Index of /cdn.media.ccc.de/congress/2011/mp3-audio-only
Name Last modified Size Description
Parent Directory -
28c3-4581-en-taking_control_over_the_tor_network.mp3 2011-12-29 17:58 31M
28c3-4581-en-taking_control_over_the_tor_network.mp3.sha1 2011-12-29 17:58 95
28c3-4587-en-bup_git_for_backups.mp3 2011-12-30 18:07 12M
28c3-4587-en-bup_git_for_backups.mp3.sha1 2011-12-30 18:07 79
28c3-4640-en-time_is_on_my_side.mp3 2011-12-29 00:58 28M
28c3-4640-en-time_is_on_my_side.mp3.sha1 2011-12-29 00:58 78
28c3-4648-en-quantum_of_science.mp3 2011-12-30 18:16 27M
28c3-4648-en-quantum_of_science.mp3.sha1 2011-12-30 18:16 78
28c3-4652-en-data_mining_the_israeli_census.mp3 2011-12-29 01:26 12M
28c3-4652-en-data_mining_the_israeli_census.mp3.sha1 2011-12-29 01:26 90
28c3-4656-en-ooops_i_hacked_my_pbx.mp3 2011-12-30 14:15 13M
28c3-4656-en-ooops_i_hacked_my_pbx.mp3.sha1 2011-12-30 14:15 81
28c3-4660-en-post_memory_corruption_memory_analysis.mp3 2011-12-29 01:04 29M
28c3-4660-en-post_memory_corruption_memory_analysis.mp3.sha1 2011-12-29 01:04 98
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.mp3 2011-12-29 01:50 23M
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities.mp3.sha1 2011-12-29 01:50 116
28c3-4663-en-cellular_protocol_stacks_for_internet.mp3 2011-12-30 14:19 29M
28c3-4663-en-cellular_protocol_stacks_for_internet.mp3.sha1 2011-12-30 14:19 97
28c3-4668-en-electronic_money.mp3 2011-12-30 14:20 28M
28c3-4668-en-electronic_money.mp3.sha1 2011-12-30 14:20 76
28c3-4669-en-bionic_ears.mp3 2011-12-29 00:56 28M
28c3-4669-en-bionic_ears.mp3.sha1 2011-12-29 00:56 71
28c3-4675-de-politik_neusprech_2011.mp3 2011-12-29 01:36 30M
28c3-4675-de-politik_neusprech_2011.mp3.sha1 2011-12-29 01:36 82
28c3-4676-en-apple_vs_google_client_platforms.mp3 2011-12-29 01:06 23M
28c3-4676-en-apple_vs_google_client_platforms.mp3.sha1 2011-12-29 01:06 92
28c3-4680-en-effective_dos_attacks_against_web_application_platforms.mp3 2011-12-29 01:34 26M
28c3-4680-en-effective_dos_attacks_against_web_application_platforms.mp3.sha1 2011-12-29 01:34 115
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.mp3 2011-12-30 14:31 21M
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links.mp3.sha1 2011-12-30 14:31 111
28c3-4688-en-introducing_osmo_gmr.mp3 2011-12-30 14:37 25M
28c3-4688-en-introducing_osmo_gmr.mp3.sha1 2011-12-30 14:37 80
28c3-4699-en-building_a_distributed_satellite_ground_station_network.mp3 2011-12-29 01:12 24M
28c3-4699-en-building_a_distributed_satellite_ground_station_network.mp3.sha1 2011-12-29 01:12 115
28c3-4700-en-what_is_whiteit.mp3 2011-12-29 00:32 27M
28c3-4700-en-what_is_whiteit.mp3.sha1 2011-12-29 00:32 75
28c3-4706-en-power_gadgets_with_your_own_electricity.mp3 2011-12-29 03:28 29M
28c3-4706-en-power_gadgets_with_your_own_electricity.mp3.sha1 2011-12-29 03:28 99
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.mp3 2011-12-30 14:52 20M
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned.mp3.sha1 2011-12-30 14:52 106
28c3-4710-en-the_future_of_cryptology.mp3 2011-12-30 14:36 26M
28c3-4710-en-the_future_of_cryptology.mp3.sha1 2011-12-30 14:36 84
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.mp3 2011-12-29 02:36 28M
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk.mp3.sha1 2011-12-29 02:36 114
28c3-4712-en-mining_your_geotags.mp3 2011-12-29 00:52 18M
28c3-4712-en-mining_your_geotags.mp3.sha1 2011-12-29 00:52 79
28c3-4713-en-what_is_in_a_name.mp3 2011-12-29 00:42 29M
28c3-4713-en-what_is_in_a_name.mp3.sha1 2011-12-29 00:42 77
28c3-4721-en-pentanews_game_show_2k11.mp3 2011-12-29 02:06 49M
28c3-4721-en-pentanews_game_show_2k11.mp3.sha1 2011-12-29 02:06 84
28c3-4722-de-dick_size_war_for_nerds.mp3 2011-12-29 02:14 46M
28c3-4722-de-dick_size_war_for_nerds.mp3.sha1 2011-12-29 02:14 83
28c3-4723-en-dc_plus_the_protocol.mp3 2011-12-30 18:11 19M
28c3-4723-en-dc_plus_the_protocol.mp3.sha1 2011-12-30 18:11 80
28c3-4730-en-crowdsourcing_genome_wide_association_studies.mp3 2011-12-29 01:40 21M
28c3-4730-en-crowdsourcing_genome_wide_association_studies.mp3.sha1 2011-12-29 01:40 105
28c3-4732-en-datamining_for_hackers.mp3 2011-12-29 00:34 25M
28c3-4732-en-datamining_for_hackers.mp3.sha1 2011-12-29 00:34 82
28c3-4735-en-reverse_engineering_a_qualcomm_baseband.mp3 2011-12-29 03:32 29M
28c3-4735-en-reverse_engineering_a_qualcomm_baseband.mp3.sha1 2011-12-29 03:32 99
28c3-4736-en-defending_mobile_phones.mp3 2011-12-29 01:58 26M
28c3-4736-en-defending_mobile_phones.mp3.sha1 2011-12-29 01:58 83
28c3-4738-de-echtes_netz.mp3 2011-12-29 03:26 27M
28c3-4738-de-echtes_netz.mp3.sha1 2011-12-29 03:26 71
28c3-4740-de-frag_den_staat.mp3 2011-12-29 18:28 13M
28c3-4740-de-frag_den_staat.mp3.sha1 2011-12-29 18:28 74
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.mp3 2011-12-30 14:58 26M
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all.mp3.sha1 2011-12-30 14:58 120
28c3-4742-en-from_press_freedom_to_the_freedom_of_information.mp3 2011-12-30 17:41 24M
28c3-4742-en-from_press_freedom_to_the_freedom_of_information.mp3.sha1 2011-12-30 17:41 108
28c3-4746-en-bitcoin_an_analysis.mp3 2011-12-30 13:36 28M
28c3-4746-en-bitcoin_an_analysis.mp3.sha1 2011-12-30 13:36 79
28c3-4748-en-the_best_of_the_oxcars.mp3 2011-12-30 14:29 24M
28c3-4748-en-the_best_of_the_oxcars.mp3.sha1 2011-12-30 14:29 82
28c3-4749-en-does_hacktivism_matter.mp3 2011-12-29 01:22 22M
28c3-4749-en-does_hacktivism_matter.mp3.sha1 2011-12-29 01:22 82
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.mp3 2011-12-29 01:52 29M
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey.mp3.sha1 2011-12-29 01:52 116
28c3-4754-en-smart_hacking_for_privacy.mp3 2011-12-30 19:18 27M
28c3-4754-en-smart_hacking_for_privacy.mp3.sha1 2011-12-30 19:18 85
28c3-4755-en-counterlobbying_eu_institutions.mp3 2011-12-29 03:30 27M
28c3-4755-en-counterlobbying_eu_institutions.mp3.sha1 2011-12-29 03:30 91
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.mp3 2011-12-29 01:42 30M
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking.mp3.sha1 2011-12-29 01:42 106
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.mp3 2011-12-29 01:02 25M
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet.mp3.sha1 2011-12-29 01:02 114
28c3-4759-en-open_source_music_tracking_2_0.mp3 2011-12-30 14:17 14M
28c3-4759-en-open_source_music_tracking_2_0.mp3.sha1 2011-12-30 14:17 90
28c3-4760-en-chokepointproject.mp3 2011-12-30 18:09 12M
28c3-4760-en-chokepointproject.mp3.sha1 2011-12-30 18:09 77
28c3-4761-en-new_ways_im_going_to_hack_your_web_app.mp3 2011-12-30 14:41 27M
28c3-4761-en-new_ways_im_going_to_hack_your_web_app.mp3.sha1 2011-12-30 14:41 98
28c3-4763-en-the_science_of_insecurity.mp3 2011-12-29 00:50 27M
28c3-4763-en-the_science_of_insecurity.mp3.sha1 2011-12-29 00:50 85
28c3-4764-en-automatic_algorithm_invention_with_a_gpu.mp3 2011-12-29 01:18 28M
28c3-4764-en-automatic_algorithm_invention_with_a_gpu.mp3.sha1 2011-12-29 01:18 100
28c3-4766-en-802_11_packets_in_packets.mp3 2011-12-29 01:20 26M
28c3-4766-en-802_11_packets_in_packets.mp3.sha1 2011-12-29 01:20 85
28c3-4767-en-security_log_visualization_with_a_correlation_engine.mp3 2011-12-29 18:02 12M
28c3-4767-en-security_log_visualization_with_a_correlation_engine.mp3.sha1 2011-12-29 18:02 112
28c3-4768-en-eating_in_the_anthropocene.mp3 2011-12-29 00:44 26M
28c3-4768-en-eating_in_the_anthropocene.mp3.sha1 2011-12-29 00:44 86
28c3-4770-en-dont_scan_just_ask.mp3 2011-12-29 01:30 12M
28c3-4770-en-dont_scan_just_ask.mp3.sha1 2011-12-29 01:30 78
28c3-4775-de-hacker_jeopardy.mp3 2011-12-29 02:54 53M
28c3-4775-de-hacker_jeopardy.mp3.sha1 2011-12-29 02:54 75
28c3-4777-en-r0ket.mp3 2011-12-29 00:38 22M
28c3-4777-en-r0ket.mp3.sha1 2011-12-29 00:38 65
28c3-4780-en-print_me_if_you_dare.mp3 2011-12-30 14:34 29M
28c3-4780-en-print_me_if_you_dare.mp3.sha1 2011-12-30 14:34 80
28c3-4781-en-deceiving_authorship_detection.mp3 2011-12-30 13:42 27M
28c3-4781-en-deceiving_authorship_detection.mp3.sha1 2011-12-30 13:42 90
28c3-4788-de-datenvieh_oder_daten_fee.mp3 2011-12-30 14:31 31M
28c3-4788-de-datenvieh_oder_daten_fee.mp3.sha1 2011-12-30 14:31 84
28c3-4798-en-sovereign_keys.mp3 2011-12-30 11:54 29M
28c3-4798-en-sovereign_keys.mp3.sha1 2011-12-30 11:54 74
28c3-4799-de-can_trains_be_hacked.mp3 2011-12-29 00:36 29M
28c3-4799-de-can_trains_be_hacked.mp3.sha1 2011-12-29 00:36 80
28c3-4800-en-how_governments_have_tried_to_block_tor.mp3 2011-12-29 01:00 39M
28c3-4800-en-how_governments_have_tried_to_block_tor.mp3.sha1 2011-12-29 01:00 99
28c3-4802-en-towards_a_single_secure_european_cyberspace.mp3 2011-12-30 14:44 24M
28c3-4802-en-towards_a_single_secure_european_cyberspace.mp3.sha1 2011-12-30 14:44 103
28c3-4804-de-politik_hacken.mp3 2011-12-29 03:24 26M
28c3-4804-de-politik_hacken.mp3.sha1 2011-12-29 03:24 74
28c3-4811-en-rootkits_in_your_web_application.mp3 2011-12-29 00:46 26M
28c3-4811-en-rootkits_in_your_web_application.mp3.sha1 2011-12-29 00:46 92
28c3-4813-en-macro_dragnets.mp3 2011-12-29 01:56 27M
28c3-4813-en-macro_dragnets.mp3.sha1 2011-12-29 01:56 74
28c3-4814-en-behind_the_scenes_of_a_c64_demo.mp3 2011-12-30 14:47 29M
28c3-4814-en-behind_the_scenes_of_a_c64_demo.mp3.sha1 2011-12-30 14:47 91
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.mp3 2011-12-29 02:10 26M
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles.mp3.sha1 2011-12-29 02:10 113
28c3-4817-en-string_oriented_programming.mp3 2011-12-29 02:00 22M
28c3-4817-en-string_oriented_programming.mp3.sha1 2011-12-29 02:00 87
28c3-4818-en-evolving_custom_communication_protocols.mp3 2011-12-30 20:07 26M
28c3-4818-en-evolving_custom_communication_protocols.mp3.sha1 2011-12-30 20:07 99
28c3-4821-en-not_your_grandfathers_moon_landing.mp3 2011-12-29 18:00 27M
28c3-4821-en-not_your_grandfathers_moon_landing.mp3.sha1 2011-12-29 18:00 94
28c3-4826-en-a_brief_history_of_plutocracy.mp3 2011-12-29 00:48 12M
28c3-4826-en-a_brief_history_of_plutocracy.mp3.sha1 2011-12-29 00:48 89
28c3-4828-de-antiforensik.mp3 2011-12-30 15:00 15M
28c3-4828-de-antiforensik.mp3.sha1 2011-12-30 15:00 72
28c3-4832-de-neue_leichtigkeit.mp3 2011-12-30 14:49 32M
28c3-4832-de-neue_leichtigkeit.mp3.sha1 2011-12-30 14:49 77
28c3-4844-de-eu_datenschutz_internet_der_dinge.mp3 2011-12-29 01:54 24M
28c3-4844-de-eu_datenschutz_internet_der_dinge.mp3.sha1 2011-12-29 01:54 93
28c3-4847-en-reverse_engineering_usb_devices.mp3 2011-12-29 01:32 12M
28c3-4847-en-reverse_engineering_usb_devices.mp3.sha1 2011-12-29 01:32 91
28c3-4848-en-the_coming_war_on_general_computation.mp3 2011-12-29 01:24 25M
28c3-4848-en-the_coming_war_on_general_computation.mp3.sha1 2011-12-29 01:24 97
28c3-4856-en-the_engineering_part_of_social_engineering.mp3 2011-12-30 18:08 24M
28c3-4856-en-the_engineering_part_of_social_engineering.mp3.sha1 2011-12-30 18:08 102
28c3-4866-de-fnord_jahresrueckblick.mp3 2011-12-30 03:18 34M
28c3-4866-de-fnord_jahresrueckblick.mp3.sha1 2011-12-30 03:18 82
28c3-4869-de-tresor.mp3 2011-12-29 18:08 15M
28c3-4869-de-tresor.mp3.sha1 2011-12-29 18:08 66
28c3-4871-en-hacking_mfps.mp3 2011-12-29 00:54 26M
28c3-4871-en-hacking_mfps.mp3.sha1 2011-12-29 00:54 72
28c3-4876-de-die_spinnen_die_sachsen.mp3 2011-12-29 00:30 26M
28c3-4876-de-die_spinnen_die_sachsen.mp3.sha1 2011-12-29 00:30 83
28c3-4897-en-keynote.mp3 2011-12-28 23:22 28M
28c3-4897-en-keynote.mp3.sha1 2011-12-28 23:22 67
28c3-4898-de-security_nightmares.mp3 2011-12-30 19:22 42M
28c3-4898-de-security_nightmares.mp3.sha1 2011-12-30 19:22 79
28c3-4899-en-closing_event.mp3 2011-12-30 20:10 5.7M
28c3-4899-en-closing_event.mp3.sha1 2011-12-30 20:10 73
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.mp3 2011-12-29 01:48 58M
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik.mp3.sha1 2011-12-29 01:48 100
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.mp3 2011-12-30 20:09 24M
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats.mp3.sha1 2011-12-30 20:09 115
28c3-4905-en-lightning_talks_day_2.mp3 2011-12-29 03:22 51M
28c3-4905-en-lightning_talks_day_2.mp3.sha1 2011-12-29 03:22 81
28c3-4906-en-lightning_talks_day_3_pecha_kucha.mp3 2011-12-29 17:56 58M
28c3-4906-en-lightning_talks_day_3_pecha_kucha.mp3.sha1 2011-12-29 17:56 93
28c3-4907-en-lightning_talks_day_4.mp3 2011-12-30 17:08 64M
28c3-4907-en-lightning_talks_day_4.mp3.sha1 2011-12-30 17:08 81
28c3-4908-de-jahresrueckblick_2011.mp3 2011-12-29 18:26 54M
28c3-4908-de-jahresrueckblick_2011.mp3.sha1 2011-12-29 18:26 81
28c3-4910-de-demokratie_auf_saechsisch.mp3 2011-12-29 01:46 19M
28c3-4910-de-demokratie_auf_saechsisch.mp3.sha1 2011-12-29 01:46 85
28c3-4913-de-almighty_dna_and_beyond.mp3 2011-12-29 00:40 27M
28c3-4913-de-almighty_dna_and_beyond.mp3.sha1 2011-12-29 00:40 83
28c3-4916-en-buggedplanet.mp3 2011-12-29 02:52 23M
28c3-4916-en-buggedplanet.mp3.sha1 2011-12-29 02:52 72
28c3-4927-en-noc_review_28c3_camp.mp3 2011-12-30 18:10 16M
28c3-4927-en-noc_review_28c3_camp.mp3.sha1 2011-12-30 18:10 80
28c3-4928-en-kinectfusion.mp3 2011-12-30 13:40 30M
28c3-4928-en-kinectfusion.mp3.sha1 2011-12-30 13:40 72
28c3-4930-en-black_ops_of_tcpip_2011.mp3 2011-12-29 02:02 30M
28c3-4930-en-black_ops_of_tcpip_2011.mp3.sha1 2011-12-29 02:02 83
28c3-4932-de-camp_review_2011.mp3 2011-12-29 02:04 20M
28c3-4932-de-camp_review_2011.mp3.sha1 2011-12-29 02:04 76
28c3-4934-en-hacker_jeopardy_translation.mp3 2011-12-29 18:24 54M
28c3-4934-en-hacker_jeopardy_translation.mp3.sha1 2011-12-29 18:24 87
28c3-4935-en-eu_datenschutz_internet_der_dinge.mp3 2011-12-30 17:42 25M
28c3-4935-en-eu_datenschutz_internet_der_dinge.mp3.sha1 2011-12-30 17:42 93
28c3-4936-en-fnord_jahresrueckblick.mp3 2011-12-30 17:03 35M
28c3-4936-en-fnord_jahresrueckblick.mp3.sha1 2011-12-30 17:03 82
28c3-4937-en-security_nightmares.mp3 2012-01-02 00:48 42M
28c3-4937-en-security_nightmares.mp3.sha1 2012-01-02 00:48 79
28c3.mp3.all.sha1 2012-01-03 00:50 8.6K
Apache/2.4.41 (Ubuntu) Server at ftp.fau.de Port 80