Index of /cdn.media.ccc.de/congress/2009/mp4-ipod
Name Last modified Size Description
Parent Directory -
26c3-3266-de-hacking_the_universe_iProd.mp4 2010-01-03 11:42 484M
26c3-3266-de-hacking_the_universe_iProd.mp4.md5 2010-01-03 11:44 78
26c3-3302-en-i_internet_iProd.mp4 2009-12-30 11:33 158M
26c3-3302-en-i_internet_iProd.mp4.md5 2010-01-01 23:06 68
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon__iProd.mp4 2009-12-30 14:31 332M
26c3-3332-en-a_part_time_scientists_perspective_of_getting_to_the_moon__iProd.mp4.md5 2010-01-01 23:07 116
26c3-3340-de-wolpertinger_ein_verteilter_portscanner_iProd.mp4 2010-01-15 15:10 293M
26c3-3340-de-wolpertinger_ein_verteilter_portscanner_iProd.mp4.md5 2010-01-15 15:17 97
26c3-3350-en-milkymist_iProd.mp4 2009-12-30 14:26 282M
26c3-3350-en-milkymist_iProd.mp4.md5 2010-01-01 23:08 67
26c3-3353-de-reverse-engineering_displaylink_devices_iProd.mp4 2009-12-30 17:00 237M
26c3-3353-de-reverse-engineering_displaylink_devices_iProd.mp4.md5 2010-01-01 23:08 97
26c3-3452-en-here_be_electric_dragons_iProd.mp4 2009-12-30 00:39 383M
26c3-3452-en-here_be_electric_dragons_iProd.mp4.md5 2010-01-01 23:09 82
26c3-3464-de-liquid_democracy_iProd.mp4 2009-12-29 18:23 210M
26c3-3464-de-liquid_democracy_iProd.mp4.md5 2010-01-01 23:10 74
26c3-3468-de-privacy_amp_stylometry_iProd.mp4 2009-12-29 20:33 216M
26c3-3468-de-privacy_amp_stylometry_iProd.mp4.md5 2010-01-01 23:10 80
26c3-3481-de-leyen-rhetorik_iProd.mp4 2009-12-29 14:48 206M
26c3-3481-de-leyen-rhetorik_iProd.mp4.md5 2010-01-01 23:11 72
26c3-3490-en-building_a_debugger_iProd.mp4 2009-12-30 14:32 198M
26c3-3490-en-building_a_debugger_iProd.mp4.md5 2010-01-01 23:11 77
26c3-3494-de-defending_the_poor_iProd.mp4 2009-12-29 23:12 236M
26c3-3494-de-defending_the_poor_iProd.mp4.md5 2010-01-01 23:12 76
26c3-3495-de-das_zugangserschwerungsgesetz_iProd.mp4 2009-12-29 15:54 325M
26c3-3495-de-das_zugangserschwerungsgesetz_iProd.mp4.md5 2010-01-01 23:12 87
26c3-3496-de-fugngernavigation_mit_augmented_reality_iProd.mp4 2009-12-30 11:28 342M
26c3-3496-de-fugngernavigation_mit_augmented_reality_iProd.mp4.md5 2010-01-01 23:13 97
26c3-3501-en-why_net_neutrality_matters_iProd.mp4 2010-01-06 19:41 160M
26c3-3501-en-why_net_neutrality_matters_iProd.mp4.md5 2010-01-06 20:06 84
26c3-3504-en-our_darknet_and_its_bright_spots_iProd.mp4 2010-01-03 03:20 188M
26c3-3504-en-our_darknet_and_its_bright_spots_iProd.mp4.md5 2010-01-03 03:21 90
26c3-3507-de-fuzzing_the_phone_in_your_phone_iProd.mp4 2010-01-03 12:42 221M
26c3-3507-de-fuzzing_the_phone_in_your_phone_iProd.mp4.md5 2010-01-03 12:43 89
26c3-3509-de-wofr_offenes_internet_iProd.mp4 2010-01-25 15:04 228M
26c3-3509-de-wofr_offenes_internet_iProd.mp4.md5 2010-01-25 15:05 79
26c3-3510-de-technik_des_neuen_epa_iProd.mp4 2009-12-30 11:27 214M
26c3-3510-de-technik_des_neuen_epa_iProd.mp4.md5 2010-01-01 23:15 79
26c3-3515-de-secubt_iProd.mp4 2009-12-30 17:01 206M
26c3-3515-de-secubt_iProd.mp4.md5 2010-01-01 23:15 64
26c3-3520-en-conlanging_101_iProd.mp4 2010-01-15 16:10 262M
26c3-3520-en-conlanging_101_iProd.mp4.md5 2010-01-15 16:18 72
26c3-3523-de-eine_zensur_findet_statt_iProd.mp4 2009-12-29 16:28 171M
26c3-3523-de-eine_zensur_findet_statt_iProd.mp4.md5 2010-01-01 23:16 82
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger_iProd.mp4 2009-12-30 16:54 232M
26c3-3533-de-die_verwaltung_rstet_auf_-_der_digitale_steuerbrger_iProd.mp4.md5 2010-01-01 23:17 109
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets_iProd.mp4 2009-12-30 11:19 173M
26c3-3535-en-using_openbsc_for_fuzzing_of_gsm_handsets_iProd.mp4.md5 2010-01-01 23:18 99
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities_iProd.mp4 2009-12-30 11:17 411M
26c3-3536-de-ddosbotnet_mitigation__hosting_online_communities_iProd.mp4.md5 2010-01-01 23:19 107
26c3-3540-en-a_hackers_utopia_iProd.mp4 2009-12-30 00:36 355M
26c3-3540-en-a_hackers_utopia_iProd.mp4.md5 2010-01-01 23:20 74
26c3-3547-en-after_the_hype_iProd.mp4 2010-01-03 11:29 173M
26c3-3547-en-after_the_hype_iProd.mp4.md5 2010-01-03 11:40 72
26c3-3550-de-chaos-familien-duell_iProd.mp4 2009-12-29 15:17 352M
26c3-3550-de-chaos-familien-duell_iProd.mp4.md5 2010-01-01 23:21 78
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography_iProd.mp4 2009-12-29 20:43 255M
26c3-3551-de-das_recht_am_eigenen_bild_und_das_ende_der_street_photography_iProd.mp4.md5 2010-01-01 23:21 119
26c3-3554-de-tor_and_censorship_lessons_learned_iProd.mp4 2009-12-29 17:06 219M
26c3-3554-de-tor_and_censorship_lessons_learned_iProd.mp4.md5 2010-01-01 23:22 92
26c3-3555-en-sccp_hacking_attacking_the_ss7__sigtran_applications_one_step_further_and_mapping_the_phone_system_iProd.mp4 2010-01-15 15:40 206M
26c3-3555-en-sccp_hacking_attacking_the_ss7__sigtran_applications_one_step_further_and_mapping_the_phone_system_iProd.mp4.md5 2010-01-15 15:47 156
26c3-3557-de-vom_kreationismus_zum_kollektivismus_iProd.mp4 2010-01-15 11:36 250M
26c3-3557-de-vom_kreationismus_zum_kollektivismus_iProd.mp4.md5 2010-01-15 11:43 94
26c3-3563-en-lightning_talks_-_day_1_iProd.mp4 2010-01-06 20:16 481M
26c3-3563-en-lightning_talks_-_day_1_iProd.mp4.md5 2010-01-06 20:21 81
26c3-3567-en-wikileaks_release_10_iProd.mp4 2009-12-29 17:24 188M
26c3-3567-en-wikileaks_release_10_iProd.mp4.md5 2010-01-01 23:22 78
26c3-3570-en-weaponizing_cultural_viruses_iProd.mp4 2009-12-30 11:35 219M
26c3-3570-en-weaponizing_cultural_viruses_iProd.mp4.md5 2010-01-01 23:23 86
26c3-3573-en-playing_with_the_built_city_iProd.mp4 2009-12-30 11:30 196M
26c3-3573-en-playing_with_the_built_city_iProd.mp4.md5 2010-01-01 23:24 85
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem_iProd.mp4 2009-12-29 17:27 197M
26c3-3576-de-how_you_can_build_an_eavesdropper_for_a_quantum_cryptosystem_iProd.mp4.md5 2010-01-01 23:24 118
26c3-3577-de-privacy-enhanced_event_scheduling_iProd.mp4 2009-12-30 11:29 206M
26c3-3577-de-privacy-enhanced_event_scheduling_iProd.mp4.md5 2010-01-01 23:25 91
26c3-3579-en-photography_and_the_art_of_doing_it_wrong_iProd.mp4 2010-01-03 12:38 178M
26c3-3579-en-photography_and_the_art_of_doing_it_wrong_iProd.mp4.md5 2010-01-03 12:43 99
26c3-3590-de-europische_biometriestrategien_iProd.mp4 2009-12-30 11:25 443M
26c3-3590-de-europische_biometriestrategien_iProd.mp4.md5 2010-01-01 23:26 88
26c3-3592-de-cybernetic_cannibalism_iProd.mp4 2009-12-29 18:34 226M
26c3-3592-de-cybernetic_cannibalism_iProd.mp4.md5 2010-01-01 23:26 80
26c3-3594-de-internetsperren_iProd.mp4 2009-12-29 15:55 207M
26c3-3594-de-internetsperren_iProd.mp4.md5 2010-01-01 23:27 73
26c3-3596-de-cat_procsysnetipv4fuckups_iProd.mp4 2009-12-30 17:50 123M
26c3-3596-de-cat_procsysnetipv4fuckups_iProd.mp4.md5 2010-01-01 23:27 83
26c3-3600-de-location_tracking_does_scale_up_iProd.mp4 2009-12-30 11:23 467M
26c3-3600-de-location_tracking_does_scale_up_iProd.mp4.md5 2010-01-01 23:29 89
26c3-3608-en-playing_with_the_gsm_rf_interface_iProd.mp4 2010-01-15 15:55 138M
26c3-3608-en-playing_with_the_gsm_rf_interface_iProd.mp4.md5 2010-01-15 16:02 91
26c3-3613-de-fnord-jahresrckblick_2009_iProd.mp4 2010-01-15 13:39 166M
26c3-3613-de-fnord-jahresrckblick_2009_iProd.mp4.md5 2010-01-15 13:46 83
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd_iProd.mp4 2009-12-30 15:13 221M
26c3-3622-de-die_neokonservativen_thinktanks_in_der_brd_iProd.mp4.md5 2010-01-01 23:29 100
26c3-3631-en-finding_the_key_in_the_haystack_iProd.mp4 2010-01-03 13:19 173M
26c3-3631-en-finding_the_key_in_the_haystack_iProd.mp4.md5 2010-01-03 13:20 89
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution_iProd.mp4 2009-12-30 11:24 119M
26c3-3637-de-peanut_butter_and_plastic_industrial_revolution_iProd.mp4.md5 2010-01-01 23:29 105
26c3-3642-en-lightning_talks_-_day_2_iProd.mp4 2009-12-29 18:39 691M
26c3-3642-en-lightning_talks_-_day_2_iProd.mp4.md5 2010-01-01 23:31 81
26c3-3644-en-lightning_talks_-_day_3_iProd.mp4 2009-12-30 15:10 347M
26c3-3644-en-lightning_talks_-_day_3_iProd.mp4.md5 2010-01-01 23:32 81
26c3-3645-en-lightning_talks_-_day_4_iProd.mp4 2010-01-03 11:15 1.1G
26c3-3645-en-lightning_talks_-_day_4_iProd.mp4.md5 2010-01-03 11:17 81
26c3-3647-de-ckan_apt-get_for_the_debian_of_data_iProd.mp4 2009-12-30 00:40 229M
26c3-3647-de-ckan_apt-get_for_the_debian_of_data_iProd.mp4.md5 2010-01-01 23:33 93
26c3-3648-en-dect_part_ii_iProd.mp4 2010-01-08 10:15 188M
26c3-3648-en-dect_part_ii_iProd.mp4.md5 2010-01-08 10:18 70
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported_iProd.mp4 2009-12-30 16:58 160M
26c3-3652-en-exciting_tales_of_journalists_getting_spied_on_arrested_and_deported_iProd.mp4.md5 2010-01-01 23:33 126
26c3-3654-en-gsm_srsly_iProd.mp4 2009-12-29 15:22 190M
26c3-3654-en-gsm_srsly_iProd.mp4.md5 2010-01-01 23:34 67
26c3-3657-en-optimised_to_fail_iProd.mp4 2010-02-09 19:43 168M
26c3-3657-en-optimised_to_fail_iProd.mp4.md5 2010-02-09 19:44 75
26c3-3658-en-black_ops_of_pki_iProd.mp4 2010-01-06 20:11 417M
26c3-3658-en-black_ops_of_pki_iProd.mp4.md5 2010-01-06 20:21 74
26c3-3661-de-coreboot_adding_support_for_a_system_near_you_iProd.mp4 2009-12-29 16:32 279M
26c3-3661-de-coreboot_adding_support_for_a_system_near_you_iProd.mp4.md5 2010-01-01 23:35 103
26c3-3664-en-homewreckery_iProd.mp4 2010-01-25 13:33 139M
26c3-3664-en-homewreckery_iProd.mp4.md5 2010-01-25 13:35 70
26c3-3668-en-hacker_jeopardy_iProd.mp4 2010-01-15 12:38 333M
26c3-3668-en-hacker_jeopardy_iProd.mp4.md5 2010-01-15 12:44 73
26c3-3669-de-hacker_jeopardy_iProd.mp4 2010-01-15 15:25 372M
26c3-3669-de-hacker_jeopardy_iProd.mp4.md5 2010-01-15 15:32 73
26c3-3670-en-blackbox_jtag_reverse_engineering_iProd.mp4 2010-01-03 10:20 157M
26c3-3670-en-blackbox_jtag_reverse_engineering_iProd.mp4.md5 2010-01-03 10:21 91
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo_iProd.mp4 2010-01-03 11:18 379M
26c3-3671-de-nougatbytes_-_ein_wortspiel_bunt_und_in_stereo_iProd.mp4.md5 2010-01-03 11:25 104
26c3-3672-de-advanced_microcontroller_programming_iProd.mp4 2009-12-30 16:55 346M
26c3-3672-de-advanced_microcontroller_programming_iProd.mp4.md5 2010-01-01 23:36 94
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht_iProd.mp4 2009-12-30 10:55 219M
26c3-3674-de-der_hackerparagraph_beim_bundesverfassungsgericht_iProd.mp4.md5 2010-01-01 23:37 107
26c3-3685-de-im_herz_der_bestie_iProd.mp4 2010-01-03 10:13 151M
26c3-3685-de-im_herz_der_bestie_iProd.mp4.md5 2010-01-03 10:15 76
26c3-3687-de-security_nightmares_iProd.mp4 2010-01-06 19:33 232M
26c3-3687-de-security_nightmares_iProd.mp4.md5 2010-01-06 19:35 77
26c3-3688-de-haste_man_netblock_iProd.mp4 2009-12-30 17:52 181M
26c3-3688-de-haste_man_netblock_iProd.mp4.md5 2010-01-01 23:37 76
26c3-3690-de-ccc-jahresrckblick_iProd.mp4 2009-12-30 16:59 234M
26c3-3690-de-ccc-jahresrckblick_iProd.mp4.md5 2010-01-01 23:38 76
26c3-3691-de-vier_fuste_fr_ein_halleluja_iProd.mp4 2010-01-25 14:49 141M
26c3-3691-de-vier_fuste_fr_ein_halleluja_iProd.mp4.md5 2010-01-25 14:50 85
26c3-3696-en-wireless_power_transfer_iProd.mp4 2009-12-29 16:41 317M
26c3-3696-en-wireless_power_transfer_iProd.mp4.md5 2010-01-01 23:38 81
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht_iProd.mp4 2010-01-03 11:01 418M
26c3-3699-de-wikipedia_-_wegen_irrelevanz_gelscht_iProd.mp4.md5 2010-01-03 11:12 94
26c3-3700-de-here_be_dragons_iProd.mp4 2009-12-30 02:07 160M
26c3-3700-de-here_be_dragons_iProd.mp4.md5 2010-01-01 23:39 73
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology_iProd.mp4 2010-01-03 10:55 230M
26c3-3702-en-yes_we_cant_-_on_kleptography_and_cryptovirology_iProd.mp4.md5 2010-01-03 10:57 106
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering_iProd.mp4 2009-12-29 16:40 119M
26c3-3703-en-exposing_crypto_bugs_through_reverse_engineering_iProd.mp4.md5 2010-01-01 23:39 106
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen_iProd.mp4 2010-01-03 11:35 748M
26c3-3705-de-die_ereignisse_des_129_und_ihre_folgen_iProd.mp4.md5 2010-01-03 11:40 96
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems_iProd.mp4 2010-01-03 11:23 179M
26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems_iProd.mp4.md5 2010-01-03 11:26 131
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung_iProd.mp4 2010-01-15 10:50 167M
26c3-3708-de-die_schlacht_um_die_vorratsdatenspeicherung_iProd.mp4.md5 2010-01-15 10:57 101
26c3-3709-en-legic_prime_obscurity_in_depth_iProd.mp4 2009-12-29 18:36 180M
26c3-3709-en-legic_prime_obscurity_in_depth_iProd.mp4.md5 2010-01-01 23:40 88
26c3-3710-en-the_lost_cosmonauts_iProd.mp4 2009-12-30 11:27 151M
26c3-3710-en-the_lost_cosmonauts_iProd.mp4.md5 2010-01-01 23:40 77
26c3-3711-de-computerspielepolitik_iProd.mp4 2009-12-29 17:45 279M
26c3-3711-de-computerspielepolitik_iProd.mp4.md5 2010-01-01 23:41 79
26c3-3713-de-unbild__pictures_and_non-pictures_iProd.mp4 2010-01-25 15:19 190M
26c3-3713-de-unbild__pictures_and_non-pictures_iProd.mp4.md5 2010-01-25 15:20 91
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes_iProd.mp4 2010-01-06 19:34 180M
26c3-3714-de-why_germany_succeeded_where_america_has_failed_in_achieving_meaningful_voting_computer_changes_iProd.mp4.md5 2010-01-06 19:35 152
26c3-3717-en-closing_event_iProd.mp4 2010-01-03 13:30 94M
26c3-3717-en-closing_event_iProd.mp4.md5 2010-01-03 13:34 71
26c3-3721-de-etsi-vorratsdatenspeicherung_2009_iProd.mp4 2009-12-30 16:59 434M
26c3-3721-de-etsi-vorratsdatenspeicherung_2009_iProd.mp4.md5 2010-01-01 23:42 91
26c3-3723-en-stream_fnord-jahresrckblick_2009_iProd.mp4 2010-01-06 19:40 651M
26c3-3723-en-stream_fnord-jahresrckblick_2009_iProd.mp4.md5 2010-01-06 20:07 90
26c3-3725-en-stream_security_nightmares_iProd.mp4 2010-01-03 10:37 504M
26c3-3725-en-stream_security_nightmares_iProd.mp4.md5 2010-01-03 10:48 84
Apache/2.4.41 (Ubuntu) Server at ftp.fau.de Port 443