Parent directory/ | - | - |
28c3.mp3.all.sha1 | 8.6 KiB | 2012-01-02 23:50:49 |
28c3-4937-en-security_nightmares.mp3.sha1 | 79 B | 2012-01-01 23:48:23 |
28c3-4937-en-security_nightmares.mp3 | 42.5 MiB | 2012-01-01 23:48:09 |
28c3-4936-en-fnord_jahresrueckblick.mp3.sha1 | 82 B | 2011-12-30 16:03:25 |
28c3-4936-en-fnord_jahresrueckblick.mp3 | 34.5 MiB | 2011-12-30 16:03:23 |
28c3-4935-en-eu_datenschutz_internet_der_dinge.mp3.sha1 | 93 B | 2011-12-30 16:42:18 |
28c3-4935-en-eu_datenschutz_internet_der_dinge.mp3 | 24.6 MiB | 2011-12-30 16:42:17 |
28c3-4934-en-hacker_jeopardy_translation.mp3.sha1 | 87 B | 2011-12-29 17:24:18 |
28c3-4934-en-hacker_jeopardy_translation.mp3 | 53.6 MiB | 2011-12-29 17:24:15 |
28c3-4932-de-camp_review_2011.mp3.sha1 | 76 B | 2011-12-29 01:04:21 |
28c3-4932-de-camp_review_2011.mp3 | 19.6 MiB | 2011-12-29 01:04:19 |
28c3-4930-en-black_ops_of_tcpip_2011.mp3.sha1 | 83 B | 2011-12-29 01:02:22 |
28c3-4930-en-black_ops_of_tcpip_2011.mp3 | 30.1 MiB | 2011-12-29 01:02:19 |
28c3-4928-en-kinectfusion.mp3.sha1 | 72 B | 2011-12-30 12:40:41 |
28c3-4928-en-kinectfusion.mp3 | 30.3 MiB | 2011-12-30 12:40:38 |
28c3-4927-en-noc_review_28c3_camp.mp3.sha1 | 80 B | 2011-12-30 17:10:16 |
28c3-4927-en-noc_review_28c3_camp.mp3 | 15.6 MiB | 2011-12-30 17:10:13 |
28c3-4916-en-buggedplanet.mp3.sha1 | 72 B | 2011-12-29 01:52:18 |
28c3-4916-en-buggedplanet.mp3 | 23.3 MiB | 2011-12-29 01:52:12 |
28c3-4913-de-almighty_dna_and_beyond.mp3.sha1 | 83 B | 2011-12-28 23:40:10 |
28c3-4913-de-almighty_dna_and_beyond.mp3 | 27.0 MiB | 2011-12-28 23:40:08 |
28c3-4910-de-demokratie_auf_saechsisch.mp3.sha1 | 85 B | 2011-12-29 00:46:17 |
28c3-4910-de-demokratie_auf_saechsisch.mp3 | 18.9 MiB | 2011-12-29 00:46:13 |
28c3-4908-de-jahresrueckblick_2011.mp3.sha1 | 81 B | 2011-12-29 17:26:17 |
28c3-4908-de-jahresrueckblick_2011.mp3 | 54.1 MiB | 2011-12-29 17:26:15 |
28c3-4907-en-lightning_talks_day_4.mp3.sha1 | 81 B | 2011-12-30 16:08:23 |
28c3-4907-en-lightning_talks_day_4.mp3 | 64.3 MiB | 2011-12-30 16:08:21 |
28c3-4906-en-lightning_talks_day_3_pecha_kucha.mp3.sha1 | 93 B | 2011-12-29 16:56:18 |
28c3-4906-en-lightning_talks_day_3_pecha_kucha.mp3 | 58.5 MiB | 2011-12-29 16:56:15 |
28c3-4905-en-lightning_talks_day_2.mp3.sha1 | 81 B | 2011-12-29 02:22:23 |
28c3-4905-en-lightning_talks_day_2.mp3 | 50.6 MiB | 2011-12-29 02:22:11 |
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.mp3.sha1 | 115 B | 2011-12-30 19:09:07 |
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.mp3 | 23.6 MiB | 2011-12-30 19:09:05 |
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.mp3.sha1 | 100 B | 2011-12-29 00:48:19 |
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.mp3 | 58.5 MiB | 2011-12-29 00:48:11 |
28c3-4899-en-closing_event.mp3.sha1 | 73 B | 2011-12-30 19:10:06 |
28c3-4899-en-closing_event.mp3 | 5.7 MiB | 2011-12-30 19:10:06 |
28c3-4898-de-security_nightmares.mp3.sha1 | 79 B | 2011-12-30 18:22:59 |
28c3-4898-de-security_nightmares.mp3 | 42.5 MiB | 2011-12-30 18:22:54 |
28c3-4897-en-keynote.mp3.sha1 | 67 B | 2011-12-28 22:22:46 |
28c3-4897-en-keynote.mp3 | 27.7 MiB | 2011-12-28 22:22:44 |
28c3-4876-de-die_spinnen_die_sachsen.mp3.sha1 | 83 B | 2011-12-28 23:30:16 |
28c3-4876-de-die_spinnen_die_sachsen.mp3 | 25.7 MiB | 2011-12-28 23:30:14 |
28c3-4871-en-hacking_mfps.mp3.sha1 | 72 B | 2011-12-28 23:54:09 |
28c3-4871-en-hacking_mfps.mp3 | 26.3 MiB | 2011-12-28 23:54:06 |
28c3-4869-de-tresor.mp3.sha1 | 66 B | 2011-12-29 17:08:11 |
28c3-4869-de-tresor.mp3 | 15.3 MiB | 2011-12-29 17:08:10 |
28c3-4866-de-fnord_jahresrueckblick.mp3.sha1 | 82 B | 2011-12-30 02:18:12 |
28c3-4866-de-fnord_jahresrueckblick.mp3 | 34.4 MiB | 2011-12-30 02:18:10 |
28c3-4856-en-the_engineering_part_of_social_engineering.mp3.sha1 | 102 B | 2011-12-30 17:08:15 |
28c3-4856-en-the_engineering_part_of_social_engineering.mp3 | 23.8 MiB | 2011-12-30 17:08:12 |
28c3-4848-en-the_coming_war_on_general_computation.mp3.sha1 | 97 B | 2011-12-29 00:24:21 |
28c3-4848-en-the_coming_war_on_general_computation.mp3 | 24.8 MiB | 2011-12-29 00:24:16 |
28c3-4847-en-reverse_engineering_usb_devices.mp3.sha1 | 91 B | 2011-12-29 00:32:21 |
28c3-4847-en-reverse_engineering_usb_devices.mp3 | 11.7 MiB | 2011-12-29 00:32:17 |
28c3-4844-de-eu_datenschutz_internet_der_dinge.mp3.sha1 | 93 B | 2011-12-29 00:54:17 |
28c3-4844-de-eu_datenschutz_internet_der_dinge.mp3 | 24.5 MiB | 2011-12-29 00:54:13 |
28c3-4832-de-neue_leichtigkeit.mp3.sha1 | 77 B | 2011-12-30 13:49:14 |
28c3-4832-de-neue_leichtigkeit.mp3 | 31.8 MiB | 2011-12-30 13:49:13 |
28c3-4828-de-antiforensik.mp3.sha1 | 72 B | 2011-12-30 14:00:10 |
28c3-4828-de-antiforensik.mp3 | 14.8 MiB | 2011-12-30 14:00:10 |
28c3-4826-en-a_brief_history_of_plutocracy.mp3.sha1 | 89 B | 2011-12-28 23:48:10 |
28c3-4826-en-a_brief_history_of_plutocracy.mp3 | 12.0 MiB | 2011-12-28 23:48:08 |
28c3-4821-en-not_your_grandfathers_moon_landing.mp3.sha1 | 94 B | 2011-12-29 17:00:15 |
28c3-4821-en-not_your_grandfathers_moon_landing.mp3 | 27.1 MiB | 2011-12-29 17:00:12 |
28c3-4818-en-evolving_custom_communication_protocols.mp3.sha1 | 99 B | 2011-12-30 19:07:09 |
28c3-4818-en-evolving_custom_communication_protocols.mp3 | 26.0 MiB | 2011-12-30 19:07:06 |
28c3-4817-en-string_oriented_programming.mp3.sha1 | 87 B | 2011-12-29 01:00:19 |
28c3-4817-en-string_oriented_programming.mp3 | 21.8 MiB | 2011-12-29 01:00:15 |
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.mp3.sha1 | 113 B | 2011-12-29 01:10:23 |
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.mp3 | 26.0 MiB | 2011-12-29 01:10:21 |
28c3-4814-en-behind_the_scenes_of_a_c64_demo.mp3.sha1 | 91 B | 2011-12-30 13:47:28 |
28c3-4814-en-behind_the_scenes_of_a_c64_demo.mp3 | 28.7 MiB | 2011-12-30 13:47:25 |
28c3-4813-en-macro_dragnets.mp3.sha1 | 74 B | 2011-12-29 00:56:30 |
28c3-4813-en-macro_dragnets.mp3 | 27.5 MiB | 2011-12-29 00:56:27 |
28c3-4811-en-rootkits_in_your_web_application.mp3.sha1 | 92 B | 2011-12-28 23:46:12 |
28c3-4811-en-rootkits_in_your_web_application.mp3 | 25.6 MiB | 2011-12-28 23:46:08 |
28c3-4804-de-politik_hacken.mp3.sha1 | 74 B | 2011-12-29 02:24:17 |
28c3-4804-de-politik_hacken.mp3 | 26.2 MiB | 2011-12-29 02:24:11 |
28c3-4802-en-towards_a_single_secure_european_cyberspace.mp3.sha1 | 103 B | 2011-12-30 13:44:45 |
28c3-4802-en-towards_a_single_secure_european_cyberspace.mp3 | 24.5 MiB | 2011-12-30 13:44:42 |
28c3-4800-en-how_governments_have_tried_to_block_tor.mp3.sha1 | 99 B | 2011-12-29 00:00:18 |
28c3-4800-en-how_governments_have_tried_to_block_tor.mp3 | 39.0 MiB | 2011-12-29 00:00:12 |
28c3-4799-de-can_trains_be_hacked.mp3.sha1 | 80 B | 2011-12-28 23:36:05 |
28c3-4799-de-can_trains_be_hacked.mp3 | 29.4 MiB | 2011-12-28 23:36:05 |
28c3-4798-en-sovereign_keys.mp3.sha1 | 74 B | 2011-12-30 10:54:19 |
28c3-4798-en-sovereign_keys.mp3 | 29.4 MiB | 2011-12-30 10:54:16 |
28c3-4788-de-datenvieh_oder_daten_fee.mp3.sha1 | 84 B | 2011-12-30 13:31:47 |
28c3-4788-de-datenvieh_oder_daten_fee.mp3 | 30.9 MiB | 2011-12-30 13:31:41 |
28c3-4781-en-deceiving_authorship_detection.mp3.sha1 | 90 B | 2011-12-30 12:42:32 |
28c3-4781-en-deceiving_authorship_detection.mp3 | 27.2 MiB | 2011-12-30 12:42:30 |
28c3-4780-en-print_me_if_you_dare.mp3.sha1 | 80 B | 2011-12-30 13:34:42 |
28c3-4780-en-print_me_if_you_dare.mp3 | 28.9 MiB | 2011-12-30 13:34:35 |
28c3-4777-en-r0ket.mp3.sha1 | 65 B | 2011-12-28 23:38:07 |
28c3-4777-en-r0ket.mp3 | 22.4 MiB | 2011-12-28 23:38:05 |
28c3-4775-de-hacker_jeopardy.mp3.sha1 | 75 B | 2011-12-29 01:54:20 |
28c3-4775-de-hacker_jeopardy.mp3 | 53.0 MiB | 2011-12-29 01:54:09 |
28c3-4770-en-dont_scan_just_ask.mp3.sha1 | 78 B | 2011-12-29 00:30:22 |
28c3-4770-en-dont_scan_just_ask.mp3 | 11.9 MiB | 2011-12-29 00:30:18 |
28c3-4768-en-eating_in_the_anthropocene.mp3.sha1 | 86 B | 2011-12-28 23:44:12 |
28c3-4768-en-eating_in_the_anthropocene.mp3 | 26.0 MiB | 2011-12-28 23:44:08 |
28c3-4767-en-security_log_visualization_with_a_correlation_engine.mp3.sha1 | 112 B | 2011-12-29 17:02:12 |
28c3-4767-en-security_log_visualization_with_a_correlation_engine.mp3 | 11.7 MiB | 2011-12-29 17:02:12 |
28c3-4766-en-802_11_packets_in_packets.mp3.sha1 | 85 B | 2011-12-29 00:20:20 |
28c3-4766-en-802_11_packets_in_packets.mp3 | 26.0 MiB | 2011-12-29 00:20:14 |
28c3-4764-en-automatic_algorithm_invention_with_a_gpu.mp3.sha1 | 100 B | 2011-12-29 00:18:19 |
28c3-4764-en-automatic_algorithm_invention_with_a_gpu.mp3 | 28.2 MiB | 2011-12-29 00:18:12 |
28c3-4763-en-the_science_of_insecurity.mp3.sha1 | 85 B | 2011-12-28 23:50:11 |
28c3-4763-en-the_science_of_insecurity.mp3 | 27.0 MiB | 2011-12-28 23:50:07 |
28c3-4761-en-new_ways_im_going_to_hack_your_web_app.mp3.sha1 | 98 B | 2011-12-30 13:41:37 |
28c3-4761-en-new_ways_im_going_to_hack_your_web_app.mp3 | 26.9 MiB | 2011-12-30 13:41:32 |
28c3-4760-en-chokepointproject.mp3.sha1 | 77 B | 2011-12-30 17:09:10 |
28c3-4760-en-chokepointproject.mp3 | 12.1 MiB | 2011-12-30 17:09:09 |
28c3-4759-en-open_source_music_tracking_2_0.mp3.sha1 | 90 B | 2011-12-30 13:17:46 |
28c3-4759-en-open_source_music_tracking_2_0.mp3 | 14.1 MiB | 2011-12-30 13:17:44 |
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.mp3.sha1 | 114 B | 2011-12-29 00:02:17 |
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.mp3 | 25.4 MiB | 2011-12-29 00:02:13 |
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.mp3.sha1 | 106 B | 2011-12-29 00:42:14 |
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.mp3 | 29.9 MiB | 2011-12-29 00:42:08 |
28c3-4755-en-counterlobbying_eu_institutions.mp3.sha1 | 91 B | 2011-12-29 02:30:21 |
28c3-4755-en-counterlobbying_eu_institutions.mp3 | 26.7 MiB | 2011-12-29 02:30:12 |
28c3-4754-en-smart_hacking_for_privacy.mp3.sha1 | 85 B | 2011-12-30 18:18:25 |
28c3-4754-en-smart_hacking_for_privacy.mp3 | 27.4 MiB | 2011-12-30 18:18:20 |
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.mp3.sha1 | 116 B | 2011-12-29 00:52:17 |
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.mp3 | 28.6 MiB | 2011-12-29 00:52:12 |
28c3-4749-en-does_hacktivism_matter.mp3.sha1 | 82 B | 2011-12-29 00:22:16 |
28c3-4749-en-does_hacktivism_matter.mp3 | 22.4 MiB | 2011-12-29 00:22:12 |
28c3-4748-en-the_best_of_the_oxcars.mp3.sha1 | 82 B | 2011-12-30 13:29:55 |
28c3-4748-en-the_best_of_the_oxcars.mp3 | 24.5 MiB | 2011-12-30 13:29:46 |
28c3-4746-en-bitcoin_an_analysis.mp3.sha1 | 79 B | 2011-12-30 12:36:34 |
28c3-4746-en-bitcoin_an_analysis.mp3 | 28.5 MiB | 2011-12-30 12:36:31 |
28c3-4742-en-from_press_freedom_to_the_freedom_of_information.mp3.sha1 | 108 B | 2011-12-30 16:41:18 |
28c3-4742-en-from_press_freedom_to_the_freedom_of_information.mp3 | 23.8 MiB | 2011-12-30 16:41:17 |
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.mp3.sha1 | 120 B | 2011-12-30 13:58:20 |
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.mp3 | 26.3 MiB | 2011-12-30 13:58:18 |
28c3-4740-de-frag_den_staat.mp3.sha1 | 74 B | 2011-12-29 17:28:12 |
28c3-4740-de-frag_den_staat.mp3 | 12.9 MiB | 2011-12-29 17:28:11 |
28c3-4738-de-echtes_netz.mp3.sha1 | 71 B | 2011-12-29 02:26:22 |
28c3-4738-de-echtes_netz.mp3 | 27.1 MiB | 2011-12-29 02:26:15 |
28c3-4736-en-defending_mobile_phones.mp3.sha1 | 83 B | 2011-12-29 00:58:21 |
28c3-4736-en-defending_mobile_phones.mp3 | 26.2 MiB | 2011-12-29 00:58:18 |
28c3-4735-en-reverse_engineering_a_qualcomm_baseband.mp3.sha1 | 99 B | 2011-12-29 02:32:21 |
28c3-4735-en-reverse_engineering_a_qualcomm_baseband.mp3 | 28.6 MiB | 2011-12-29 02:32:14 |
28c3-4732-en-datamining_for_hackers.mp3.sha1 | 82 B | 2011-12-28 23:34:13 |
28c3-4732-en-datamining_for_hackers.mp3 | 24.9 MiB | 2011-12-28 23:34:11 |
28c3-4730-en-crowdsourcing_genome_wide_association_studies.mp3.sha1 | 105 B | 2011-12-29 00:40:22 |
28c3-4730-en-crowdsourcing_genome_wide_association_studies.mp3 | 20.7 MiB | 2011-12-29 00:40:16 |
28c3-4723-en-dc_plus_the_protocol.mp3.sha1 | 80 B | 2011-12-30 17:11:20 |
28c3-4723-en-dc_plus_the_protocol.mp3 | 19.0 MiB | 2011-12-30 17:11:13 |
28c3-4722-de-dick_size_war_for_nerds.mp3.sha1 | 83 B | 2011-12-29 01:14:25 |
28c3-4722-de-dick_size_war_for_nerds.mp3 | 45.9 MiB | 2011-12-29 01:14:17 |
28c3-4721-en-pentanews_game_show_2k11.mp3.sha1 | 84 B | 2011-12-29 01:06:10 |
28c3-4721-en-pentanews_game_show_2k11.mp3 | 48.8 MiB | 2011-12-29 01:06:07 |
28c3-4713-en-what_is_in_a_name.mp3.sha1 | 77 B | 2011-12-28 23:42:10 |
28c3-4713-en-what_is_in_a_name.mp3 | 29.4 MiB | 2011-12-28 23:42:08 |
28c3-4712-en-mining_your_geotags.mp3.sha1 | 79 B | 2011-12-28 23:52:11 |
28c3-4712-en-mining_your_geotags.mp3 | 18.5 MiB | 2011-12-28 23:52:08 |
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.mp3.sha1 | 114 B | 2011-12-29 01:36:20 |
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.mp3 | 27.7 MiB | 2011-12-29 01:36:14 |
28c3-4710-en-the_future_of_cryptology.mp3.sha1 | 84 B | 2011-12-30 13:36:33 |
28c3-4710-en-the_future_of_cryptology.mp3 | 25.7 MiB | 2011-12-30 13:36:30 |
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.mp3.sha1 | 106 B | 2011-12-30 13:52:41 |
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.mp3 | 20.4 MiB | 2011-12-30 13:52:38 |
28c3-4706-en-power_gadgets_with_your_own_electricity.mp3.sha1 | 99 B | 2011-12-29 02:28:21 |
28c3-4706-en-power_gadgets_with_your_own_electricity.mp3 | 28.7 MiB | 2011-12-29 02:28:13 |
28c3-4700-en-what_is_whiteit.mp3.sha1 | 75 B | 2011-12-28 23:32:06 |
28c3-4700-en-what_is_whiteit.mp3 | 27.4 MiB | 2011-12-28 23:32:05 |
28c3-4699-en-building_a_distributed_satellite_ground_station_network.mp3.sha1 | 115 B | 2011-12-29 00:12:19 |
28c3-4699-en-building_a_distributed_satellite_ground_station_network.mp3 | 24.2 MiB | 2011-12-29 00:12:14 |
28c3-4688-en-introducing_osmo_gmr.mp3.sha1 | 80 B | 2011-12-30 13:37:49 |
28c3-4688-en-introducing_osmo_gmr.mp3 | 25.1 MiB | 2011-12-30 13:37:45 |
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.mp3.sha1 | 111 B | 2011-12-30 13:31:11 |
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.mp3 | 20.7 MiB | 2011-12-30 13:31:07 |
28c3-4680-en-effective_dos_attacks_against_web_application_platforms.mp3.sha1 | 115 B | 2011-12-29 00:34:23 |
28c3-4680-en-effective_dos_attacks_against_web_application_platforms.mp3 | 25.9 MiB | 2011-12-29 00:34:15 |
28c3-4676-en-apple_vs_google_client_platforms.mp3.sha1 | 92 B | 2011-12-29 00:06:14 |
28c3-4676-en-apple_vs_google_client_platforms.mp3 | 23.3 MiB | 2011-12-29 00:06:09 |
28c3-4675-de-politik_neusprech_2011.mp3.sha1 | 82 B | 2011-12-29 00:36:22 |
28c3-4675-de-politik_neusprech_2011.mp3 | 29.5 MiB | 2011-12-29 00:36:13 |
28c3-4669-en-bionic_ears.mp3.sha1 | 71 B | 2011-12-28 23:56:08 |
28c3-4669-en-bionic_ears.mp3 | 28.3 MiB | 2011-12-28 23:56:06 |
28c3-4668-en-electronic_money.mp3.sha1 | 76 B | 2011-12-30 13:20:34 |
28c3-4668-en-electronic_money.mp3 | 27.9 MiB | 2011-12-30 13:20:29 |
28c3-4663-en-cellular_protocol_stacks_for_internet.mp3.sha1 | 97 B | 2011-12-30 13:19:40 |
28c3-4663-en-cellular_protocol_stacks_for_internet.mp3 | 28.6 MiB | 2011-12-30 13:19:36 |
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.mp3.sha1 | 116 B | 2011-12-29 00:50:15 |
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.mp3 | 23.2 MiB | 2011-12-29 00:50:12 |
28c3-4660-en-post_memory_corruption_memory_analysis.mp3.sha1 | 98 B | 2011-12-29 00:04:17 |
28c3-4660-en-post_memory_corruption_memory_analysis.mp3 | 28.5 MiB | 2011-12-29 00:04:11 |
28c3-4656-en-ooops_i_hacked_my_pbx.mp3.sha1 | 81 B | 2011-12-30 13:15:49 |
28c3-4656-en-ooops_i_hacked_my_pbx.mp3 | 12.8 MiB | 2011-12-30 13:15:46 |
28c3-4652-en-data_mining_the_israeli_census.mp3.sha1 | 90 B | 2011-12-29 00:26:10 |
28c3-4652-en-data_mining_the_israeli_census.mp3 | 11.7 MiB | 2011-12-29 00:26:08 |
28c3-4648-en-quantum_of_science.mp3.sha1 | 78 B | 2011-12-30 17:16:10 |
28c3-4648-en-quantum_of_science.mp3 | 27.0 MiB | 2011-12-30 17:16:07 |
28c3-4640-en-time_is_on_my_side.mp3.sha1 | 78 B | 2011-12-28 23:58:11 |
28c3-4640-en-time_is_on_my_side.mp3 | 27.8 MiB | 2011-12-28 23:58:08 |
28c3-4587-en-bup_git_for_backups.mp3.sha1 | 79 B | 2011-12-30 17:07:16 |
28c3-4587-en-bup_git_for_backups.mp3 | 12.3 MiB | 2011-12-30 17:07:14 |
28c3-4581-en-taking_control_over_the_tor_network.mp3.sha1 | 95 B | 2011-12-29 16:58:07 |
28c3-4581-en-taking_control_over_the_tor_network.mp3 | 30.7 MiB | 2011-12-29 16:58:06 |