23C3-complete-Video-Recordings-4-iPod

23C3-complete-Video-Recordings-4-iPod

File Size: 26.17 GB

Creat Time: 2008-01-11 04:39:07

Last Active: 2024-11-21 17:56:03

Active Degree: 1

Magnet Link: Magnet LinkMagnet Link

Statement: This site does not provide download links, only text displays, and does not contain any infringement.

File List:

  1. 23C3 1420 Analysis of a strong Random Number Generator - by anatomizing Linux CPRNG.m4v 670.56 MB
  2. 23C3 1517 Lightning Talks Day 4.m4v 621.15 MB
  3. 23C3 1710 Tap the Electronic Frontier Foundation - EFF staffers answer your questions.m4v 618.91 MB
  4. 23C3 1683 Powerpoint Karaoke.m4v 462.23 MB
  5. 23C3 1759 Schlossoeffnung bei der Staatssicherheit der DDR - Werkzeuge und Vorgehen der STASI.m4v 439.54 MB
  6. 23C3 1566 OpenPCD, OpenPICC - Free RFID reader and emulator.m4v 409.86 MB
  7. 23C3 1567 Hacker Jeopardy - The one and only hacker quizshow.m4v 392.34 MB
  8. 23C3 1419 Java wird Groovy - Eine Einfuehrung in die neue, dynamische Sprache fuer das Java-Oekosystem.m4v 381.11 MB
  9. 23C3 1444 Tor and China - Design of a blocking-resistant anonymity system.m4v 353.81 MB
  10. 23C3 1461 The Grim Meathook Future - How the Tech Culture Can Maintain Relevance in the 21st Century.m4v 348.45 MB
  11. 23C3 1346 Sie haben das Recht zu schweigen - Durchsuchung, Beschlagnahme, Vernehmung, Strategien fuer den Umgang mit Polizei.m4v 348.13 MB
  12. 23C3 1423 We don't trust voting computers - The story of the dutch campaign against black-box voting.m4v 335.56 MB
  13. 23C3 1607 A Probabilistic Trust Model for GnuPG - A new way of evaluating a PGP web of trust.m4v 322.17 MB
  14. 23C3 1596 Building an Open Source PKI using OpenXPKI - Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs.m4v 321.42 MB
  15. 23C3 1616 Nerds und Geeks zwischen Stereotyp und Subkultur.m4v 312.89 MB
  16. 23C3 1760 On Free, and the Differences between Culture and Code.m4v 303.90 MB
  17. 23C3 1256 Who can you trust - Opening Ceremony and Keynote.m4v 297.50 MB
  18. 23C3 1452 Chaos und Kritische Theorie - Adorno, Wilson und Diskordianismus.m4v 296.04 MB
  19. 23C3 1724 Transparency and Privacy - The 7 Laws of Identity and the Identity Metasystem.m4v 295.70 MB
  20. 23C3 1608 Vehicular Communication and VANETs - The future and security of communicating vehicles.m4v 295.44 MB
  21. 23C3 1381 Stealth malware, can good guys win - Challenges in detecting system compromises and why we're so far behind.m4v 289.06 MB
  22. 23C3 1433 How To Design A Decent User Interface - Take a look at software from a user's point of view.m4v 288.29 MB
  23. 23C3 1602 Subverting Ajax - Next generation vulnerabilities in 2.0 Web Applications.m4v 282.65 MB
  24. 23C3 1721 Software Protection and the TPM - The Mac OS X Story.m4v 281.77 MB
  25. 23C3 1514 Lighting Talks Day 1.m4v 270.82 MB
  26. 23C3 1682 Hacking the Electoral Law.m4v 261.78 MB
  27. 23C3 1622 Void the warranty - How to start analyzing blackboxes.m4v 259.05 MB
  28. 23C3 1708 TV-B-Gone - Better Living Through Inventing.m4v 258.05 MB
  29. 23C3 1457 Security in the cardholder data processing - Experiences and lessons learned with the Payment Card Industry.m4v 257.93 MB
  30. 23C3 1738 MMORPGs - The state and future of the World of Warcraft.m4v 254.48 MB
  31. 23C3 1680 Das neue gesetzliche Verbot des Hackings - Praktische Auswirkungen des neuen Strafrechtes.m4v 252.88 MB
  32. 23C3 1597 A Hacker's Toolkit for RFID Emulation and Jamming.m4v 252.16 MB
  33. 23C3 1714 Warum wir uns so gerne ueberwachen lassen - Erhellendes aus Philosophie und Soziologie zur Klaerung des Phaenomens.m4v 251.76 MB
  34. 23C3 1688 Rootkits as Reversing Tools - An Anonymous Talk.m4v 249.64 MB
  35. 23C3 1685 Go, das Spiel fuer die Menschen - Auch fuer Computer, Nicht beim Go.m4v 248.03 MB
  36. 23C3 1758 Fuzzing in the corporate world - The use of fuzzing in the corporate world over the years and recent implementation.m4v 247.81 MB
  37. 23C3 1454 A Natural Language Database Interface using Fuzzy Semantics.m4v 244.97 MB
  38. 23C3 1561 4+2+1 Jahre BigBrotherAward Deutschland - Eine Lesung aus dem Buch Schwarzbuch Datenschutz.m4v 244.47 MB
  39. 23C3 1502 The gift of sharing - A critical approach to the notion of gift economy.m4v 242.91 MB
  40. 23C3 1656 Design and Implementation of an object-orientated, secure TCP IP Stack - Ethereal W Wireshark without remote exploits.m4v 242.51 MB
  41. 23C3 1520 Counter-Development - The Accessibility of Technology as an Addendum to Engineering Ethics.m4v 242.26 MB
  42. 23C3 1663 Gueter und Personen tracken, Lokalisierung im Pizzamann-Universum - Technische Mittel und soziale Aspekte des Tracking and Tracing.m4v 240.17 MB
  43. 23C3 1416 Juristische Fragen um die Mitbenutzung fremder WLANs - Zivilrechtliche und strafrechtliche Haftung.m4v 239.13 MB
  44. 23C3 1487 CCC Jahresrueckblick - Ein Ueberblick ueber die Aktivitaeten des Clubs 2006.m4v 238.64 MB
  45. 23C3 1713 Black Ops 2006 Viz Edition - Pixel Fuzzing and the Bioinformatic Bindiff.m4v 237.71 MB
  46. 23C3 1456 Unusual bugs.m4v 236.73 MB
  47. 23C3 1733 Bluetooth Hacking Revisited.m4v 234.47 MB
  48. 23C3 1605 Digitale Bildforensik - Spuren in Digitalfotos.m4v 231.25 MB
  49. 23C3 1513 Detecting temperature through clock skew - Hot or not, defeating anonymity by monitoring clock skew.m4v 231.17 MB
  50. 23C3 1516 Lightning Talks Day 3.m4v 231.16 MB