_engineering_mos_6502_iProd.mp4.sha194 B2011-01-31 20:37:27
27c3-4011-en-embedded_reverse_engineering_iProd.mp4.sha194 B2011-01-31 00:15:08
27c3-4206-en-immi_from_concept_to_reality_iProd.mp4.sha194 B2011-02-06 13:36:08
27c3-4151-en-android_geolocation_using_gsm_network_iProd.mp4.md595 B2011-02-06 13:34:53
27c3-4302-en-27c3_keynote_we_come_in_peace_iProd.mp4.sha195 B2011-01-14 18:58:40
27c3-4121-en-is_the_ssliverse_a_safe_place_iProd.mp4.sha195 B2011-02-06 13:44:46
27c3-4061-en-building_custom_disassemblers_iProd.mp4.sha195 B2011-02-06 13:43:30
27c3-4006-en-diy_synthesizers_and_sound_generators_iProd.mp4.md595 B2011-02-06 13:42:56
27c3-4184-de-stanislaw_lem_weltverbesserer_iProd.mp4.sha195 B2011-01-31 20:39:08
27c3-4125-de-spinning_the_electronic_wheel_iProd.mp4.sha195 B2011-02-06 13:45:01
27c3-4295-en-high_speed_high_security_cryptography_iProd.mp4.md595 B2011-01-31 20:40:19
27c3-4103-en-copyright_enforcement_versus_freedoms_iProd.mp4.md595 B2011-01-31 00:16:35
27c3-4081-de-netzmedienrecht_lobbyismus_korruption_iProd.mp4.md595 B2011-02-06 13:43:49
27c3-4297-de-die_gesamte_technik_ist_sicher_iProd.mp4.sha196 B2011-01-31 20:40:43
27c3-4237-en-indect_eu_surveillance_project_iProd.mp4.sha196 B2011-02-06 13:37:25
27c3-4111-de-eins_zwei_drei_alle_sind_dabei_iProd.mp4.sha196 B2011-01-31 00:17:08
27c3-4245-en-adventures_in_analyzing_stuxnet_iProd.mp4.sha197 B2011-02-06 13:47:56
27c3-4097-de-identifizierung_von_netzwerkprotokollen_iProd.mp4.md597 B2011-01-31 20:31:51
27c3-4185-de-whistleblowing_licht_ins_dunkel_iProd.mp4.sha197 B2011-01-31 00:21:54
27c3-4276-en-cognitive_psychology_for_hackers_iProd.mp4.sha198 B2011-02-06 13:48:21
27c3-4073-de-logikschaltungen_ohne_elektronik_iProd.mp4.sha198 B2011-02-06 13:43:41
27c3-4098-en-tor_is_peace_software_freedom_is_slavery_iProd.mp4.md598 B2011-02-06 13:33:32
27c3-4236-en-international_cyber_jurisdiction_iProd.mp4.sha198 B2011-01-31 00:24:17
27c3-4231-en-datenrettung_fun_with_hard_drives_iProd.mp4.sha199 B2011-01-31 20:39:32
27c3-4244-en-critical_overview_of_10_years_pet_iProd.mp4.sha199 B2011-02-06 13:47:47
27c3-4187-en-your_infrastructure_will_kill_you_iProd.mp4.sha199 B2011-02-06 13:35:54
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic_iProd.mp4.md599 B2011-01-31 00:15:39
27c3-4096-en-code_deobfuscation_by_optimization_iProd.mp4.sha1100 B2011-01-31 20:31:40
27c3-4145-en-spoilers_human_interfaces_airplanes_iProd.mp4.sha1101 B2011-01-31 20:36:20
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050_iProd.mp4.md5101 B2011-01-31 20:33:27
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem_iProd.mp4.md5101 B2011-02-06 13:33:51
27c3-4140-en-contemporary_profiling_of_web_users_iProd.mp4.sha1101 B2011-01-31 20:34:27
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet_iProd.mp4.md5101 B2011-01-31 00:24:57
27c3-4263-en-resisting_excessive_government_surveillance_iProd.mp4.md5101 B2011-02-06 13:48:02
27c3-4057-en-adventures_in_mapping_afghanistan_elections_iProd.mp4.md5101 B2011-02-06 13:43:17
27c3-4144-en-short_political_history_of_acoustics_iProd.mp4.sha1102 B2011-02-06 13:45:36
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace_iProd.mp4.md5102 B2011-02-06 13:44:04
27c3-4301-en-flow_analysis_of_internet_activities_iProd.mp4.sha1102 B2011-01-31 00:26:37
27c3-4006-en-diy_synthesizers_and_sound_generators_iProd.mp4.sha1103 B2011-02-06 13:42:59
27c3-4081-de-netzmedienrecht_lobbyismus_korruption_iProd.mp4.sha1103 B2011-02-06 13:43:56
27c3-4103-en-copyright_enforcement_versus_freedoms_iProd.mp4.sha1103 B2011-01-31 00:16:43
27c3-4295-en-high_speed_high_security_cryptography_iProd.mp4.sha1103 B2011-01-31 20:40:25
27c3-4151-en-android_geolocation_using_gsm_network_iProd.mp4.sha1103 B2011-02-06 13:35:03
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden_iProd.mp4.md5104 B2011-01-31 20:31:08
27c3-4097-de-identifizierung_von_netzwerkprotokollen_iProd.mp4.sha1105 B2011-01-31 20:32:01
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb_iProd.mp4.md5105 B2011-02-06 13:31:05
27c3-4098-en-tor_is_peace_software_freedom_is_slavery_iProd.mp4.sha1106 B2011-02-06 13:33:41
27c3-4168-en-automated_architecture_independent_gadget_search_iProd.mp4.md5106 B2011-01-31 00:18:53
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses_iProd.mp4.md5106 B2011-02-06 13:46:47
27c3-4160-en-automatic_identification_cryptographic_primitives_iProd.mp4.md5107 B2011-01-31 20:37:48
27c3-4055-en-terrorists_win_exploiting_telecommunications_data_iProd.mp4.md5107 B2011-02-06 13:43:04
27c3-4138-en-secure_communications_below_the_hearing_threshold_iProd.mp4.md5107 B2011-02-06 13:45:09
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic_iProd.mp4.sha1107 B2011-01-31 00:15:47
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis_iProd.mp4.md5108 B2011-02-06 13:36:20
27c3-4263-en-resisting_excessive_government_surveillance_iProd.mp4.sha1109 B2011-02-06 13:48:08
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet_iProd.mp4.sha1109 B2011-01-31 00:25:05
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture_iProd.mp4.md5109 B2011-02-06 13:46:34
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem_iProd.mp4.sha1109 B2011-02-06 13:34:01
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050_iProd.mp4.sha1109 B2011-01-31 20:33:41
27c3-4057-en-adventures_in_mapping_afghanistan_elections_iProd.mp4.sha1109 B2011-02-06 13:43:20
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system_iProd.mp4.md5109 B2011-02-06 13:32:00
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace_iProd.mp4.sha1110 B2011-02-06 13:44:06
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden_iProd.mp4.sha1112 B2011-01-31 20:31:18
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb_iProd.mp4.sha1113 B2011-02-06 13:31:08
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses_iProd.mp4.sha1114 B2011-02-06 13:46:52
27c3-4168-en-automated_architecture_independent_gadget_search_iProd.mp4.sha1114 B2011-01-31 00:19:07
27c3-4055-en-terrorists_win_exploiting_telecommunications_data_iProd.mp4.sha1115 B2011-02-06 13:43:10
27c3-4138-en-secure_communications_below_the_hearing_threshold_iProd.mp4.sha1115 B2011-02-06 13:45:15
27c3-4160-en-automatic_identification_cryptographic_primitives_iProd.mp4.sha1115 B2011-01-31 20:38:15
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis_iProd.mp4.sha1116 B2011-02-06 13:36:33
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system_iProd.mp4.sha1117 B2011-02-06 13:32:23
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture_iProd.mp4.sha1117 B2011-02-06 13:46:39
27c3.mp4.iProd.all.md58.1 KiB2011-02-08 22:34:20
27c3.mp4.iProd.all.sha18.8 KiB2011-02-08 22:34:29
27c3-4299-en-closing_event_iProd.mp471.1 MiB2011-01-30 20:02:31
27c3-4087-en-console_hacking_2010_iProd.mp496.4 MiB2011-02-06 13:32:37
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace_iProd.mp4108.4 MiB2011-02-06 13:33:57
27c3-4181-en-sip_home_gateways_under_fire_iProd.mp4114.6 MiB2011-02-06 13:33:14
27c3-4006-en-diy_synthesizers_and_sound_generators_iProd.mp4127.2 MiB2011-02-06 13:32:55
27c3-4221-en-omg_wtf_pdf_iProd.mp4135.3 MiB2011-02-06 13:16:39
27c3-4159-en-reverse_engineering_mos_6502_iProd.mp4140.7 MiB2011-01-31 18:41:13
27c3-4302-en-27c3_keynote_we_come_in_peace_iProd.mp4141.0 MiB2011-01-14 18:55:55
27c3-4060-en-attacking_mobile_phones_iProd.mp4143.9 MiB2011-01-31 12:20:24
27c3-4099-en-file_print_electronics_iProd.mp4144.9 MiB2011-01-31 18:28:04
27c3-4261-en-key_recovery_attacks_rc4_iProd.mp4146.0 MiB2011-01-30 20:25:29
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb_iProd.mp4151.9 MiB2011-02-06 13:15:40
27c3-4295-en-high_speed_high_security_cryptography_iProd.mp4156.3 MiB2011-01-31 13:11:12
27c3-4142-en-nodejs_as_a_networking_tool_iProd.mp4156.9 MiB2011-02-06 13:40:50
27c3-4168-en-automated_architecture_independent_gadget_search_iProd.mp4160.2 MiB2011-01-30 22:41:45
27c3-4245-en-adventures_in_analyzing_stuxnet_iProd.mp4162.7 MiB2011-02-06 13:42:21
27c3-4193-en-having_fun_with_rtp_iProd.mp4162.8 MiB2011-01-30 20:03:31
27c3-4301-en-flow_analysis_of_internet_activities_iProd.mp4169.3 MiB2011-01-30 22:43:59
27c3-4057-en-adventures_in_mapping_afghanistan_elections_iProd.mp4170.2 MiB2011-02-06 13:36:46
27c3-4211-en-chip_and_pin_is_broken_iProd.mp4170.2 MiB2011-02-06 13:18:26
27c3-4143-en-parttimescientists_iProd.mp4171.9 MiB2011-01-31 12:40:10
27c3-4185-de-whistleblowing_licht_ins_dunkel_iProd.mp4175.3 MiB2011-01-30 23:45:50
27c3-4206-en-immi_from_concept_to_reality_iProd.mp4177.4 MiB2011-02-06 13:21:07
27c3-4103-en-copyright_enforcement_versus_freedoms_iProd.mp4180.1 MiB2011-01-30 23:33:08
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050_iProd.mp4181.9 MiB2011-01-31 18:45:02
27c3-4190-en-data_retention_in_the_eu_iProd.mp4184.1 MiB2011-01-31 00:03:11
27c3-4208-en-wideband_gsm_sniffing_iProd.mp4185.5 MiB2011-02-06 13:40:10
27c3-4003-en-cybernetics_for_the_masses_iProd.mp4188.9 MiB2011-02-06 13:26:09
27c3-4210-en-lying_to_the_neighbours_iProd.mp4189.5 MiB2011-02-06 13:41:06
27c3-3983-en-hackers_and_computer_science_iProd.mp4190.8 MiB2011-02-06 13:25:53
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet_iProd.mp4198.2 MiB2011-01-30 23:30:18
27c3-4297-de-die_gesamte_technik_ist_sicher_iProd.mp4200.0 MiB2011-01-31 12:30:28
27c3-4338-de-wikileaks_und_mehr_iProd.mp4201.5 MiB2011-01-31 18:35:24
27c3-4073-de-logikschaltungen_ohne_elektronik_iProd.mp4202.5 MiB2011-02-06 13:39:56
27c3-4334-en-fnord_jahresrueckblick_iProd.mp4202.7 MiB2011-02-06 13:18:11
27c3-4070-de-fnord_jahresrueckblick_iProd.mp4202.8 MiB2011-02-06 13:15:58
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic_iProd.mp4203.2 MiB2011-01-30 22:34:42
27c3-4230-de-security_nightmares_iProd.mp4203.2 MiB2011-01-30 22:23:01
27c3-4184-de-stanislaw_lem_weltverbesserer_iProd.mp4203.5 MiB2011-01-31 18:21:36
27c3-4175-en-from_robot_to_robot_iProd.mp4206.4 MiB2011-01-30 23:40:37
27c3-4244-en-critical_overview_of_10_years_pet_iProd.mp4208.2 MiB2011-02-06 13:34:17
27c3-4046-en-all_colours_are_beautiful_iProd.mp4211.6 MiB2011-01-30 23:58:45
27c3-4096-en-code_deobfuscation_by_optimization_iProd.mp4211.9 MiB2011-01-31 12:12:30
27c3-4061-en-building_custom_disassemblers_iProd.mp4229.8 MiB2011-02-06 13:38:25
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden_iProd.mp4232.4 MiB2011-01-31 12:55:15
27c3-4144-en-short_political_history_of_acoustics_iProd.mp4234.1 MiB2011-02-06 13:39:40
27c3-4098-en-tor_is_peace_software_freedom_is_slavery_iProd.mp4235.3 MiB2011-02-06 13:26:26
27c3-4174-en-the_hidden_nemesis_iProd.mp4236.7 MiB2011-02-06 13:36:28
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture_iProd.mp4237.9 MiB2011-02-06 13:38:01
27c3-4017-en-desktop_on_the_linux_iProd.mp4240.0 MiB2011-01-31 12:26:19
27c3-4097-de-identifizierung_von_netzwerkprotokollen_iProd.mp4242.0 MiB2011-01-31 18:56:59
27c3-3957-en-ipv6_insecurities_iProd.mp4243.6 MiB2011-01-31 12:28:20
27c3-4276-en-cognitive_psychology_for_hackers_iProd.mp4248.8 MiB2011-02-06 13:33:39
27c3-4011-en-embedded_reverse_engineering_iProd.mp4249.3 MiB2011-01-30 23:42:38
27c3-4326-de-radio_der_zukunft_iProd.mp4249.9 MiB2011-01-31 12:52:17
27c3-4298-de-ccc_jahresrueckblick_2010_iProd.mp4254.6 MiB2011-01-31 13:01:53
27c3-4253-en-pentanews_game_show_iProd.mp4257.3 MiB2011-01-30 19:54:47
27c3-4018-en-frozencache_iProd.mp4259.8 MiB2011-02-06 13:16:58
27c3-4195-de-literarischer_abend_iProd.mp4261.7 MiB2011-02-06 13:39:22
27c3-4125-de-spinning_the_electronic_wheel_iProd.mp4266.5 MiB2011-02-06 13:42:07
27c3-4339-en-openleaks_iProd.mp4277.6 MiB2011-02-06 13:49:02
27c3-4176-de-hacking_ibuttons_iProd.mp4278.2 MiB2011-01-31 00:02:55
27c3-4094-de-netzneutralitaet_und_qos_iProd.mp4278.5 MiB2011-01-30 23:56:43
27c3-4237-en-indect_eu_surveillance_project_iProd.mp4285.1 MiB2011-02-06 13:19:41
27c3-4138-en-secure_communications_below_the_hearing_threshold_iProd.mp4288.8 MiB2011-02-06 13:36:01
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses_iProd.mp4292.7 MiB2011-02-06 13:41:48
27c3-4111-de-eins_zwei_drei_alle_sind_dabei_iProd.mp4293.4 MiB2011-01-30 23:49:03
27c3-4055-en-terrorists_win_exploiting_telecommunications_data_iProd.mp4293.9 MiB2011-02-06 13:32:20
27c3-4263-en-resisting_excessive_government_surveillance_iProd.mp4298.9 MiB2011-02-06 13:35:26
27c3-4123-en-defense_is_not_dead_iProd.mp4303.6 MiB2011-01-31 12:45:29
27c3-4183-en-safety_on_open_sea_iProd.mp4308.4 MiB2011-02-06 13:15:22
27c3-4187-en-your_infrastructure_will_kill_you_iProd.mp4314.4 MiB2011-02-06 13:20:03
27c3-4164-de-friede_sei_mit_euren_daten_iProd.mp4317.0 MiB2011-01-30 23:54:17
27c3-4231-en-datenrettung_fun_with_hard_drives_iProd.mp4323.7 MiB2011-01-31 13:06:20
27c3-4296-en-lightning_days_d2_iProd.mp4324.0 MiB2011-02-06 13:41:27
27c3-4121-en-is_the_ssliverse_a_safe_place_iProd.mp4325.3 MiB2011-02-06 13:31:43
27c3-4140-en-contemporary_profiling_of_web_users_iProd.mp4332.3 MiB2011-01-31 12:15:24
27c3-4265-en-hacking_smart_phones_iProd.mp4341.1 MiB2011-01-31 12:23:33
27c3-4234-en-usb_and_libusb_iProd.mp4344.7 MiB2011-01-30 23:50:41
27c3-4081-de-netzmedienrecht_lobbyismus_korruption_iProd.mp4348.3 MiB2011-02-06 13:39:01
27c3-4236-en-international_cyber_jurisdiction_iProd.mp4359.0 MiB2011-01-30 23:23:59
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem_iProd.mp4366.9 MiB2011-02-06 13:20:52
27c3-4151-en-android_geolocation_using_gsm_network_iProd.mp4375.2 MiB2011-02-06 13:20:27
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system_iProd.mp4382.5 MiB2011-02-06 13:19:21
27c3-4149-en-i_control_your_code_iProd.mp4383.6 MiB2011-02-06 13:40:35
27c3-4160-en-automatic_identification_cryptographic_primitives_iProd.mp4415.8 MiB2011-01-31 12:18:35
27c3-4090-en-baseband_apocalypse_iProd.mp4417.2 MiB2011-02-06 13:37:32
27c3-4145-en-spoilers_human_interfaces_airplanes_iProd.mp4417.7 MiB2011-01-31 20:18:34
27c3-4239-en-lightning_talks_d3_iProd.mp4426.7 MiB2011-02-06 13:34:58
27c3-4333-en-hacker_jeopardy_translation_iProd.mp4451.1 MiB2011-02-06 13:17:26
27c3-4141-de-hacker_jeopardy_iProd.mp4451.9 MiB2011-02-06 13:16:25
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis_iProd.mp4453.4 MiB2011-02-06 13:17:54
27c3-4085-de-digitale_spaltung_per_gesetz_iProd.mp4509.0 MiB2011-02-06 13:18:56
27c3-4300-en-lightning_talks_d4_iProd.mp4516.8 MiB2011-02-06 13:25:38
27c3-4082-en-sap_landscape_iProd.mp4544.4 MiB2011-01-31 18:15:37