23C3-complete-Video-Recordings-4-iPod - TorrentBank

File Name:23C3-complete-Video-Recordings-4-iPod

Create Tool:KTorrent 2.2.1

Create Time:2008-01-11 04:39:07

File Size:26.17 GB

File Count:141

File Hash:92904c2db6ef248c05308c5c59cb31fa7cea4247

Magnet Link:

Magnet Link:

Torrent File:

23C3 1256 Who can you trust - Opening Ceremony and Keynote.m4v 297.50 MB
23C3 1257 Podjournalism - The Role of Podcasting in Critical and Investigative Journalism.m4v 219.19 MB
23C3 1342 Automated Botnet Detection and Mitigation - How to find, invade and kill botnets automated and effectively.m4v 85.17 MB
23C3 1346 Sie haben das Recht zu schweigen - Durchsuchung, Beschlagnahme, Vernehmung, Strategien fuer den Umgang mit Polizei.m4v 348.13 MB
23C3 1347 We are great together, the liberal society and its enemies - monochrom.m4v 208.17 MB
23C3 1373 the Story of The Hacker Foundation - Challenges of Organizing a Foundation for Hackers in the USA.m4v 99.12 MB
23C3 1381 Stealth malware, can good guys win - Challenges in detecting system compromises and why we're so far behind.m4v 289.06 MB
23C3 1402 Drones - Automomous flying vehicles.m4v 214.32 MB
23C3 1416 Juristische Fragen um die Mitbenutzung fremder WLANs - Zivilrechtliche und strafrechtliche Haftung.m4v 239.13 MB
23C3 1418 Trust Your Eyes - Grundlagen der Visualisierung und wia man mit Visualisierungen faken kann.m4v 77.03 MB
23C3 1419 Java wird Groovy - Eine Einfuehrung in die neue, dynamische Sprache fuer das Java-Oekosystem.m4v 381.11 MB
23C3 1420 Analysis of a strong Random Number Generator - by anatomizing Linux CPRNG.m4v 670.56 MB
23C3 1422 Pornography and Technology - a love affair.m4v 106.20 MB
23C3 1423 We don't trust voting computers - The story of the dutch campaign against black-box voting.m4v 335.56 MB
23C3 1429 Fnord Jahresrueckblick - Wir helfen euch die Fnords zu sehen.m4v 217.26 MB
23C3 1433 How To Design A Decent User Interface - Take a look at software from a user's point of view.m4v 288.29 MB
23C3 1439 Information Operations - Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures.m4v 171.80 MB
23C3 1444 Tor and China - Design of a blocking-resistant anonymity system.m4v 353.81 MB
23C3 1446 Secure Network Server Programming on Unix - Techniques and best practices to securely code your network server.m4v 83.21 MB
23C3 1449 A not so smart card - How bad security decisions can ruin a debit card design.m4v 81.63 MB
23C3 1452 Chaos und Kritische Theorie - Adorno, Wilson und Diskordianismus.m4v 296.04 MB
23C3 1454 A Natural Language Database Interface using Fuzzy Semantics.m4v 244.97 MB
23C3 1456 Unusual bugs.m4v 236.73 MB
23C3 1457 Security in the cardholder data processing - Experiences and lessons learned with the Payment Card Industry.m4v 257.93 MB
23C3 1459 SIP Security - Status Quo and Future Issues.m4v 139.27 MB
23C3 1461 The Grim Meathook Future - How the Tech Culture Can Maintain Relevance in the 21st Century.m4v 348.45 MB
23C3 1473 The worst part of censorship is XXXXX - Investigating large-scale Internet content filtering.m4v 199.39 MB
23C3 1478 An Introduction to Traffic Analysis - Attacks, Defences and Public Policy Issues.m4v 217.21 MB
23C3 1487 CCC Jahresrueckblick - Ein Ueberblick ueber die Aktivitaeten des Clubs 2006.m4v 238.64 MB
23C3 1492 Dying Giraffe Recordings, A non-evil recordlabel - Using the power of creative commons to create an alternative system.m4v 148.67 MB
23C3 1493 Virtuelle Sicherheit - Mandatory Access Control und TPM in XEN.m4v 114.20 MB
23C3 1494 Ego Striptease, Ich zeig dir, wer du bist - Blogs, flickr, etc, warum machen wir es ihnen so einfach.m4v 201.16 MB
23C3 1495 Mobile phone call encryption - Encrypting (GSM) mobile phone calls over VPN with an Asterisk PBX.m4v 132.81 MB
23C3 1498 Mining Search Queries - How to discover additional knowledge in the AOL query logs.m4v 189.71 MB
23C3 1500 Hackerspaced - How we built ours, How you can build yours.m4v 178.03 MB
23C3 1500 Hackerspaces - How we built ours, How you can build yours.m4v 143.57 MB
23C3 1502 The gift of sharing - A critical approach to the notion of gift economy.m4v 242.91 MB
23C3 1505 Gaeste-Ueberwachung in Hotels durch staatliche und private Schnueffler.m4v 130.53 MB
23C3 1512 Homegrown Interactive Tables - Any Technology Sufficiently Advanced is Indistinguishable from Magic.m4v 109.84 MB
23C3 1513 Detecting temperature through clock skew - Hot or not, defeating anonymity by monitoring clock skew.m4v 231.17 MB
23C3 1514 Lighting Talks Day 1.m4v 270.82 MB
23C3 1515 Lightning Talks Day 2.m4v 121.33 MB
23C3 1516 Lightning Talks Day 3.m4v 231.16 MB
23C3 1517 Lightning Talks Day 4.m4v 621.15 MB
23C3 1520 Counter-Development - The Accessibility of Technology as an Addendum to Engineering Ethics.m4v 242.27 MB
23C3 1523 The Rise and Fall of Open Source - The Million Eyeball Principle and forkbombs.m4v 165.83 MB
23C3 1540 To live outside the law you gotta be honest - Ist nicht jedes Passwort eine Manifestation des Misstrauens.m4v 104.42 MB
23C3 1543 Kollaboratives Wissensmanagement im Bildungsbereich - Die Zitierfaehigkeit von Wiki-Wissen.m4v 214.12 MB
23C3 1545 Advanced Attacks Against PocketPC Phones - Ownd by an MMS.m4v 191.94 MB
23C3 1552 Nintendo DS - Introduction and hacking.m4v 189.11 MB
23C3 1554 Ethernet mit Mikrocontrollern - Wie funktioniert TCP mit 2kb RAM.m4v 224.11 MB
23C3 1555 Konrad Zuse, der rechnende Raum - Ein audiovisuelles Live-Feature.m4v 96.05 MB
23C3 1560 CSRF, the Intranet and You - Causes, Attacks and Countermeasures.m4v 169.04 MB
23C3 1561 4+2+1 Jahre BigBrotherAward Deutschland - Eine Lesung aus dem Buch Schwarzbuch Datenschutz.m4v 244.47 MB
23C3 1563 Funkerspuk - radio politics in the USA and Germany in the first half of the 20th century.m4v 128.15 MB
23C3 1566 OpenPCD, OpenPICC - Free RFID reader and emulator.m4v 409.86 MB
23C3 1567 Hacker Jeopardy - The one and only hacker quizshow.m4v 392.34 MB
23C3 1568 JSON RPC - Cross Site Scripting and Client Side Web Services.m4v 88.73 MB
23C3 1576 RFID hacking.m4v 218.18 MB
23C3 1578 Hacking fingerprint recognition systems - Kann ich dir ein Bier ausgeben.m4v 197.99 MB
23C3 1592 Inside VMware - How VMware, VirtualPC and Paralles actually work.m4v 127.15 MB
23C3 1593 Krypta DIY Serverhousing.m4v 147.22 MB
23C3 1596 Building an Open Source PKI using OpenXPKI - Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs.m4v 321.42 MB
23C3 1597 A Hacker's Toolkit for RFID Emulation and Jamming.m4v 252.16 MB
23C3 1600 Biometrics in Science Fiction - 2nd Iteration.m4v 228.85 MB
23C3 1602 Subverting Ajax - Next generation vulnerabilities in 2.0 Web Applications.m4v 282.65 MB
23C3 1603 Hacking a Country, FOSS in India - An Overview Free and Open Source Software efforts and projects.m4v 144.17 MB
23C3 1604 Tracking von Personen in Videoszenen - Wie trackt man automatisch sich bewegende Objekte.m4v 218.18 MB
23C3 1605 Digitale Bildforensik - Spuren in Digitalfotos.m4v 231.25 MB
23C3 1606 Console Hacking 2006 - Xbox 360, Playstation 3, Wii.m4v 132.23 MB
23C3 1607 A Probabilistic Trust Model for GnuPG - A new way of evaluating a PGP web of trust.m4v 322.17 MB
23C3 1608 Vehicular Communication and VANETs - The future and security of communicating vehicles.m4v 295.44 MB
23C3 1609 Data Retention Update - News and Perspectives on Implementation and Opposition.m4v 185.65 MB
23C3 1610 Fudging with Firmware - Firmware reverse-engineering tactics.m4v 167.36 MB
23C3 1611 Privacy, Identity, and Anonymity in Web 2.0.m4v 175.90 MB
23C3 1616 Nerds und Geeks zwischen Stereotyp und Subkultur.m4v 312.89 MB
23C3 1619 Introduction to matrix programming, trance codes - How to recognize trance coded communication patterns.m4v 229.20 MB
23C3 1622 Void the warranty - How to start analyzing blackboxes.m4v 259.05 MB
23C3 1627 Software Reliability in Aerospace - An overview on design and generation of safe and reliable Software.m4v 107.02 MB
23C3 1629 Body hacking - Functional body modification.m4v 184.22 MB
23C3 1634 How to squeeze more performance out of your wifi - Cross-layer optimization strategies for long-range IEEE 802.11e based radio.m4v 172.65 MB
23C3 1638 Freie Software, eine Chance fuer Afrika - Ein Erfahrungsbericht aus Malawi.m4v 181.71 MB
23C3 1640 A 10GE monitoring system - Hacking a 10 Gigabit Intrusion detection and prevention system into a network.m4v 108.25 MB
23C3 1642 Unlocking FileVault - An analysis of Apple's encrypted disk storage system.m4v 204.59 MB
23C3 1646 DVB-T, from Pixeldata to COFDM Transmission - How to build a complete FPGA-based DVB-T transmitter.m4v 141.90 MB
23C3 1651 Ueberwachen und Strafen in Entenhausen.m4v 119.42 MB
23C3 1652 Geschichte der Automaten, Androiden und Homunculi.m4v 219.10 MB
23C3 1655 Elektronische Reisedokumente - Neue Entwicklungen beim ePass.m4v 123.70 MB
23C3 1656 Design and Implementation of an object-orientated, secure TCP IP Stack - Ethereal W Wireshark without remote exploits.m4v 242.51 MB
23C3 1658 How to implement bignum arithmetic - A short look at my pet project implementation.m4v 80.09 MB
23C3 1663 Gueter und Personen tracken, Lokalisierung im Pizzamann-Universum - Technische Mittel und soziale Aspekte des Tracking and Tracing.m4v 240.17 MB
23C3 1670 Barrierefreies Web.m4v 126.06 MB
23C3 1678 Kritik an den Illuminaten zwischen 1787 und 2006 - Der Stand der Auseinandersetzung zwischen Discordiern und Illuminaten.m4v 148.98 MB
23C3 1679 Ueberwachungsdruck, einige Experimente - Wie wirkt Ueberwachung.m4v 227.29 MB
23C3 1680 Das neue gesetzliche Verbot des Hackings - Praktische Auswirkungen des neuen Strafrechtes.m4v 252.89 MB
23C3 1682 Hacking the Electoral Law.m4v 261.78 MB
23C3 1682 Security Nightmares 2007 - Oder, worueber wir naechstes Jahr lachen werden.m4v 200.87 MB
23C3 1683 Powerpoint Karaoke.m4v 462.23 MB
23C3 1685 Go, das Spiel fuer die Menschen - Auch fuer Computer, Nicht beim Go.m4v 248.03 MB
23C3 1688 Rootkits as Reversing Tools - An Anonymous Talk.m4v 249.64 MB
23C3 1694 Automated Exploit Detection in Binaries - Finding exploitable vulnerabilities in binaries.m4v 203.32 MB
23C3 1698 Culture Jamming and Discordianism - Illegal Art and Religious Bricolage.m4v 173.31 MB
23C3 1699 DRM comes to European digital TV.m4v 141.80 MB
23C3 1700 Router and Infrastructure Hacking - First we take Manhattan, then we take Berlin.m4v 134.43 MB
23C3 1701 Open Source Machine Translation - From fools, to tricks, to projects.m4v 127.60 MB
23C3 1708 TV-B-Gone - Better Living Through Inventing.m4v 258.05 MB
23C3 1709 Revenge of female Nerds - Busting Myths about Why Women Can't Be Technical.m4v 118.86 MB
23C3 1710 Tap the Electronic Frontier Foundation - EFF staffers answer your questions.m4v 618.91 MB
23C3 1713 Black Ops 2006 Viz Edition - Pixel Fuzzing and the Bioinformatic Bindiff.m4v 237.71 MB
23C3 1714 Warum wir uns so gerne ueberwachen lassen - Erhellendes aus Philosophie und Soziologie zur Klaerung des Phaenomens.m4v 251.76 MB
23C3 1721 Software Protection and the TPM - The Mac OS X Story.m4v 281.77 MB
23C3 1724 Transparency and Privacy - The 7 Laws of Identity and the Identity Metasystem.m4v 295.70 MB
23C3 1727 Closing Ceremony - Who did you trust.m4v 127.72 MB
23C3 1728 23C3 Network Review.m4v 180.55 MB
23C3 1728 sFlow - I can feel your traffic.m4v 111.13 MB
23C3 1733 Bluetooth Hacking Revisited.m4v 234.47 MB
23C3 1735 Faster PwninG Assured - Hardware Hacks and Cracks with FPGAs.m4v 110.67 MB
23C3 1736 Project Sputnik - Realtime in-building location tracking at the 23C3.m4v 187.11 MB
23C3 1738 MMORPGs - The state and future of the World of Warcraft.m4v 254.48 MB
23C3 1740 In the Absence of Trust.m4v 135.61 MB
23C3 1758 Fuzzing in the corporate world - The use of fuzzing in the corporate world over the years and recent implementation.m4v 247.81 MB
23C3 1759 Schlossoeffnung bei der Staatssicherheit der DDR - Werkzeuge und Vorgehen der STASI.m4v 439.54 MB
23C3 1760 On Free, and the Differences between Culture and Code.m4v 303.90 MB
23c3_m4v.html 111.96 KB
23c3_m4v-Dateien/23c3_m4v-logo-192x192.jpg 62.70 KB
23c3_m4v-Dateien/24c3_m4v-logo-64x64.jpg 6.76 KB
23c3_m4v-Dateien/24c3_mp3-logo-64x64.jpg 6.76 KB
23c3_m4v-Dateien/chaos_tv-logo-64x64.jpg 38.38 KB
23c3_m4v-Dateien/chaosradio-logo-64x64.jpg 33.74 KB
23c3_m4v-Dateien/chaosradio-logo-transparent-300.png 16.60 KB
23c3_m4v-Dateien/chaosradio.css 3.07 KB
23c3_m4v-Dateien/chaosradio_express-logo-64x64.jpg 31.70 KB
23c3_m4v-Dateien/chaosradio_international-logo-64x64.jpg 33.38 KB
23c3_m4v-Dateien/datenschleuder-logo-64x64.jpg 33.82 KB
23c3_m4v-Dateien/directory-itunes-subscribe.png 7.12 KB
23c3_m4v-Dateien/dossier_chaotique-logo-64x64.jpg 33.46 KB
23c3_m4v-Dateien/feed-icon-16x16.png 764 B
23c3_m4v-Dateien/format-audio-16x16.png 1004 B
23c3_m4v-Dateien/format-pdf-16x16.png 404 B
23c3_m4v-Dateien/format-video-16x16.png 3.61 KB
23c3_m4v-Dateien/format-video-48x48.png 7.89 KB
udp://tracker.thepiratebay.org:80/announce
udp://tracker.openbittorrent.com:80/announce

TorrentBank
Copyright © 2024