Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https and ftp. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /mirrors/mirrors/pub/cdn.media.ccc.de/congress/2010/webm/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
27c3-4070-de-fnord_jahresrueckblick.webm.txt339 B2011-01-13 23:20:27
27c3-4253-en-pentanews_game_show.webm.txt311 B2011-01-18 22:41:16
27c3-4103-en-copyright_enforcement_versus_freedoms.webm.txt335 B2011-01-30 18:24:40
27c3-4096-en-code_deobfuscation_by_optimization.webm.txt332 B2011-01-30 18:32:18
27c3-4175-en-from_robot_to_robot.webm.txt314 B2011-01-30 18:40:18
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.webm.txt346 B2011-01-30 18:54:55
27c3-4140-en-contemporary_profiling_of_web_users.webm.txt338 B2011-01-30 19:02:15
27c3-4185-de-whistleblowing_licht_ins_dunkel.webm.txt334 B2011-01-30 19:09:16
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.webm.txt337 B2011-01-30 19:15:33
27c3-4164-de-friede_sei_mit_euren_daten.webm.txt320 B2011-01-30 19:26:07
27c3-4094-de-netzneutralitaet_und_qos.webm.txt370 B2011-01-30 19:44:10
27c3-4265-en-hacking_smart_phones.webm.txt318 B2011-01-30 19:50:18
27c3-4297-de-die_gesamte_technik_ist_sicher.webm.txt341 B2011-01-30 19:55:40
27c3-4299-en-closing_event.webm.txt306 B2011-01-30 20:01:23
27c3-4017-en-desktop_on_the_linux.webm.txt334 B2011-01-30 20:08:33
27c3-4193-en-having_fun_with_rtp.webm.txt307 B2011-01-30 20:23:52
27c3-4261-en-key_recovery_attacks_rc4.webm.txt332 B2011-01-30 20:26:53
27c3-4230-de-security_nightmares.webm.txt317 B2011-01-30 22:21:36
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.webm.txt333 B2011-01-30 22:36:24
27c3-4168-en-automated_architecture_independent_gadget_search.webm.txt351 B2011-01-30 22:40:48
27c3-3957-en-ipv6_insecurities.webm.txt326 B2011-01-30 22:42:18
27c3-4011-en-embedded_reverse_engineering.webm.txt370 B2011-01-30 22:45:32
27c3-4301-en-flow_analysis_of_internet_activities.webm.txt319 B2011-01-30 22:53:27
27c3-4160-en-automatic_identification_cryptographic_primitives.webm.txt359 B2011-01-30 22:54:14
27c3-4046-en-all_colours_are_beautiful.webm.txt325 B2011-01-30 22:58:21
27c3-4190-en-data_retention_in_the_eu.webm.txt396 B2011-01-30 23:20:04
27c3-4234-en-usb_and_libusb.webm.txt306 B2011-01-30 23:20:47
27c3-4176-de-hacking_ibuttons.webm.txt313 B2011-01-30 23:21:43
27c3-4060-en-attacking_mobile_phones.webm.txt319 B2011-01-30 23:22:02
27c3-4236-en-international_cyber_jurisdiction.webm.txt323 B2011-01-30 23:23:34
27c3-4018-en-frozencache.webm.txt305 B2011-01-30 23:34:12
27c3-4221-en-omg_wtf_pdf.webm.txt302 B2011-01-30 23:36:12
27c3-4300-en-lightning_talks_d4.webm.txt315 B2011-01-30 23:48:42
27c3-4003-en-cybernetics_for_the_masses.webm.txt319 B2011-01-30 23:54:50
27c3-3983-en-hackers_and_computer_science.webm.txt315 B2011-01-30 23:56:06
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.webm.txt338 B2011-01-30 23:58:07
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.webm.txt345 B2011-01-30 23:59:31
27c3-4334-en-fnord_jahresrueckblick.webm.txt361 B2011-01-31 00:00:17
27c3-4141-de-hacker_jeopardy.webm.txt318 B2011-01-31 00:01:37
27c3-4333-en-hacker_jeopardy_translation.webm.txt340 B2011-01-31 00:02:35
27c3-4237-en-indect_eu_surveillance_project.webm.txt330 B2011-01-31 00:03:52
27c3-4187-en-your_infrastructure_will_kill_you.webm.txt328 B2011-01-31 00:05:00
27c3-4211-en-chip_and_pin_is_broken.webm.txt320 B2011-01-31 00:06:04
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.webm.txt345 B2011-01-31 00:08:21
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.webm.txt345 B2011-01-31 00:09:18
27c3-4245-en-adventures_in_analyzing_stuxnet.webm.txt336 B2011-01-31 00:10:36
27c3-4125-de-spinning_the_electronic_wheel.webm.txt325 B2011-01-31 00:12:34
27c3-4143-en-parttimescientists.webm.txt330 B2011-01-31 12:41:53
27c3-4123-en-defense_is_not_dead.webm.txt312 B2011-01-31 12:44:16
27c3-4326-de-radio_der_zukunft.webm.txt362 B2011-01-31 12:50:44
27c3-4298-de-ccc_jahresrueckblick_2010.webm.txt368 B2011-01-31 13:00:26
27c3-4231-en-datenrettung_fun_with_hard_drives.webm.txt317 B2011-01-31 13:04:45
27c3-4295-en-high_speed_high_security_cryptography.webm.txt387 B2011-01-31 13:08:46
27c3-4082-en-sap_landscape.webm.txt336 B2011-01-31 18:11:33
27c3-4184-de-stanislaw_lem_weltverbesserer.webm.txt431 B2011-01-31 18:20:20
27c3-4099-en-file_print_electronics.webm.txt319 B2011-01-31 18:25:59
27c3-4338-de-wikileaks_und_mehr.webm.txt311 B2011-01-31 18:33:00
27c3-4339-en-openleaks.webm.txt311 B2011-01-31 18:36:12
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.webm.txt346 B2011-01-31 18:38:07
27c3-4159-en-reverse_engineering_mos_6502.webm.txt330 B2011-01-31 18:39:25
27c3-4085-de-digitale_spaltung_per_gesetz.webm.txt353 B2011-01-31 18:41:00
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.webm.txt346 B2011-01-31 18:50:01
27c3-4151-en-android_geolocation_using_gsm_network.webm.txt333 B2011-01-31 18:53:18
27c3-4097-de-identifizierung_von_netzwerkprotokollen.webm.txt350 B2011-01-31 18:54:18
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.webm.txt354 B2011-01-31 18:56:14
27c3-4206-en-immi_from_concept_to_reality.webm.txt330 B2011-01-31 19:04:26
27c3-4183-en-safety_on_open_sea.webm.txt319 B2011-01-31 19:09:07
27c3-4006-en-diy_synthesizers_and_sound_generators.webm.txt327 B2011-01-31 19:10:05
27c3-4087-en-console_hacking_2010.webm.txt322 B2011-01-31 19:22:23
27c3-4149-en-i_control_your_code.webm.txt313 B2011-01-31 19:24:20
27c3-4208-en-wideband_gsm_sniffing.webm.txt330 B2011-01-31 19:26:06
27c3-4142-en-nodejs_as_a_networking_tool.webm.txt328 B2011-01-31 19:28:58
27c3-4210-en-lying_to_the_neighbours.webm.txt309 B2011-01-31 19:34:45
27c3-4073-de-logikschaltungen_ohne_elektronik.webm.txt323 B2011-01-31 19:43:33
27c3-4121-en-is_the_ssliverse_a_safe_place.webm.txt333 B2011-01-31 19:52:30
27c3-4061-en-building_custom_disassemblers.webm.txt325 B2011-01-31 19:53:30
27c3-4195-de-literarischer_abend.webm.txt319 B2011-01-31 19:55:19
27c3-4081-de-netzmedienrecht_lobbyismus_korruption.webm.txt336 B2011-01-31 19:57:33
27c3-4144-en-short_political_history_of_acoustics.webm.txt333 B2011-01-31 19:59:03
27c3-4090-en-baseband_apocalypse.webm.txt325 B2011-01-31 20:00:24
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.webm.txt336 B2011-01-31 20:09:23
27c3-4057-en-adventures_in_mapping_afghanistan_elections.webm.txt335 B2011-01-31 20:10:49
27c3-4263-en-resisting_excessive_government_surveillance.webm.txt358 B2011-01-31 20:12:02
27c3-4244-en-critical_overview_of_10_years_pet.webm.txt350 B2011-01-31 20:13:03
27c3-4174-en-the_hidden_nemesis.webm.txt320 B2011-01-31 20:14:04
27c3-4138-en-secure_communications_below_the_hearing_threshold.webm.txt361 B2011-01-31 20:17:03
27c3-4145-en-spoilers_human_interfaces_airplanes.webm.txt352 B2011-01-31 20:18:09
27c3-4239-en-lightning_talks_d3.webm.txt315 B2011-01-31 20:19:36
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.webm.txt336 B2011-01-31 20:20:35
27c3-4181-en-sip_home_gateways_under_fire.webm.txt322 B2011-01-31 20:21:19
27c3-4276-en-cognitive_psychology_for_hackers.webm.txt316 B2011-01-31 20:23:05
27c3-4055-en-terrorists_win_exploiting_telecommunications_data.webm.txt377 B2011-01-31 20:25:03
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.webm.txt340 B2011-01-31 20:26:59
27c3-4296-en-lightning_days_d2.webm.txt315 B2011-01-31 20:27:52
27c3-4302-en-27c3_keynote_we_come_in_peace.webm.txt306 B2011-02-06 17:02:17
27c3-4094-de-netzneutralitaet_und_qos.webm566.6 MiB2011-11-20 16:13:41
27c3-4299-en-closing_event.webm149.9 MiB2011-11-20 16:13:46
27c3-4145-en-spoilers_human_interfaces_airplanes.webm1.0 GiB2011-11-20 16:14:03
27c3-4237-en-indect_eu_surveillance_project.webm617.7 MiB2011-11-20 16:14:04
27c3-4142-en-nodejs_as_a_networking_tool.webm341.6 MiB2011-11-20 16:14:15
27c3-4211-en-chip_and_pin_is_broken.webm315.7 MiB2011-11-20 16:14:24
27c3-4160-en-automatic_identification_cryptographic_primitives.webm779.1 MiB2011-11-20 16:14:37
27c3-4175-en-from_robot_to_robot.webm541.3 MiB2011-11-20 16:14:49
27c3-4221-en-omg_wtf_pdf.webm222.2 MiB2011-11-20 16:15:02
27c3-4333-en-hacker_jeopardy_translation.webm1016.2 MiB2011-11-20 16:15:17
27c3-4244-en-critical_overview_of_10_years_pet.webm494.5 MiB2011-11-20 16:15:20
27c3-4339-en-openleaks.webm771.6 MiB2011-11-20 16:15:44
27c3-4017-en-desktop_on_the_linux.webm591.3 MiB2011-11-20 16:15:45
27c3-4003-en-cybernetics_for_the_masses.webm406.7 MiB2011-11-20 16:15:58
27c3-4123-en-defense_is_not_dead.webm612.8 MiB2011-11-20 16:16:11
27c3-4195-de-literarischer_abend.webm713.4 MiB2011-11-20 16:16:29
27c3-4334-en-fnord_jahresrueckblick.webm475.6 MiB2011-11-20 16:16:32
27c3-4184-de-stanislaw_lem_weltverbesserer.webm193.8 MiB2011-11-20 16:16:41
27c3-4149-en-i_control_your_code.webm950.6 MiB2011-11-20 16:17:19
27c3-4187-en-your_infrastructure_will_kill_you.webm1.0 GiB2011-11-20 16:17:24
27c3-4181-en-sip_home_gateways_under_fire.webm231.8 MiB2011-11-20 16:17:25
27c3-4164-de-friede_sei_mit_euren_daten.webm648.6 MiB2011-11-20 16:17:50
27c3-4151-en-android_geolocation_using_gsm_network.webm954.0 MiB2011-11-20 16:18:05
27c3-3983-en-hackers_and_computer_science.webm429.2 MiB2011-11-20 16:18:16
27c3-4121-en-is_the_ssliverse_a_safe_place.webm799.1 MiB2011-11-20 16:18:34
27c3-4236-en-international_cyber_jurisdiction.webm799.0 MiB2011-11-20 16:18:49
27c3-4298-de-ccc_jahresrueckblick_2010.webm452.2 MiB2011-11-20 16:18:53
27c3-4011-en-embedded_reverse_engineering.webm694.3 MiB2011-11-20 16:19:13
27c3-4046-en-all_colours_are_beautiful.webm527.9 MiB2011-11-20 16:19:18
27c3-4087-en-console_hacking_2010.webm165.5 MiB2011-11-20 16:19:24
27c3-3957-en-ipv6_insecurities.webm481.4 MiB2011-11-20 16:19:24
27c3-4057-en-adventures_in_mapping_afghanistan_elections.webm317.2 MiB2011-11-20 16:19:38
27c3-4239-en-lightning_talks_d3.webm1.0 GiB2011-11-20 16:20:11
27c3-4082-en-sap_landscape.webm1.0 GiB2011-11-20 16:20:18
27c3-4302-en-27c3_keynote_we_come_in_peace.webm376.3 MiB2011-11-20 16:20:21
27c3-4185-de-whistleblowing_licht_ins_dunkel.webm332.3 MiB2011-11-20 16:20:31
27c3-4060-en-attacking_mobile_phones.webm286.3 MiB2011-11-20 16:20:41
27c3-4085-de-digitale_spaltung_per_gesetz.webm607.6 MiB2011-11-20 16:20:47
27c3-4143-en-parttimescientists.webm323.4 MiB2011-11-20 16:20:55
27c3-4081-de-netzmedienrecht_lobbyismus_korruption.webm796.8 MiB2011-11-20 16:21:11
27c3-4061-en-building_custom_disassemblers.webm547.3 MiB2011-11-20 16:21:13
27c3-4230-de-security_nightmares.webm240.5 MiB2011-11-20 16:21:23
27c3-4326-de-radio_der_zukunft.webm499.0 MiB2011-11-20 16:21:41
27c3-4231-en-datenrettung_fun_with_hard_drives.webm879.4 MiB2011-11-20 16:21:46
27c3-4295-en-high_speed_high_security_cryptography.webm335.7 MiB2011-11-20 16:21:50
27c3-4297-de-die_gesamte_technik_ist_sicher.webm408.2 MiB2011-11-20 16:21:58
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.webm596.2 MiB2011-11-20 16:22:14
27c3-4140-en-contemporary_profiling_of_web_users.webm692.8 MiB2011-11-20 16:22:24
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.webm424.5 MiB2011-11-20 16:22:40
27c3-4144-en-short_political_history_of_acoustics.webm755.7 MiB2011-11-20 16:22:46
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.webm285.2 MiB2011-11-20 16:22:47
27c3-4006-en-diy_synthesizers_and_sound_generators.webm301.8 MiB2011-11-20 16:22:54
27c3-4090-en-baseband_apocalypse.webm860.5 MiB2011-11-20 16:23:22
27c3-4296-en-lightning_days_d2.webm754.8 MiB2011-11-20 16:23:22
27c3-4070-de-fnord_jahresrueckblick.webm564.4 MiB2011-11-20 16:23:43
27c3-4265-en-hacking_smart_phones.webm652.3 MiB2011-11-20 16:23:45
27c3-4055-en-terrorists_win_exploiting_telecommunications_data.webm631.8 MiB2011-11-20 16:24:10
27c3-4253-en-pentanews_game_show.webm823.4 MiB2011-11-20 16:24:16
27c3-4210-en-lying_to_the_neighbours.webm417.3 MiB2011-11-20 16:24:21
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.webm320.7 MiB2011-11-20 16:24:27
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.webm276.4 MiB2011-11-20 16:24:28
27c3-4234-en-usb_and_libusb.webm669.8 MiB2011-11-20 16:24:54
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.webm839.3 MiB2011-11-20 16:24:57
27c3-4193-en-having_fun_with_rtp.webm423.9 MiB2011-11-20 16:25:12
27c3-4174-en-the_hidden_nemesis.webm703.3 MiB2011-11-20 16:25:24
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.webm660.5 MiB2011-11-20 16:25:38
27c3-4338-de-wikileaks_und_mehr.webm593.9 MiB2011-11-20 16:25:50
27c3-4190-en-data_retention_in_the_eu.webm363.2 MiB2011-11-20 16:25:50
27c3-4125-de-spinning_the_electronic_wheel.webm724.8 MiB2011-11-20 16:26:17
27c3-4263-en-resisting_excessive_government_surveillance.webm795.4 MiB2011-11-20 16:26:21
27c3-4168-en-automated_architecture_independent_gadget_search.webm415.7 MiB2011-11-20 16:26:31
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.webm484.0 MiB2011-11-20 16:26:47
27c3-4300-en-lightning_talks_d4.webm920.3 MiB2011-11-20 16:27:12
27c3-4276-en-cognitive_psychology_for_hackers.webm871.1 MiB2011-11-20 16:27:15
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.webm885.9 MiB2011-11-20 16:27:50
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.webm991.4 MiB2011-11-20 16:27:58
27c3-4138-en-secure_communications_below_the_hearing_threshold.webm688.4 MiB2011-11-20 16:28:22
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.webm829.2 MiB2011-11-20 16:28:26
27c3-4099-en-file_print_electronics.webm245.7 MiB2011-11-20 16:28:32
27c3-4245-en-adventures_in_analyzing_stuxnet.webm323.2 MiB2011-11-20 16:28:39
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.webm417.9 MiB2011-11-20 16:28:52
27c3-4096-en-code_deobfuscation_by_optimization.webm506.6 MiB2011-11-20 16:28:55
27c3-4159-en-reverse_engineering_mos_6502.webm276.2 MiB2011-11-20 16:29:01
27c3-4261-en-key_recovery_attacks_rc4.webm218.9 MiB2011-11-20 16:29:04
27c3-4206-en-immi_from_concept_to_reality.webm328.5 MiB2011-11-20 16:29:13
27c3-4208-en-wideband_gsm_sniffing.webm403.0 MiB2011-11-20 16:29:28
27c3-4176-de-hacking_ibuttons.webm784.9 MiB2011-11-20 16:29:38
27c3-4183-en-safety_on_open_sea.webm900.9 MiB2011-11-20 16:30:08
27c3-4301-en-flow_analysis_of_internet_activities.webm319.5 MiB2011-11-20 16:30:18
27c3-4018-en-frozencache.webm837.5 MiB2011-11-20 16:30:22
27c3-4103-en-copyright_enforcement_versus_freedoms.webm387.7 MiB2011-11-20 16:30:33
27c3-4097-de-identifizierung_von_netzwerkprotokollen.webm540.3 MiB2011-11-20 16:30:56
27c3-4141-de-hacker_jeopardy.webm1018.4 MiB2011-11-20 16:31:22
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.webm658.6 MiB2011-11-20 16:31:23
27c3-4073-de-logikschaltungen_ohne_elektronik.webm433.1 MiB2011-11-20 16:31:35