Parent directory/ | - | - |
24c3-2131-en-port_scanning_improved.mkv | 82.7 MiB | 2007-12-30 18:40:37 |
24c3-2155-en-universe_on_supercomputers.mkv | 106.8 MiB | 2007-12-29 17:33:08 |
24c3-2158-en-the_arctic_cold_war.mkv | 123.2 MiB | 2008-01-06 05:28:03 |
24c3-2166-en-embedded_devices_reverse_engineering.mkv | 69.7 MiB | 2008-01-06 05:24:22 |
24c3-2189-en-hidden_trojan.mkv | 84.6 MiB | 2007-12-29 17:35:20 |
24c3-2190-en-introduction_in_mems.mkv | 53.0 MiB | 2008-01-06 05:24:42 |
24c3-2192-de-elektronische_dokumente.mkv | 113.2 MiB | 2007-12-29 17:38:25 |
24c3-2203-de-chaos_jahresrueckblick.mkv | 207.0 MiB | 2007-12-29 17:43:11 |
24c3-2209-en-playstation_portable_cracking.mkv | 45.4 MiB | 2008-01-06 05:27:41 |
24c3-2212-en-unusual_web_bugs.mkv | 118.6 MiB | 2008-01-06 06:21:12 |
24c3-2213-de-getting_things_done.mkv | 73.2 MiB | 2008-01-06 05:27:54 |
24c3-2214-en-make_cool_things_with_microcontrollers.mkv | 60.7 MiB | 2007-12-29 17:44:17 |
24c3-2216-de-erlang.mkv | 93.3 MiB | 2008-01-06 05:25:05 |
24c3-2225-en-paparazzi.mkv | 103.2 MiB | 2008-01-06 05:19:22 |
24c3-2227-en-hacking_scada.mkv | 85.4 MiB | 2007-12-30 18:47:25 |
24c3-2228-de-lieber_cyborg_als_goettin.mkv | 90.5 MiB | 2008-01-06 05:25:44 |
24c3-2233-en-vx.mkv | 90.0 MiB | 2007-12-29 17:46:11 |
24c3-2235-en-one_token_to_rule_them_all.mkv | 64.7 MiB | 2008-01-06 05:27:45 |
24c3-2241-de-das_panoptische_prinzip.mkv | 174.5 MiB | 2007-12-30 19:03:17 |
24c3-2245-en-how_to_reach_digital_sustainability.mkv | 91.4 MiB | 2007-12-29 17:48:12 |
24c3-2247-en-breaking_a_vm.mkv | 44.8 MiB | 2008-01-06 05:12:57 |
24c3-2248-de-desperate_house_hackers.mkv | 66.4 MiB | 2007-12-29 17:49:41 |
24c3-2250-de-abschlussbericht_fem.mkv | 85.8 MiB | 2008-01-06 05:24:56 |
24c3-2252-en-ruby_on_rails_security.mkv | 95.5 MiB | 2008-01-06 05:29:29 |
24c3-2253-en-dining_cryptographers.mkv | 89.8 MiB | 2008-01-06 05:21:24 |
24c3-2255-de-wahlchaos.mkv | 157.9 MiB | 2007-12-30 19:17:56 |
24c3-2256-de-openser_sip_server.mkv | 53.7 MiB | 2008-01-06 05:24:16 |
24c3-2258-en-design_noir.mkv | 81.1 MiB | 2007-12-29 17:51:23 |
24c3-2260-en-to_be_or_i2p.mkv | 92.9 MiB | 2007-12-29 17:53:20 |
24c3-2270-en-sputnik_data_analysis.mkv | 204.0 MiB | 2007-12-30 19:35:01 |
24c3-2271-en-distributed_campaigns.mkv | 128.9 MiB | 2007-12-30 19:41:26 |
24c3-2272-en-hacking_in_the_age_of_declining_everything.mkv | 225.3 MiB | 2007-12-30 19:58:11 |
24c3-2273-en-toying_with_barcodes.mkv | 89.6 MiB | 2008-11-17 13:08:06 |
24c3-2275-en-quantum_cryptography_and_possible_attacks.mkv | 150.4 MiB | 2007-12-29 17:57:59 |
24c3-2276-en-space_communism.mkv | 45.5 MiB | 2007-12-30 20:06:07 |
24c3-2279-en-deconstructing_xbox_360_security.mkv | 102.3 MiB | 2007-12-29 17:59:56 |
24c3-2280-en-i_know_who_you_clicked_last_summer.mkv | 118.4 MiB | 2008-01-06 05:28:54 |
24c3-2284-en-linguistic_hacking.mkv | 123.3 MiB | 2007-12-29 18:02:23 |
24c3-2285-en-10ge_monitoring_live.mkv | 103.5 MiB | 2007-12-29 18:04:41 |
24c3-2286-en-openstreetmap.mkv | 95.2 MiB | 2008-01-06 05:26:18 |
24c3-2287-de-sex20.mkv | 58.6 MiB | 2007-12-30 20:11:06 |
24c3-2288-de-verschwoerungstheorien.mkv | 92.3 MiB | 2007-12-30 20:17:53 |
24c3-2289-en-card_payment.mkv | 105.3 MiB | 2007-12-30 20:24:33 |
24c3-2290-en-overtaking_proprietary_software.mkv | 107.6 MiB | 2008-01-06 05:21:04 |
24c3-2292-en-wireless_kernel_tweaking.mkv | 73.6 MiB | 2008-01-06 05:23:20 |
24c3-2293-en-what_can_we_do_to_counter_the_spies.mkv | 102.4 MiB | 2007-12-30 20:30:56 |
24c3-2294-de-23_ways_to_fight_for_your_rights.mkv | 64.3 MiB | 2008-01-06 05:14:26 |
24c3-2296-en-random_things.mkv | 69.8 MiB | 2008-01-06 05:21:47 |
24c3-2303-en-inside_the_macosx_kernel.mkv | 63.4 MiB | 2007-12-30 20:32:56 |
24c3-2311-en-hacking_ideologies_2.mkv | 108.9 MiB | 2007-12-30 20:36:38 |
24c3-2318-en-cybercrime20.mkv | 66.1 MiB | 2007-12-29 18:06:28 |
24c3-2321-en-d_libd_and_the_slate_project.mkv | 71.4 MiB | 2007-12-29 18:08:17 |
24c3-2322-en-infectious_diseases.mkv | 67.3 MiB | 2008-01-06 06:26:25 |
24c3-2325-en-current_events_in_tor_development.mkv | 191.0 MiB | 2007-12-30 20:45:17 |
24c3-2326-en-diy_survival.mkv | 93.3 MiB | 2007-12-30 20:50:35 |
24c3-2329-en-change_me.mkv | 100.6 MiB | 2007-12-29 18:10:48 |
24c3-2331-en-spotter_guide_to_aacs_keys.mkv | 113.3 MiB | 2008-01-06 05:30:21 |
24c3-2332-en-no_ooxml.mkv | 89.1 MiB | 2008-01-06 05:27:48 |
24c3-2333-de-spiel_freude_eierkuchen.mkv | 132.5 MiB | 2007-12-30 20:57:29 |
24c3-2334-de-die_wahrheit_und_was_wirklich_passierte.mkv | 105.8 MiB | 2007-12-30 21:04:42 |
24c3-2336-de-security_nightmares.mkv | 113.1 MiB | 2008-01-06 05:17:22 |
24c3-2338-en-steam_powered_telegraphy.mkv | 121.3 MiB | 2007-12-29 18:13:39 |
24c3-2340-de-absurde_mathematik.mkv | 60.7 MiB | 2007-12-29 18:15:05 |
24c3-2342-en-it_was_a_bad_idea_anyway.mkv | 75.7 MiB | 2007-12-29 18:16:37 |
24c3-2344-de-grundlagen_der_sicheren_programmierung.mkv | 67.6 MiB | 2007-12-30 21:10:14 |
24c3-2345-de-gplv3_auswirkungen.mkv | 122.5 MiB | 2008-01-06 05:28:43 |
24c3-2346-de-meine_finger_gehoeren_mir.mkv | 131.6 MiB | 2007-12-30 21:22:51 |
24c3-2347-en-c64_dtv_hacking.mkv | 65.3 MiB | 2007-12-30 21:28:39 |
24c3-2352-de-hacker_jeopardy.mkv | 244.6 MiB | 2007-12-30 21:40:54 |
24c3-2353-en-from_ring_zero_to_uid_zero.mkv | 41.5 MiB | 2008-01-06 05:13:14 |
24c3-2354-en-latest_trends_in_oracle_security.mkv | 83.4 MiB | 2008-01-06 05:17:15 |
24c3-2355-de-trecker_fahrn.mkv | 110.6 MiB | 2007-12-29 18:18:35 |
24c3-2356-de-computer_popsongs.mkv | 145.5 MiB | 2007-12-29 18:21:09 |
24c3-2356-en-computer_popsongs.mkv | 145.5 MiB | 2008-01-06 06:24:42 |
24c3-2358-en-guerilla_knitting.mkv | 103.1 MiB | 2007-12-30 21:44:12 |
24c3-2360-en-all_tomorrows.mkv | 191.0 MiB | 2007-12-30 21:49:41 |
24c3-2363-de-der_bundestrojaner.mkv | 127.9 MiB | 2007-12-29 18:23:23 |
24c3-2364-en-smartcard_protocol_sniffing.mkv | 107.4 MiB | 2008-01-06 05:28:14 |
24c3-2367-en-closing_event.mkv | 79.0 MiB | 2008-01-06 06:21:21 |
24c3-2371-de-wahlstift.mkv | 127.1 MiB | 2007-12-30 21:53:09 |
24c3-2378-en-mifare_security.mkv | 96.5 MiB | 2007-12-30 21:55:59 |
24c3-2380-de-nedap_wahlcomputer_in_deutschland.mkv | 127.0 MiB | 2007-12-29 18:25:59 |
24c3-2381-en-what_is_terrorism.mkv | 120.9 MiB | 2007-12-29 18:28:36 |
24c3-2382-de-tor.mkv | 122.6 MiB | 2007-12-29 18:31:11 |
24c3-2383-en-data_retention.mkv | 157.4 MiB | 2007-12-29 18:34:36 |
24c3-2387-en-open_source_lobbying.mkv | 173.0 MiB | 2007-12-30 22:00:59 |
24c3-2389-en-hacking_icann.mkv | 67.6 MiB | 2008-01-06 05:20:06 |
24c3-2393-en-dns_rebinding_packet_tricks.mkv | 121.8 MiB | 2007-12-29 18:37:15 |
24c3-2396-en-eu_rfid_policy.mkv | 156.1 MiB | 2008-01-06 06:21:12 |
24c3-2402-en-lightning_talks_2007_day_4.mkv | 256.9 MiB | 2008-01-06 06:23:54 |
md5sum | 1.1 KiB | 2007-12-28 20:19:39 |