Parent directory/ | - | - |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4 | 350.0 MiB | 2011-01-02 21:13:21 |
27c3-4326-de-radio_der_zukunft.mp4 | 828.9 MiB | 2011-01-02 21:33:31 |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4 | 402.6 MiB | 2011-01-02 22:19:05 |
27c3-4017-en-desktop_on_the_linux.mp4 | 634.9 MiB | 2011-01-02 22:21:22 |
27c3-4181-en-sip_home_gateways_under_fire.mp4 | 307.6 MiB | 2011-01-02 22:29:28 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4 | 803.0 MiB | 2011-01-02 22:30:24 |
27c3-4211-en-chip_and_pin_is_broken.mp4 | 437.4 MiB | 2011-01-02 22:31:01 |
27c3-4141-de-hacker_jeopardy.mp4 | 1.6 GiB | 2011-01-02 23:14:23 |
27c3-4237-en-indect_eu_surveillance_project.mp4 | 959.7 MiB | 2011-01-02 23:15:42 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4 | 651.0 MiB | 2011-01-02 23:33:00 |
27c3-4003-en-cybernetics_for_the_masses.mp4 | 537.9 MiB | 2011-01-02 23:38:48 |
27c3-4221-en-omg_wtf_pdf.mp4 | 364.8 MiB | 2011-01-02 23:45:10 |
27c3-4334-en-fnord_jahresrueckblick.mp4 | 679.2 MiB | 2011-01-02 23:51:15 |
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4 | 782.3 MiB | 2011-01-02 23:52:35 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4 | 754.2 MiB | 2011-01-02 23:53:30 |
27c3-4070-de-fnord_jahresrueckblick.mp4 | 679.5 MiB | 2011-01-03 00:03:16 |
27c3-4244-en-critical_overview_of_10_years_pet.mp4 | 614.1 MiB | 2011-01-03 00:07:59 |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4.md5 | 99 B | 2011-01-03 00:11:03 |
27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4.sha1 | 107 B | 2011-01-03 00:11:20 |
27c3-4003-en-cybernetics_for_the_masses.mp4.md5 | 78 B | 2011-01-03 00:11:30 |
27c3-4003-en-cybernetics_for_the_masses.mp4.sha1 | 86 B | 2011-01-03 00:11:44 |
27c3-4017-en-desktop_on_the_linux.mp4.md5 | 72 B | 2011-01-03 00:12:00 |
27c3-4017-en-desktop_on_the_linux.mp4.sha1 | 80 B | 2011-01-03 00:12:26 |
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4.md5 | 103 B | 2011-01-03 00:12:46 |
27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4.sha1 | 111 B | 2011-01-03 00:13:31 |
27c3-4070-de-fnord_jahresrueckblick.mp4.md5 | 74 B | 2011-01-03 00:14:07 |
27c3-4070-de-fnord_jahresrueckblick.mp4.sha1 | 82 B | 2011-01-03 00:15:00 |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4.md5 | 96 B | 2011-01-03 00:15:34 |
27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4.sha1 | 104 B | 2011-01-03 00:16:33 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4.md5 | 98 B | 2011-01-03 00:20:12 |
27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4.sha1 | 106 B | 2011-01-03 00:21:14 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4.md5 | 92 B | 2011-01-03 00:21:54 |
27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4.sha1 | 100 B | 2011-01-03 00:23:32 |
27c3-4141-de-hacker_jeopardy.mp4.md5 | 67 B | 2011-01-03 00:24:37 |
27c3-4141-de-hacker_jeopardy.mp4.sha1 | 75 B | 2011-01-03 00:26:01 |
27c3-4181-en-sip_home_gateways_under_fire.mp4.md5 | 80 B | 2011-01-03 00:26:55 |
27c3-4181-en-sip_home_gateways_under_fire.mp4.sha1 | 88 B | 2011-01-03 00:27:17 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4.md5 | 102 B | 2011-01-03 00:27:38 |
27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4.sha1 | 110 B | 2011-01-03 00:28:07 |
27c3-4211-en-chip_and_pin_is_broken.mp4.md5 | 74 B | 2011-01-03 00:28:28 |
27c3-4211-en-chip_and_pin_is_broken.mp4.sha1 | 82 B | 2011-01-03 00:28:50 |
27c3-4221-en-omg_wtf_pdf.mp4.md5 | 63 B | 2011-01-03 00:29:04 |
27c3-4221-en-omg_wtf_pdf.mp4.sha1 | 71 B | 2011-01-03 00:29:15 |
27c3-4237-en-indect_eu_surveillance_project.mp4.md5 | 82 B | 2011-01-03 00:29:37 |
27c3-4237-en-indect_eu_surveillance_project.mp4.sha1 | 90 B | 2011-01-03 00:33:14 |
27c3-4244-en-critical_overview_of_10_years_pet.mp4.md5 | 85 B | 2011-01-03 00:34:28 |
27c3-4244-en-critical_overview_of_10_years_pet.mp4.sha1 | 93 B | 2011-01-03 00:36:11 |
27c3-4326-de-radio_der_zukunft.mp4.md5 | 69 B | 2011-01-03 00:37:11 |
27c3-4326-de-radio_der_zukunft.mp4.sha1 | 77 B | 2011-01-03 00:40:30 |
27c3-4334-en-fnord_jahresrueckblick.mp4.md5 | 74 B | 2011-01-03 00:42:04 |
27c3-4334-en-fnord_jahresrueckblick.mp4.sha1 | 82 B | 2011-01-03 00:44:05 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp4 | 578.4 MiB | 2011-01-03 10:08:40 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp4 | 856.2 MiB | 2011-01-03 11:46:41 |
27c3-3983-en-hackers_and_computer_science.mp4 | 353.4 MiB | 2011-01-03 12:03:43 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp4 | 265.7 MiB | 2011-01-03 12:11:12 |
27c3-4046-en-all_colours_are_beautiful.mp4 | 428.6 MiB | 2011-01-03 12:16:44 |
27c3-4011-en-embedded_reverse_engineering.mp4 | 818.8 MiB | 2011-01-03 12:22:34 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp4 | 463.0 MiB | 2011-01-03 22:00:27 |
27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4 | 884.0 MiB | 2011-01-03 22:28:24 |
27c3-4087-en-console_hacking_2010.mp4 | 275.0 MiB | 2011-01-03 22:46:57 |
27c3-4090-en-baseband_apocalypse.mp4 | 1009.8 MiB | 2011-01-03 23:12:02 |
27c3-4094-de-netzneutralitaet_und_qos.mp4 | 928.1 MiB | 2011-01-03 23:21:51 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp4 | 411.7 MiB | 2011-01-03 23:31:13 |
27c3-4333-en-hacker_jeopardy_translation.mp4 | 1.6 GiB | 2011-01-03 23:35:40 |
27c3-3983-en-hackers_and_computer_science.mp4.md5 | 80 B | 2011-01-04 00:24:37 |
27c3-3983-en-hackers_and_computer_science.mp4.sha1 | 88 B | 2011-01-04 00:24:50 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp4.md5 | 89 B | 2011-01-04 00:24:56 |
27c3-4006-en-diy_synthesizers_and_sound_generators.mp4.sha1 | 97 B | 2011-01-04 00:25:01 |
27c3-4011-en-embedded_reverse_engineering.mp4.md5 | 80 B | 2011-01-04 00:25:24 |
27c3-4011-en-embedded_reverse_engineering.mp4.sha1 | 88 B | 2011-01-04 00:25:50 |
27c3-4046-en-all_colours_are_beautiful.mp4.md5 | 77 B | 2011-01-04 00:26:07 |
27c3-4046-en-all_colours_are_beautiful.mp4.sha1 | 85 B | 2011-01-04 00:26:27 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp4.md5 | 84 B | 2011-01-04 00:26:43 |
27c3-4073-de-logikschaltungen_ohne_elektronik.mp4.sha1 | 92 B | 2011-01-04 00:27:05 |
27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4.md5 | 89 B | 2011-01-04 00:27:32 |
27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4.sha1 | 97 B | 2011-01-04 00:28:32 |
27c3-4087-en-console_hacking_2010.mp4.md5 | 72 B | 2011-01-04 00:29:09 |
27c3-4087-en-console_hacking_2010.mp4.sha1 | 80 B | 2011-01-04 00:29:47 |
27c3-4090-en-baseband_apocalypse.mp4.md5 | 71 B | 2011-01-04 00:30:30 |
27c3-4090-en-baseband_apocalypse.mp4.sha1 | 79 B | 2011-01-04 00:33:33 |
27c3-4094-de-netzneutralitaet_und_qos.mp4.md5 | 76 B | 2011-01-04 00:35:01 |
27c3-4094-de-netzneutralitaet_und_qos.mp4.sha1 | 84 B | 2011-01-04 00:38:24 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp4.md5 | 85 B | 2011-01-04 00:39:49 |
27c3-4231-en-datenrettung_fun_with_hard_drives.mp4.sha1 | 93 B | 2011-01-04 00:43:13 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp4.md5 | 82 B | 2011-01-04 00:43:59 |
27c3-4297-de-die_gesamte_technik_ist_sicher.mp4.sha1 | 90 B | 2011-01-04 00:45:24 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp4.md5 | 81 B | 2011-01-04 00:45:56 |
27c3-4302-en-27c3_keynote_we_come_in_peace.mp4.sha1 | 89 B | 2011-01-04 00:47:19 |
27c3-4333-en-hacker_jeopardy_translation.mp4.md5 | 79 B | 2011-01-04 00:49:08 |
27c3-4333-en-hacker_jeopardy_translation.mp4.sha1 | 87 B | 2011-01-04 00:53:11 |
27c3-4099-en-file_print_electronics.mp4 | 382.7 MiB | 2011-01-04 03:15:06 |
27c3-4338-de-wikileaks_und_mehr.mp4 | 640.6 MiB | 2011-01-04 12:50:46 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp4 | 675.4 MiB | 2011-01-04 15:25:15 |
27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4 | 766.0 MiB | 2011-01-04 15:44:18 |
27c3-4265-en-hacking_smart_phones.mp4 | 956.1 MiB | 2011-01-04 16:06:28 |
27c3-4299-en-closing_event.mp4 | 191.7 MiB | 2011-01-04 16:09:40 |
27c3-4060-en-attacking_mobile_phones.mp4 | 390.9 MiB | 2011-01-04 16:26:15 |
27c3-4253-en-pentanews_game_show.mp4 | 691.8 MiB | 2011-01-04 16:35:53 |
27c3-4123-en-defense_is_not_dead.mp4 | 912.1 MiB | 2011-01-04 17:04:14 |
27c3-4096-en-code_deobfuscation_by_optimization.mp4 | 469.0 MiB | 2011-01-04 21:05:29 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp4 | 968.9 MiB | 2011-01-04 22:57:39 |
27c3-4239-en-lightning_talks_d3.mp4 | 1.2 GiB | 2011-01-04 23:01:37 |
27c3-4236-en-international_cyber_jurisdiction.mp4 | 902.9 MiB | 2011-01-04 23:05:25 |
27c3-4230-de-security_nightmares.mp4 | 596.7 MiB | 2011-01-04 23:08:59 |
27c3-4234-en-usb_and_libusb.mp4 | 666.4 MiB | 2011-01-04 23:12:35 |
27c3-4208-en-wideband_gsm_sniffing.mp4 | 511.3 MiB | 2011-01-04 23:16:03 |
27c3-4187-en-your_infrastructure_will_kill_you.mp4 | 857.7 MiB | 2011-01-04 23:19:50 |
27c3-4195-de-literarischer_abend.mp4 | 844.1 MiB | 2011-01-04 23:23:35 |
27c3-4149-en-i_control_your_code.mp4 | 666.3 MiB | 2011-01-04 23:27:11 |
27c3-4142-en-nodejs_as_a_networking_tool.mp4 | 442.3 MiB | 2011-01-04 23:30:38 |
27c3-4190-en-data_retention_in_the_eu.mp4 | 602.7 MiB | 2011-01-04 23:34:09 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4 | 517.6 MiB | 2011-01-04 23:46:39 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp4 | 712.7 MiB | 2011-01-04 23:53:18 |
27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4.md5 | 101 B | 2011-01-05 00:12:07 |
27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4.sha1 | 109 B | 2011-01-05 00:12:33 |
27c3-4060-en-attacking_mobile_phones.mp4.md5 | 75 B | 2011-01-05 00:12:57 |
27c3-4060-en-attacking_mobile_phones.mp4.sha1 | 83 B | 2011-01-05 00:13:13 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp4.md5 | 80 B | 2011-01-05 00:13:32 |
27c3-4085-de-digitale_spaltung_per_gesetz.mp4.sha1 | 88 B | 2011-01-05 00:13:49 |
27c3-4096-en-code_deobfuscation_by_optimization.mp4.md5 | 86 B | 2011-01-05 00:14:06 |
27c3-4096-en-code_deobfuscation_by_optimization.mp4.sha1 | 94 B | 2011-01-05 00:14:18 |
27c3-4099-en-file_print_electronics.mp4.md5 | 74 B | 2011-01-05 00:14:29 |
27c3-4099-en-file_print_electronics.mp4.sha1 | 82 B | 2011-01-05 00:14:38 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp4.md5 | 81 B | 2011-01-05 00:14:57 |
27c3-4121-en-is_the_ssliverse_a_safe_place.mp4.sha1 | 89 B | 2011-01-05 00:15:40 |
27c3-4123-en-defense_is_not_dead.mp4.md5 | 71 B | 2011-01-05 00:16:42 |
27c3-4123-en-defense_is_not_dead.mp4.sha1 | 79 B | 2011-01-05 00:17:37 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4.md5 | 95 B | 2011-01-05 00:18:05 |
27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4.sha1 | 103 B | 2011-01-05 00:18:34 |
27c3-4142-en-nodejs_as_a_networking_tool.mp4.md5 | 79 B | 2011-01-05 00:19:09 |
27c3-4142-en-nodejs_as_a_networking_tool.mp4.sha1 | 87 B | 2011-01-05 00:19:35 |
27c3-4149-en-i_control_your_code.mp4.md5 | 71 B | 2011-01-05 00:21:19 |
27c3-4149-en-i_control_your_code.mp4.sha1 | 79 B | 2011-01-05 00:22:09 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp4.md5 | 101 B | 2011-01-05 00:23:20 |
27c3-4160-en-automatic_identification_cryptographic_primitives.mp4.sha1 | 109 B | 2011-01-05 00:24:08 |
27c3-4187-en-your_infrastructure_will_kill_you.mp4.md5 | 85 B | 2011-01-05 00:24:54 |
27c3-4187-en-your_infrastructure_will_kill_you.mp4.sha1 | 93 B | 2011-01-05 00:25:34 |
27c3-4190-en-data_retention_in_the_eu.mp4.md5 | 76 B | 2011-01-05 00:26:12 |
27c3-4190-en-data_retention_in_the_eu.mp4.sha1 | 84 B | 2011-01-05 00:26:30 |
27c3-4195-de-literarischer_abend.mp4.md5 | 71 B | 2011-01-05 00:26:52 |
27c3-4195-de-literarischer_abend.mp4.sha1 | 79 B | 2011-01-05 00:27:18 |
27c3-4208-en-wideband_gsm_sniffing.mp4.md5 | 73 B | 2011-01-05 00:27:42 |
27c3-4208-en-wideband_gsm_sniffing.mp4.sha1 | 81 B | 2011-01-05 00:27:58 |
27c3-4230-de-security_nightmares.mp4.md5 | 71 B | 2011-01-05 00:28:19 |
27c3-4230-de-security_nightmares.mp4.sha1 | 79 B | 2011-01-05 00:28:38 |
27c3-4234-en-usb_and_libusb.mp4.md5 | 66 B | 2011-01-05 00:29:01 |
27c3-4234-en-usb_and_libusb.mp4.sha1 | 74 B | 2011-01-05 00:29:23 |
27c3-4236-en-international_cyber_jurisdiction.mp4.md5 | 84 B | 2011-01-05 00:29:48 |
27c3-4236-en-international_cyber_jurisdiction.mp4.sha1 | 92 B | 2011-01-05 00:30:09 |
27c3-4239-en-lightning_talks_d3.mp4.md5 | 70 B | 2011-01-05 00:30:48 |
27c3-4239-en-lightning_talks_d3.mp4.sha1 | 78 B | 2011-01-05 00:32:03 |
27c3-4253-en-pentanews_game_show.mp4.md5 | 71 B | 2011-01-05 00:36:07 |
27c3-4253-en-pentanews_game_show.mp4.sha1 | 79 B | 2011-01-05 00:37:03 |
27c3-4265-en-hacking_smart_phones.mp4.md5 | 72 B | 2011-01-05 00:38:10 |
27c3-4265-en-hacking_smart_phones.mp4.sha1 | 80 B | 2011-01-05 00:39:37 |
27c3-4299-en-closing_event.mp4.md5 | 65 B | 2011-01-05 00:40:29 |
27c3-4299-en-closing_event.mp4.sha1 | 73 B | 2011-01-05 00:40:49 |
27c3-4338-de-wikileaks_und_mehr.mp4.md5 | 70 B | 2011-01-05 00:41:46 |
27c3-4338-de-wikileaks_und_mehr.mp4.sha1 | 78 B | 2011-01-05 00:42:47 |
27c3-4176-de-hacking_ibuttons.mp4 | 777.5 MiB | 2011-01-05 18:46:27 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp4 | 424.9 MiB | 2011-01-05 18:49:43 |
27c3-4183-en-safety_on_open_sea.mp4 | 1.1 GiB | 2011-01-05 18:51:25 |
27c3-4174-en-the_hidden_nemesis.mp4 | 624.7 MiB | 2011-01-05 18:52:00 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp4 | 1.1 GiB | 2011-01-05 18:53:59 |
27c3-4144-en-short_political_history_of_acoustics.mp4 | 711.5 MiB | 2011-01-05 18:55:18 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4 | 659.9 MiB | 2011-01-05 18:55:59 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp4 | 915.2 MiB | 2011-01-05 19:25:50 |
27c3-4144-en-short_political_history_of_acoustics.mp4.md5 | 88 B | 2011-01-05 19:32:28 |
27c3-4144-en-short_political_history_of_acoustics.mp4.sha1 | 96 B | 2011-01-05 19:33:11 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp4.md5 | 87 B | 2011-01-05 19:33:38 |
27c3-4145-en-spoilers_human_interfaces_airplanes.mp4.sha1 | 95 B | 2011-01-05 19:34:33 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp4.md5 | 100 B | 2011-01-05 19:34:56 |
27c3-4168-en-automated_architecture_independent_gadget_search.mp4.sha1 | 108 B | 2011-01-05 19:35:10 |
27c3-4174-en-the_hidden_nemesis.mp4.md5 | 70 B | 2011-01-05 19:35:23 |
27c3-4174-en-the_hidden_nemesis.mp4.sha1 | 78 B | 2011-01-05 19:35:47 |
27c3-4176-de-hacking_ibuttons.mp4.md5 | 68 B | 2011-01-05 19:36:14 |
27c3-4176-de-hacking_ibuttons.mp4.sha1 | 76 B | 2011-01-05 19:36:53 |
27c3-4183-en-safety_on_open_sea.mp4.md5 | 70 B | 2011-01-05 19:37:36 |
27c3-4183-en-safety_on_open_sea.mp4.sha1 | 78 B | 2011-01-05 19:39:00 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4.md5 | 100 B | 2011-01-05 19:39:37 |
27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4.sha1 | 108 B | 2011-01-05 19:40:11 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp4.md5 | 77 B | 2011-01-05 19:41:04 |
27c3-4298-de-ccc_jahresrueckblick_2010.mp4.sha1 | 85 B | 2011-01-05 19:42:00 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp4 | 440.3 MiB | 2011-01-08 11:30:22 |
27c3-3957-en-ipv6_insecurities.mp4 | 671.7 MiB | 2011-01-08 12:17:53 |
27c3-4164-de-friede_sei_mit_euren_daten.mp4 | 673.6 MiB | 2011-01-08 12:25:08 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4 | 835.6 MiB | 2011-01-08 12:59:53 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4 | 510.1 MiB | 2011-01-08 13:31:09 |
27c3-4140-en-contemporary_profiling_of_web_users.mp4 | 565.9 MiB | 2011-01-08 13:40:02 |
27c3-4175-en-from_robot_to_robot.mp4 | 571.8 MiB | 2011-01-08 13:44:03 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp4 | 529.3 MiB | 2011-01-08 13:46:28 |
27c3-4125-de-spinning_the_electronic_wheel.mp4 | 844.3 MiB | 2011-01-08 13:50:53 |
27c3-4210-en-lying_to_the_neighbours.mp4 | 459.7 MiB | 2011-01-08 14:01:23 |
27c3-4296-en-lightning_days_d2.mp4 | 795.0 MiB | 2011-01-08 14:06:05 |
27c3-4159-en-reverse_engineering_mos_6502.mp4 | 341.6 MiB | 2011-01-08 14:07:54 |
27c3-4082-en-sap_landscape.mp4 | 748.6 MiB | 2011-01-08 15:00:16 |
27c3-4206-en-immi_from_concept_to_reality.mp4 | 513.2 MiB | 2011-01-08 15:02:35 |
27c3-4295-en-high_speed_high_security_cryptography.mp4 | 424.4 MiB | 2011-01-08 15:07:23 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4 | 479.9 MiB | 2011-01-08 15:42:12 |
27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4 | 384.1 MiB | 2011-01-08 15:54:28 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4 | 679.3 MiB | 2011-01-08 16:04:22 |
27c3-4018-en-frozencache.mp4 | 688.9 MiB | 2011-01-08 16:18:35 |
27c3-4300-en-lightning_talks_d4.mp4 | 1.1 GiB | 2011-01-08 16:56:21 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4 | 865.1 MiB | 2011-01-08 17:18:10 |
27c3-4151-en-android_geolocation_using_gsm_network.mp4 | 801.3 MiB | 2011-01-08 17:20:46 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4 | 671.0 MiB | 2011-01-08 17:31:37 |
27c3-4339-en-openleaks.mp4 | 874.3 MiB | 2011-01-08 17:37:21 |
27c3-4263-en-resisting_excessive_government_surveillance.mp4 | 745.5 MiB | 2011-01-08 17:42:44 |
27c3-4193-en-having_fun_with_rtp.mp4 | 378.8 MiB | 2011-01-08 19:19:51 |
27c3-4261-en-key_recovery_attacks_rc4.mp4 | 393.4 MiB | 2011-01-08 19:32:29 |
27c3-4301-en-flow_analysis_of_internet_activities.mp4 | 578.7 MiB | 2011-01-08 19:42:06 |
27c3-3957-en-ipv6_insecurities.mp4.md5 | 69 B | 2011-01-08 22:09:55 |
27c3-3957-en-ipv6_insecurities.mp4.sha1 | 77 B | 2011-01-08 22:10:30 |
27c3-4018-en-frozencache.mp4.md5 | 63 B | 2011-01-08 22:10:49 |
27c3-4018-en-frozencache.mp4.sha1 | 71 B | 2011-01-08 22:11:04 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4.md5 | 95 B | 2011-01-08 22:11:19 |
27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4.sha1 | 103 B | 2011-01-08 22:11:31 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4.md5 | 93 B | 2011-01-08 22:11:47 |
27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4.sha1 | 101 B | 2011-01-08 22:12:20 |
27c3-4082-en-sap_landscape.mp4.md5 | 65 B | 2011-01-08 22:12:57 |
27c3-4082-en-sap_landscape.mp4.sha1 | 73 B | 2011-01-08 22:13:20 |
27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4.md5 | 91 B | 2011-01-08 22:13:41 |
27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4.sha1 | 99 B | 2011-01-08 22:13:53 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp4.md5 | 89 B | 2011-01-08 22:14:06 |
27c3-4103-en-copyright_enforcement_versus_freedoms.mp4.sha1 | 97 B | 2011-01-08 22:14:24 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4.md5 | 82 B | 2011-01-08 22:14:59 |
27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4.sha1 | 90 B | 2011-01-08 22:15:31 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4.md5 | 95 B | 2011-01-08 22:16:06 |
27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4.sha1 | 103 B | 2011-01-08 22:16:27 |
27c3-4125-de-spinning_the_electronic_wheel.mp4.md5 | 81 B | 2011-01-08 22:16:50 |
27c3-4125-de-spinning_the_electronic_wheel.mp4.sha1 | 89 B | 2011-01-08 22:17:08 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4.md5 | 101 B | 2011-01-08 22:17:28 |
27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4.sha1 | 109 B | 2011-01-08 22:17:42 |
27c3-4140-en-contemporary_profiling_of_web_users.mp4.md5 | 87 B | 2011-01-08 22:17:54 |
27c3-4140-en-contemporary_profiling_of_web_users.mp4.sha1 | 95 B | 2011-01-08 22:18:07 |
27c3-4151-en-android_geolocation_using_gsm_network.mp4.md5 | 89 B | 2011-01-08 22:18:30 |
27c3-4151-en-android_geolocation_using_gsm_network.mp4.sha1 | 97 B | 2011-01-08 22:18:58 |
27c3-4159-en-reverse_engineering_mos_6502.mp4.md5 | 80 B | 2011-01-08 22:19:30 |
27c3-4159-en-reverse_engineering_mos_6502.mp4.sha1 | 88 B | 2011-01-08 22:19:43 |
27c3-4164-de-friede_sei_mit_euren_daten.mp4.md5 | 78 B | 2011-01-08 22:20:16 |
27c3-4164-de-friede_sei_mit_euren_daten.mp4.sha1 | 86 B | 2011-01-08 22:20:53 |
27c3-4175-en-from_robot_to_robot.mp4.md5 | 71 B | 2011-01-08 22:21:28 |
27c3-4175-en-from_robot_to_robot.mp4.sha1 | 79 B | 2011-01-08 22:21:52 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4.md5 | 83 B | 2011-01-08 22:22:23 |
27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4.sha1 | 91 B | 2011-01-08 22:22:41 |
27c3-4193-en-having_fun_with_rtp.mp4.md5 | 71 B | 2011-01-08 22:23:24 |
27c3-4193-en-having_fun_with_rtp.mp4.sha1 | 79 B | 2011-01-08 22:23:48 |
27c3-4206-en-immi_from_concept_to_reality.mp4.md5 | 80 B | 2011-01-08 22:24:55 |
27c3-4206-en-immi_from_concept_to_reality.mp4.sha1 | 88 B | 2011-01-08 22:25:15 |
27c3-4210-en-lying_to_the_neighbours.mp4.md5 | 75 B | 2011-01-08 22:25:42 |
27c3-4210-en-lying_to_the_neighbours.mp4.sha1 | 83 B | 2011-01-08 22:26:11 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp4.md5 | 83 B | 2011-01-08 22:26:49 |
27c3-4245-en-adventures_in_analyzing_stuxnet.mp4.sha1 | 91 B | 2011-01-08 22:27:02 |
27c3-4261-en-key_recovery_attacks_rc4.mp4.md5 | 76 B | 2011-01-08 22:27:19 |
27c3-4261-en-key_recovery_attacks_rc4.mp4.sha1 | 84 B | 2011-01-08 22:27:32 |
27c3-4263-en-resisting_excessive_government_surveillance.mp4.md5 | 95 B | 2011-01-08 22:27:55 |
27c3-4263-en-resisting_excessive_government_surveillance.mp4.sha1 | 103 B | 2011-01-08 22:28:11 |
27c3-4295-en-high_speed_high_security_cryptography.mp4.md5 | 89 B | 2011-01-08 22:29:45 |
27c3-4295-en-high_speed_high_security_cryptography.mp4.sha1 | 97 B | 2011-01-08 22:29:56 |
27c3-4296-en-lightning_days_d2.mp4.md5 | 69 B | 2011-01-08 22:30:10 |
27c3-4296-en-lightning_days_d2.mp4.sha1 | 77 B | 2011-01-08 22:30:33 |
27c3-4300-en-lightning_talks_d4.mp4.md5 | 70 B | 2011-01-08 22:30:59 |
27c3-4300-en-lightning_talks_d4.mp4.sha1 | 78 B | 2011-01-08 22:31:27 |
27c3-4301-en-flow_analysis_of_internet_activities.mp4.md5 | 88 B | 2011-01-08 22:32:13 |
27c3-4301-en-flow_analysis_of_internet_activities.mp4.sha1 | 96 B | 2011-01-08 22:32:57 |
27c3-4339-en-openleaks.mp4.md5 | 61 B | 2011-01-08 22:33:49 |
27c3-4339-en-openleaks.mp4.sha1 | 69 B | 2011-01-08 22:34:25 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4 | 587.3 MiB | 2011-01-10 15:33:54 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4.md5 | 103 B | 2011-01-10 15:43:00 |
27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4.sha1 | 111 B | 2011-01-10 15:43:12 |
27c3-4061-en-building_custom_disassemblers.mp4 | 589.7 MiB | 2011-01-12 12:02:04 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp4 | 563.6 MiB | 2011-01-12 12:22:35 |
27c3-4061-en-building_custom_disassemblers.mp4.md5 | 81 B | 2011-01-12 12:25:34 |
27c3-4061-en-building_custom_disassemblers.mp4.sha1 | 89 B | 2011-01-12 12:25:47 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp4.md5 | 81 B | 2011-01-12 12:26:20 |
27c3-4184-de-stanislaw_lem_weltverbesserer.mp4.sha1 | 89 B | 2011-01-12 12:26:31 |
27c3-4276-en-cognitive_psychology_for_hackers.mp4 | 999.8 MiB | 2011-01-13 22:18:01 |
27c3-4276-en-cognitive_psychology_for_hackers.mp4.md5 | 84 B | 2011-01-13 23:46:21 |
27c3-4276-en-cognitive_psychology_for_hackers.mp4.sha1 | 92 B | 2011-01-13 23:46:51 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4 | 1.0 GiB | 2011-01-18 13:48:55 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4.md5 | 95 B | 2011-01-18 20:58:10 |
27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4.sha1 | 103 B | 2011-01-18 20:59:03 |
27c3.mp4.all.md5 | 7.5 KiB | 2011-01-19 00:25:52 |
27c3.mp4.all.sha1 | 8.2 KiB | 2011-01-19 00:51:37 |
27c3-4143-en-parttimescientists.mp4 | 448.2 MiB | 2011-01-31 12:37:53 |
27c3-4143-en-parttimescientists.mp4.md5 | 70 B | 2011-02-06 13:50:25 |
27c3-4143-en-parttimescientists.mp4.sha1 | 78 B | 2011-02-06 13:50:34 |