Create Tool:KTorrent 2.2.1
Create Time:2008-01-11 04:39:07
File Size:26.17 GB
File Count:141
File Hash:92904c2db6ef248c05308c5c59cb31fa7cea4247
23C3 1256 Who can you trust - Opening Ceremony and Keynote.m4v | 297.50 MB |
23C3 1257 Podjournalism - The Role of Podcasting in Critical and Investigative Journalism.m4v | 219.19 MB |
23C3 1342 Automated Botnet Detection and Mitigation - How to find, invade and kill botnets automated and effectively.m4v | 85.17 MB |
23C3 1346 Sie haben das Recht zu schweigen - Durchsuchung, Beschlagnahme, Vernehmung, Strategien fuer den Umgang mit Polizei.m4v | 348.13 MB |
23C3 1347 We are great together, the liberal society and its enemies - monochrom.m4v | 208.17 MB |
23C3 1373 the Story of The Hacker Foundation - Challenges of Organizing a Foundation for Hackers in the USA.m4v | 99.12 MB |
23C3 1381 Stealth malware, can good guys win - Challenges in detecting system compromises and why we're so far behind.m4v | 289.06 MB |
23C3 1402 Drones - Automomous flying vehicles.m4v | 214.32 MB |
23C3 1416 Juristische Fragen um die Mitbenutzung fremder WLANs - Zivilrechtliche und strafrechtliche Haftung.m4v | 239.13 MB |
23C3 1418 Trust Your Eyes - Grundlagen der Visualisierung und wia man mit Visualisierungen faken kann.m4v | 77.03 MB |
23C3 1419 Java wird Groovy - Eine Einfuehrung in die neue, dynamische Sprache fuer das Java-Oekosystem.m4v | 381.11 MB |
23C3 1420 Analysis of a strong Random Number Generator - by anatomizing Linux CPRNG.m4v | 670.56 MB |
23C3 1422 Pornography and Technology - a love affair.m4v | 106.20 MB |
23C3 1423 We don't trust voting computers - The story of the dutch campaign against black-box voting.m4v | 335.56 MB |
23C3 1429 Fnord Jahresrueckblick - Wir helfen euch die Fnords zu sehen.m4v | 217.26 MB |
23C3 1433 How To Design A Decent User Interface - Take a look at software from a user's point of view.m4v | 288.29 MB |
23C3 1439 Information Operations - Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures.m4v | 171.80 MB |
23C3 1444 Tor and China - Design of a blocking-resistant anonymity system.m4v | 353.81 MB |
23C3 1446 Secure Network Server Programming on Unix - Techniques and best practices to securely code your network server.m4v | 83.21 MB |
23C3 1449 A not so smart card - How bad security decisions can ruin a debit card design.m4v | 81.63 MB |
23C3 1452 Chaos und Kritische Theorie - Adorno, Wilson und Diskordianismus.m4v | 296.04 MB |
23C3 1454 A Natural Language Database Interface using Fuzzy Semantics.m4v | 244.97 MB |
23C3 1456 Unusual bugs.m4v | 236.73 MB |
23C3 1457 Security in the cardholder data processing - Experiences and lessons learned with the Payment Card Industry.m4v | 257.93 MB |
23C3 1459 SIP Security - Status Quo and Future Issues.m4v | 139.27 MB |
23C3 1461 The Grim Meathook Future - How the Tech Culture Can Maintain Relevance in the 21st Century.m4v | 348.45 MB |
23C3 1473 The worst part of censorship is XXXXX - Investigating large-scale Internet content filtering.m4v | 199.39 MB |
23C3 1478 An Introduction to Traffic Analysis - Attacks, Defences and Public Policy Issues.m4v | 217.21 MB |
23C3 1487 CCC Jahresrueckblick - Ein Ueberblick ueber die Aktivitaeten des Clubs 2006.m4v | 238.64 MB |
23C3 1492 Dying Giraffe Recordings, A non-evil recordlabel - Using the power of creative commons to create an alternative system.m4v | 148.67 MB |
23C3 1493 Virtuelle Sicherheit - Mandatory Access Control und TPM in XEN.m4v | 114.20 MB |
23C3 1494 Ego Striptease, Ich zeig dir, wer du bist - Blogs, flickr, etc, warum machen wir es ihnen so einfach.m4v | 201.16 MB |
23C3 1495 Mobile phone call encryption - Encrypting (GSM) mobile phone calls over VPN with an Asterisk PBX.m4v | 132.81 MB |
23C3 1498 Mining Search Queries - How to discover additional knowledge in the AOL query logs.m4v | 189.71 MB |
23C3 1500 Hackerspaced - How we built ours, How you can build yours.m4v | 178.03 MB |
23C3 1500 Hackerspaces - How we built ours, How you can build yours.m4v | 143.57 MB |
23C3 1502 The gift of sharing - A critical approach to the notion of gift economy.m4v | 242.91 MB |
23C3 1505 Gaeste-Ueberwachung in Hotels durch staatliche und private Schnueffler.m4v | 130.53 MB |
23C3 1512 Homegrown Interactive Tables - Any Technology Sufficiently Advanced is Indistinguishable from Magic.m4v | 109.84 MB |
23C3 1513 Detecting temperature through clock skew - Hot or not, defeating anonymity by monitoring clock skew.m4v | 231.17 MB |
23C3 1514 Lighting Talks Day 1.m4v | 270.82 MB |
23C3 1515 Lightning Talks Day 2.m4v | 121.33 MB |
23C3 1516 Lightning Talks Day 3.m4v | 231.16 MB |
23C3 1517 Lightning Talks Day 4.m4v | 621.15 MB |
23C3 1520 Counter-Development - The Accessibility of Technology as an Addendum to Engineering Ethics.m4v | 242.27 MB |
23C3 1523 The Rise and Fall of Open Source - The Million Eyeball Principle and forkbombs.m4v | 165.83 MB |
23C3 1540 To live outside the law you gotta be honest - Ist nicht jedes Passwort eine Manifestation des Misstrauens.m4v | 104.42 MB |
23C3 1543 Kollaboratives Wissensmanagement im Bildungsbereich - Die Zitierfaehigkeit von Wiki-Wissen.m4v | 214.12 MB |
23C3 1545 Advanced Attacks Against PocketPC Phones - Ownd by an MMS.m4v | 191.94 MB |
23C3 1552 Nintendo DS - Introduction and hacking.m4v | 189.11 MB |
23C3 1554 Ethernet mit Mikrocontrollern - Wie funktioniert TCP mit 2kb RAM.m4v | 224.11 MB |
23C3 1555 Konrad Zuse, der rechnende Raum - Ein audiovisuelles Live-Feature.m4v | 96.05 MB |
23C3 1560 CSRF, the Intranet and You - Causes, Attacks and Countermeasures.m4v | 169.04 MB |
23C3 1561 4+2+1 Jahre BigBrotherAward Deutschland - Eine Lesung aus dem Buch Schwarzbuch Datenschutz.m4v | 244.47 MB |
23C3 1563 Funkerspuk - radio politics in the USA and Germany in the first half of the 20th century.m4v | 128.15 MB |
23C3 1566 OpenPCD, OpenPICC - Free RFID reader and emulator.m4v | 409.86 MB |
23C3 1567 Hacker Jeopardy - The one and only hacker quizshow.m4v | 392.34 MB |
23C3 1568 JSON RPC - Cross Site Scripting and Client Side Web Services.m4v | 88.73 MB |
23C3 1576 RFID hacking.m4v | 218.18 MB |
23C3 1578 Hacking fingerprint recognition systems - Kann ich dir ein Bier ausgeben.m4v | 197.99 MB |
23C3 1592 Inside VMware - How VMware, VirtualPC and Paralles actually work.m4v | 127.15 MB |
23C3 1593 Krypta DIY Serverhousing.m4v | 147.22 MB |
23C3 1596 Building an Open Source PKI using OpenXPKI - Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs.m4v | 321.42 MB |
23C3 1597 A Hacker's Toolkit for RFID Emulation and Jamming.m4v | 252.16 MB |
23C3 1600 Biometrics in Science Fiction - 2nd Iteration.m4v | 228.85 MB |
23C3 1602 Subverting Ajax - Next generation vulnerabilities in 2.0 Web Applications.m4v | 282.65 MB |
23C3 1603 Hacking a Country, FOSS in India - An Overview Free and Open Source Software efforts and projects.m4v | 144.17 MB |
23C3 1604 Tracking von Personen in Videoszenen - Wie trackt man automatisch sich bewegende Objekte.m4v | 218.18 MB |
23C3 1605 Digitale Bildforensik - Spuren in Digitalfotos.m4v | 231.25 MB |
23C3 1606 Console Hacking 2006 - Xbox 360, Playstation 3, Wii.m4v | 132.23 MB |
23C3 1607 A Probabilistic Trust Model for GnuPG - A new way of evaluating a PGP web of trust.m4v | 322.17 MB |
23C3 1608 Vehicular Communication and VANETs - The future and security of communicating vehicles.m4v | 295.44 MB |
23C3 1609 Data Retention Update - News and Perspectives on Implementation and Opposition.m4v | 185.65 MB |
23C3 1610 Fudging with Firmware - Firmware reverse-engineering tactics.m4v | 167.36 MB |
23C3 1611 Privacy, Identity, and Anonymity in Web 2.0.m4v | 175.90 MB |
23C3 1616 Nerds und Geeks zwischen Stereotyp und Subkultur.m4v | 312.89 MB |
23C3 1619 Introduction to matrix programming, trance codes - How to recognize trance coded communication patterns.m4v | 229.20 MB |
23C3 1622 Void the warranty - How to start analyzing blackboxes.m4v | 259.05 MB |
23C3 1627 Software Reliability in Aerospace - An overview on design and generation of safe and reliable Software.m4v | 107.02 MB |
23C3 1629 Body hacking - Functional body modification.m4v | 184.22 MB |
23C3 1634 How to squeeze more performance out of your wifi - Cross-layer optimization strategies for long-range IEEE 802.11e based radio.m4v | 172.65 MB |
23C3 1638 Freie Software, eine Chance fuer Afrika - Ein Erfahrungsbericht aus Malawi.m4v | 181.71 MB |
23C3 1640 A 10GE monitoring system - Hacking a 10 Gigabit Intrusion detection and prevention system into a network.m4v | 108.25 MB |
23C3 1642 Unlocking FileVault - An analysis of Apple's encrypted disk storage system.m4v | 204.59 MB |
23C3 1646 DVB-T, from Pixeldata to COFDM Transmission - How to build a complete FPGA-based DVB-T transmitter.m4v | 141.90 MB |
23C3 1651 Ueberwachen und Strafen in Entenhausen.m4v | 119.42 MB |
23C3 1652 Geschichte der Automaten, Androiden und Homunculi.m4v | 219.10 MB |
23C3 1655 Elektronische Reisedokumente - Neue Entwicklungen beim ePass.m4v | 123.70 MB |
23C3 1656 Design and Implementation of an object-orientated, secure TCP IP Stack - Ethereal W Wireshark without remote exploits.m4v | 242.51 MB |
23C3 1658 How to implement bignum arithmetic - A short look at my pet project implementation.m4v | 80.09 MB |
23C3 1663 Gueter und Personen tracken, Lokalisierung im Pizzamann-Universum - Technische Mittel und soziale Aspekte des Tracking and Tracing.m4v | 240.17 MB |
23C3 1670 Barrierefreies Web.m4v | 126.06 MB |
23C3 1678 Kritik an den Illuminaten zwischen 1787 und 2006 - Der Stand der Auseinandersetzung zwischen Discordiern und Illuminaten.m4v | 148.98 MB |
23C3 1679 Ueberwachungsdruck, einige Experimente - Wie wirkt Ueberwachung.m4v | 227.29 MB |
23C3 1680 Das neue gesetzliche Verbot des Hackings - Praktische Auswirkungen des neuen Strafrechtes.m4v | 252.89 MB |
23C3 1682 Hacking the Electoral Law.m4v | 261.78 MB |
23C3 1682 Security Nightmares 2007 - Oder, worueber wir naechstes Jahr lachen werden.m4v | 200.87 MB |
23C3 1683 Powerpoint Karaoke.m4v | 462.23 MB |
23C3 1685 Go, das Spiel fuer die Menschen - Auch fuer Computer, Nicht beim Go.m4v | 248.03 MB |
23C3 1688 Rootkits as Reversing Tools - An Anonymous Talk.m4v | 249.64 MB |
23C3 1694 Automated Exploit Detection in Binaries - Finding exploitable vulnerabilities in binaries.m4v | 203.32 MB |
23C3 1698 Culture Jamming and Discordianism - Illegal Art and Religious Bricolage.m4v | 173.31 MB |
23C3 1699 DRM comes to European digital TV.m4v | 141.80 MB |
23C3 1700 Router and Infrastructure Hacking - First we take Manhattan, then we take Berlin.m4v | 134.43 MB |
23C3 1701 Open Source Machine Translation - From fools, to tricks, to projects.m4v | 127.60 MB |
23C3 1708 TV-B-Gone - Better Living Through Inventing.m4v | 258.05 MB |
23C3 1709 Revenge of female Nerds - Busting Myths about Why Women Can't Be Technical.m4v | 118.86 MB |
23C3 1710 Tap the Electronic Frontier Foundation - EFF staffers answer your questions.m4v | 618.91 MB |
23C3 1713 Black Ops 2006 Viz Edition - Pixel Fuzzing and the Bioinformatic Bindiff.m4v | 237.71 MB |
23C3 1714 Warum wir uns so gerne ueberwachen lassen - Erhellendes aus Philosophie und Soziologie zur Klaerung des Phaenomens.m4v | 251.76 MB |
23C3 1721 Software Protection and the TPM - The Mac OS X Story.m4v | 281.77 MB |
23C3 1724 Transparency and Privacy - The 7 Laws of Identity and the Identity Metasystem.m4v | 295.70 MB |
23C3 1727 Closing Ceremony - Who did you trust.m4v | 127.72 MB |
23C3 1728 23C3 Network Review.m4v | 180.55 MB |
23C3 1728 sFlow - I can feel your traffic.m4v | 111.13 MB |
23C3 1733 Bluetooth Hacking Revisited.m4v | 234.47 MB |
23C3 1735 Faster PwninG Assured - Hardware Hacks and Cracks with FPGAs.m4v | 110.67 MB |
23C3 1736 Project Sputnik - Realtime in-building location tracking at the 23C3.m4v | 187.11 MB |
23C3 1738 MMORPGs - The state and future of the World of Warcraft.m4v | 254.48 MB |
23C3 1740 In the Absence of Trust.m4v | 135.61 MB |
23C3 1758 Fuzzing in the corporate world - The use of fuzzing in the corporate world over the years and recent implementation.m4v | 247.81 MB |
23C3 1759 Schlossoeffnung bei der Staatssicherheit der DDR - Werkzeuge und Vorgehen der STASI.m4v | 439.54 MB |
23C3 1760 On Free, and the Differences between Culture and Code.m4v | 303.90 MB |
23c3_m4v.html | 111.96 KB |
23c3_m4v-Dateien/23c3_m4v-logo-192x192.jpg | 62.70 KB |
23c3_m4v-Dateien/24c3_m4v-logo-64x64.jpg | 6.76 KB |
23c3_m4v-Dateien/24c3_mp3-logo-64x64.jpg | 6.76 KB |
23c3_m4v-Dateien/chaos_tv-logo-64x64.jpg | 38.38 KB |
23c3_m4v-Dateien/chaosradio-logo-64x64.jpg | 33.74 KB |
23c3_m4v-Dateien/chaosradio-logo-transparent-300.png | 16.60 KB |
23c3_m4v-Dateien/chaosradio.css | 3.07 KB |
23c3_m4v-Dateien/chaosradio_express-logo-64x64.jpg | 31.70 KB |
23c3_m4v-Dateien/chaosradio_international-logo-64x64.jpg | 33.38 KB |
23c3_m4v-Dateien/datenschleuder-logo-64x64.jpg | 33.82 KB |
23c3_m4v-Dateien/directory-itunes-subscribe.png | 7.12 KB |
23c3_m4v-Dateien/dossier_chaotique-logo-64x64.jpg | 33.46 KB |
23c3_m4v-Dateien/feed-icon-16x16.png | 764 B |
23c3_m4v-Dateien/format-audio-16x16.png | 1004 B |
23c3_m4v-Dateien/format-pdf-16x16.png | 404 B |
23c3_m4v-Dateien/format-video-16x16.png | 3.61 KB |
23c3_m4v-Dateien/format-video-48x48.png | 7.89 KB |
udp://tracker.thepiratebay.org:80/announce |
udp://tracker.openbittorrent.com:80/announce |
TorrentBank
Copyright © 2024