Parent directory/ | - | - |
25c3-3058-en-security_nightmares_2009_english_interpretation.mp4.md5 | 99 B | 2009-01-12 01:40:27 |
25c3-3058-en-security_nightmares_2009_english_interpretation.mp4 | 708.7 MiB | 2009-01-12 01:43:02 |
25c3-3057-en-hacker_jeopardy_english_interpretation.mp4.md5 | 90 B | 2009-01-13 16:59:27 |
25c3-3057-en-hacker_jeopardy_english_interpretation.mp4 | 787.3 MiB | 2009-01-13 17:02:03 |
25c3-3056-en-fnord_news_show_english_interpretation.mp4.md5 | 90 B | 2009-01-12 01:40:27 |
25c3-3056-en-fnord_news_show_english_interpretation.mp4 | 385.5 MiB | 2009-01-12 01:42:08 |
25c3-3053-en-lightning_talks_day3_-_evening.mp4.md5 | 82 B | 2009-01-07 23:11:01 |
25c3-3053-en-lightning_talks_day3_-_evening.mp4 | 427.5 MiB | 2009-01-07 23:36:42 |
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4.md5 | 96 B | 2009-01-12 01:40:27 |
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4 | 365.6 MiB | 2009-01-12 01:41:40 |
25c3-3048-en-lightning_talks_day2.mp4.md5 | 72 B | 2009-01-12 01:40:27 |
25c3-3048-en-lightning_talks_day2.mp4 | 392.8 MiB | 2009-01-12 01:41:13 |
25c3-3047-en-lightning_talks_day3_morning.mp4.md5 | 80 B | 2009-01-04 12:18:51 |
25c3-3047-en-lightning_talks_day3_morning.mp4 | 455.9 MiB | 2008-12-30 01:52:58 |
25c3-3044-en-all_your_bases_are_belong_to_us.mp4.md5 | 83 B | 2009-01-04 12:18:51 |
25c3-3044-en-all_your_bases_are_belong_to_us.mp4 | 425.3 MiB | 2008-12-29 23:38:23 |
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4.md5 | 87 B | 2009-01-04 12:18:51 |
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4 | 498.4 MiB | 2008-12-30 11:56:45 |
25c3-3032-en-analyzing_rfid_security.mp4.md5 | 75 B | 2009-01-07 23:11:01 |
25c3-3032-en-analyzing_rfid_security.mp4 | 413.8 MiB | 2009-01-07 23:35:54 |
25c3-3030-en-messing_around_with_garage_doors.mp4.md5 | 84 B | 2009-01-11 21:43:10 |
25c3-3030-en-messing_around_with_garage_doors.mp4 | 586.6 MiB | 2009-01-11 22:01:57 |
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4.md5 | 81 B | 2009-01-06 20:50:12 |
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4 | 469.8 MiB | 2009-01-06 21:33:39 |
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4.md5 | 87 B | 2009-01-22 23:28:53 |
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4 | 598.8 MiB | 2009-01-22 23:30:13 |
25c3-3024-de-jahresrueckblick.mp4.md5 | 68 B | 2009-01-11 21:43:10 |
25c3-3024-de-jahresrueckblick.mp4 | 956.5 MiB | 2009-01-11 22:01:02 |
25c3-3023-en-making_the_theoretical_possible.mp4.md5 | 83 B | 2009-01-06 20:50:12 |
25c3-3023-en-making_the_theoretical_possible.mp4 | 473.4 MiB | 2009-01-06 21:33:04 |
25c3-3021-de-security_nightmares_2009.mp4.md5 | 76 B | 2009-01-11 21:43:10 |
25c3-3021-de-security_nightmares_2009.mp4 | 722.0 MiB | 2009-01-11 21:59:41 |
25c3-3020-en-banking_malware_101.mp4.md5 | 71 B | 2009-01-11 21:43:10 |
25c3-3020-en-banking_malware_101.mp4 | 485.1 MiB | 2009-01-11 21:58:24 |
25c3-3016-en-life_is_a_holodeck.mp4.md5 | 70 B | 2009-01-11 21:43:10 |
25c3-3016-en-life_is_a_holodeck.mp4 | 516.1 MiB | 2009-01-11 21:57:24 |
25c3-3015-en-rapid_prototype_your_life.mp4.md5 | 77 B | 2009-01-04 12:18:51 |
25c3-3015-en-rapid_prototype_your_life.mp4 | 436.7 MiB | 2008-12-30 20:02:17 |
25c3-3008-en-anatomy_of_smartphone_hardware.mp4.md5 | 82 B | 2009-01-07 23:11:01 |
25c3-3008-en-anatomy_of_smartphone_hardware.mp4 | 436.1 MiB | 2009-01-07 23:35:11 |
25c3-3007-en-running_your_own_gsm_network.mp4.md5 | 80 B | 2009-01-13 16:59:27 |
25c3-3007-en-running_your_own_gsm_network.mp4 | 343.4 MiB | 2009-01-13 17:01:04 |
25c3-3004-en-why_technology_sucks.mp4.md5 | 72 B | 2009-01-06 20:50:11 |
25c3-3004-en-why_technology_sucks.mp4 | 342.6 MiB | 2009-01-06 21:32:29 |
25c3-3002-en-squeezing_attack_traces.mp4.md5 | 75 B | 2009-01-11 21:43:10 |
25c3-3002-en-squeezing_attack_traces.mp4 | 291.2 MiB | 2009-01-11 21:56:24 |
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4.md5 | 87 B | 2009-01-11 21:43:10 |
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4 | 618.7 MiB | 2009-01-11 21:55:55 |
25c3-2999-en-closing_ceremony.mp4.md5 | 68 B | 2009-01-11 21:43:09 |
25c3-2999-en-closing_ceremony.mp4 | 384.3 MiB | 2009-01-11 21:55:01 |
25c3-2997-en-locating_mobile_phones_using_ss7.mp4.md5 | 84 B | 2009-01-04 12:18:51 |
25c3-2997-en-locating_mobile_phones_using_ss7.mp4 | 372.0 MiB | 2008-12-30 20:10:48 |
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4.md5 | 108 B | 2009-01-07 23:11:00 |
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4 | 388.0 MiB | 2009-01-07 23:34:29 |
25c3-2992-en-tricks_makes_you_smile.mp4.md5 | 74 B | 2009-01-07 23:11:00 |
25c3-2992-en-tricks_makes_you_smile.mp4 | 281.3 MiB | 2009-01-07 23:33:52 |
25c3-2991-en-terrorist_all-stars.mp4.md5 | 71 B | 2009-01-06 20:50:11 |
25c3-2991-en-terrorist_all-stars.mp4 | 499.9 MiB | 2009-01-06 21:31:35 |
25c3-2988-en-just_estonia_and_georgia.mp4.md5 | 76 B | 2009-01-06 20:50:11 |
25c3-2988-en-just_estonia_and_georgia.mp4 | 342.6 MiB | 2009-01-06 21:30:55 |
25c3-2980-en-the_infinite_library.mp4.md5 | 72 B | 2009-01-07 23:11:00 |
25c3-2980-en-the_infinite_library.mp4 | 450.0 MiB | 2009-01-07 23:33:26 |
25c3-2979-en-embracing_post-privacy.mp4.md5 | 74 B | 2009-01-07 23:11:00 |
25c3-2979-en-embracing_post-privacy.mp4 | 455.5 MiB | 2009-01-07 23:32:44 |
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4.md5 | 97 B | 2009-01-06 20:50:11 |
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4 | 477.2 MiB | 2009-01-06 21:29:26 |
25c3-2976-en-hacking_the_iphone.mp4.md5 | 70 B | 2009-01-04 12:18:51 |
25c3-2976-en-hacking_the_iphone.mp4 | 447.1 MiB | 2008-12-28 11:06:03 |
25c3-2975-de-zehn_big_brother_awards_in_at.mp4.md5 | 81 B | 2009-01-13 16:59:27 |
25c3-2975-de-zehn_big_brother_awards_in_at.mp4 | 441.3 MiB | 2009-01-13 17:00:35 |
25c3-2973-en-lightning_talks_day4.mp4.md5 | 72 B | 2009-01-11 21:43:09 |
25c3-2973-en-lightning_talks_day4.mp4 | 468.7 MiB | 2009-01-11 21:54:27 |
25c3-2970-en-coreboot_beyond_the_final_frontier.mp4.md5 | 86 B | 2009-01-04 12:18:51 |
25c3-2970-en-coreboot_beyond_the_final_frontier.mp4 | 389.7 MiB | 2008-12-29 22:02:36 |
25c3-2963-de-handschellen_hacken.mp4.md5 | 71 B | 2009-01-26 11:39:54 |
25c3-2963-de-handschellen_hacken.mp4 | 470.6 MiB | 2009-01-26 11:40:10 |
25c3-2958-de-hacker_jeopardy.mp4.md5 | 67 B | 2009-01-11 21:43:09 |
25c3-2958-de-hacker_jeopardy.mp4 | 790.5 MiB | 2009-01-11 21:53:43 |
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4.md5 | 99 B | 2009-01-22 23:28:53 |
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4 | 450.1 MiB | 2009-01-22 23:29:54 |
25c3-2952-de-pflanzenhacken.mp4.md5 | 66 B | 2009-01-11 21:43:09 |
25c3-2952-de-pflanzenhacken.mp4 | 417.5 MiB | 2009-01-11 21:52:29 |
25c3-2942-de-vertex_hacking.mp4.md5 | 66 B | 2009-01-06 20:50:10 |
25c3-2942-de-vertex_hacking.mp4 | 375.2 MiB | 2009-01-06 21:21:23 |
25c3-2940-en-flying_for_free.mp4.md5 | 67 B | 2009-01-22 23:28:53 |
25c3-2940-en-flying_for_free.mp4 | 463.0 MiB | 2009-01-22 23:29:39 |
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4.md5 | 116 B | 2009-01-07 23:11:00 |
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4 | 391.6 MiB | 2009-01-07 23:32:02 |
25c3-2937-en-dect.mp4.md5 | 56 B | 2009-01-06 20:50:10 |
25c3-2937-en-dect.mp4 | 512.5 MiB | 2009-01-06 21:17:17 |
25c3-2934-en-blinkenlights_stereoscope.mp4.md5 | 77 B | 2009-01-07 23:11:00 |
25c3-2934-en-blinkenlights_stereoscope.mp4 | 498.8 MiB | 2009-01-07 23:31:10 |
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4.md5 | 92 B | 2009-01-06 20:50:10 |
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4 | 423.6 MiB | 2009-01-06 21:13:43 |
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4.md5 | 99 B | 2009-01-04 12:18:51 |
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4 | 449.0 MiB | 2008-12-30 12:42:40 |
25c3-2916-en-wikileaks.mp4.md5 | 61 B | 2009-01-11 21:43:09 |
25c3-2916-en-wikileaks.mp4 | 449.2 MiB | 2009-01-11 21:51:48 |
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4.md5 | 89 B | 2009-01-04 12:18:51 |
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4 | 233.9 MiB | 2008-12-30 01:49:04 |
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4.md5 | 102 B | 2009-01-11 21:43:09 |
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4 | 556.9 MiB | 2009-01-11 21:50:49 |
25c3-2904-en-solar-powering_your_geek_gear.mp4.md5 | 81 B | 2009-01-22 23:28:53 |
25c3-2904-en-solar-powering_your_geek_gear.mp4 | 222.7 MiB | 2009-01-22 23:29:24 |
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4.md5 | 86 B | 2009-01-04 12:18:51 |
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4 | 383.7 MiB | 2008-12-27 22:33:57 |
25c3-2899-en-mining_social_contacts_with_active_rfid.mp4.md5 | 91 B | 2009-01-06 20:50:09 |
25c3-2899-en-mining_social_contacts_with_active_rfid.mp4 | 454.0 MiB | 2009-01-06 21:03:49 |
25c3-2896-en-chip_reverse_engineering.mp4.md5 | 76 B | 2009-01-04 12:18:49 |
25c3-2896-en-chip_reverse_engineering.mp4 | 344.6 MiB | 2008-12-29 20:17:17 |
25c3-2895-de-der_elektronische_personalausweis.mp4.md5 | 85 B | 2009-01-11 21:43:09 |
25c3-2895-de-der_elektronische_personalausweis.mp4 | 466.7 MiB | 2009-01-11 21:49:31 |
25c3-2893-en-attacking_rich_internet_applications.mp4.md5 | 88 B | 2009-01-11 21:43:09 |
25c3-2893-en-attacking_rich_internet_applications.mp4 | 472.4 MiB | 2009-01-11 21:48:45 |
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4.md5 | 80 B | 2009-01-11 21:43:09 |
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4 | 342.8 MiB | 2009-01-11 21:48:02 |
25c3-2890-en-scalable_swarm_robotics.mp4.md5 | 75 B | 2009-01-07 23:11:00 |
25c3-2890-en-scalable_swarm_robotics.mp4 | 300.5 MiB | 2009-01-07 23:28:15 |
25c3-2882-en-full-disk-encryption_crash-course.mp4.md5 | 85 B | 2009-01-04 12:18:49 |
25c3-2882-en-full-disk-encryption_crash-course.mp4 | 369.8 MiB | 2008-12-30 01:50:31 |
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4.md5 | 96 B | 2009-01-07 23:11:00 |
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4 | 359.2 MiB | 2009-01-07 23:26:44 |
25c3-2874-en-the_ultimate_commodore_64_talk.mp4.md5 | 82 B | 2009-01-06 20:50:09 |
25c3-2874-en-the_ultimate_commodore_64_talk.mp4 | 469.4 MiB | 2009-01-06 20:58:24 |
25c3-2873-en-privacy_in_the_social_semantic_web.mp4.md5 | 86 B | 2009-01-04 12:18:47 |
25c3-2873-en-privacy_in_the_social_semantic_web.mp4 | 352.2 MiB | 2008-12-30 02:56:01 |
25c3-2872-en-the_privacy_workshop_project.mp4.md5 | 80 B | 2009-01-07 23:11:00 |
25c3-2872-en-the_privacy_workshop_project.mp4 | 371.2 MiB | 2009-01-07 23:24:41 |
25c3-2863-en-climate_change_-_state_of_the_science.mp4.md5 | 89 B | 2009-01-13 16:59:27 |
25c3-2863-en-climate_change_-_state_of_the_science.mp4 | 495.4 MiB | 2009-01-13 17:00:01 |
25c3-2860-de-neusprech_im_berwachungsstaat.mp4.md5 | 81 B | 2009-01-04 12:18:47 |
25c3-2860-de-neusprech_im_berwachungsstaat.mp4 | 537.2 MiB | 2008-12-30 18:57:07 |
25c3-2845-en-rf_fingerprinting_of_rfid.mp4.md5 | 77 B | 2009-01-22 23:28:53 |
25c3-2845-en-rf_fingerprinting_of_rfid.mp4 | 341.1 MiB | 2009-01-22 23:29:17 |
25c3-2843-en-algorithmic_music_in_a_box.mp4.md5 | 78 B | 2009-01-07 23:11:00 |
25c3-2843-en-algorithmic_music_in_a_box.mp4 | 391.9 MiB | 2009-01-07 23:22:48 |
25c3-2839-en-cracking_the_msp430_bsl.mp4.md5 | 75 B | 2009-01-04 12:18:47 |
25c3-2839-en-cracking_the_msp430_bsl.mp4 | 287.0 MiB | 2008-12-29 16:15:26 |
25c3-2832-en-exploiting_symbian.mp4.md5 | 70 B | 2009-01-04 12:18:47 |
25c3-2832-en-exploiting_symbian.mp4 | 482.6 MiB | 2008-12-30 15:17:32 |
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4.md5 | 99 B | 2009-01-06 20:50:09 |
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4 | 283.9 MiB | 2009-01-06 20:54:58 |
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4.md5 | 86 B | 2009-01-07 23:11:00 |
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4 | 338.3 MiB | 2009-01-07 23:20:35 |
25c3-2827-de-u23.mp4.md5 | 55 B | 2009-01-04 12:18:47 |
25c3-2827-de-u23.mp4 | 382.9 MiB | 2008-12-30 15:16:48 |
25c3-2816-en-cisco_ios_attack_and_defense.mp4.md5 | 80 B | 2009-01-07 23:11:00 |
25c3-2816-en-cisco_ios_attack_and_defense.mp4 | 508.0 MiB | 2009-01-07 23:18:35 |
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4.md5 | 83 B | 2009-01-04 12:18:47 |
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4 | 378.5 MiB | 2008-12-29 19:23:25 |
25c3-2814-de-datenpannen.mp4.md5 | 63 B | 2009-01-04 12:18:47 |
25c3-2814-de-datenpannen.mp4 | 405.2 MiB | 2008-12-29 19:26:15 |
25c3-2812-de-fnord_news_show.mp4.md5 | 67 B | 2009-01-04 12:18:47 |
25c3-2812-de-fnord_news_show.mp4 | 385.2 MiB | 2008-12-30 15:41:36 |
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4.md5 | 98 B | 2009-01-22 23:28:53 |
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4 | 397.0 MiB | 2009-01-22 23:29:06 |
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4.md5 | 102 B | 2009-01-04 12:18:47 |
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4 | 503.0 MiB | 2008-12-30 15:34:40 |
25c3-2799-en-console_hacking_2008_wii_fail.mp4.md5 | 81 B | 2009-01-04 12:18:47 |
25c3-2799-en-console_hacking_2008_wii_fail.mp4 | 433.7 MiB | 2008-12-29 19:13:10 |
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4.md5 | 106 B | 2009-01-06 20:50:09 |
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4 | 507.4 MiB | 2009-01-06 20:53:48 |
25c3-2781-en-objects_as_software_the_coming_revolution.mp4.md5 | 93 B | 2009-01-11 21:43:09 |
25c3-2781-en-objects_as_software_the_coming_revolution.mp4 | 398.8 MiB | 2009-01-11 21:47:24 |
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4.md5 | 91 B | 2009-01-11 21:43:09 |
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4 | 277.0 MiB | 2009-01-11 21:46:50 |
25c3-2773-en-soviet_unterzoegersdorf.mp4.md5 | 75 B | 2009-01-04 12:18:47 |
25c3-2773-en-soviet_unterzoegersdorf.mp4 | 547.2 MiB | 2008-12-30 19:30:35 |
25c3-2734-en-short_attention_span_security.mp4.md5 | 81 B | 2009-01-11 21:43:09 |
25c3-2734-en-short_attention_span_security.mp4 | 410.9 MiB | 2009-01-11 21:46:23 |
25c3-2681-en-repurposing_the_ti_ez430u.mp4.md5 | 77 B | 2009-01-11 21:43:09 |
25c3-2681-en-repurposing_the_ti_ez430u.mp4 | 257.9 MiB | 2009-01-11 21:45:45 |
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4.md5 | 138 B | 2009-01-07 23:10:59 |
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4 | 369.0 MiB | 2009-01-07 23:15:23 |
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4.md5 | 119 B | 2009-01-04 12:18:47 |
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4 | 460.4 MiB | 2008-12-29 18:26:37 |
25c3-2669-en-collapsing_the_european_security_architecture.mp4.md5 | 97 B | 2009-01-11 21:43:09 |
25c3-2669-en-collapsing_the_european_security_architecture.mp4 | 448.5 MiB | 2009-01-11 21:45:22 |
25c3-2665-en-the_trust_situation.mp4.md5 | 71 B | 2009-01-04 12:18:47 |
25c3-2665-en-the_trust_situation.mp4 | 465.9 MiB | 2008-12-28 00:30:53 |
25c3-2639-en-attacking_nfc_mobile_phones.mp4.md5 | 79 B | 2009-01-11 21:43:09 |
25c3-2639-en-attacking_nfc_mobile_phones.mp4 | 629.8 MiB | 2009-01-11 21:44:37 |
25c3-2596-en-swf_and_the_malware_tragedy.mp4.md5 | 79 B | 2009-01-07 23:10:59 |
25c3-2596-en-swf_and_the_malware_tragedy.mp4 | 372.8 MiB | 2009-01-07 23:13:06 |