Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/audio/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
lectures/-2014-12-31 13:19:22
013 The Art of Fingerprinting.mp328.1 MiB2005-04-25 11:39:00
015 Sicherheit bei VoIP-Systemen.mp320.9 MiB2005-04-25 11:02:00
016 Phishing the Web.mp318.7 MiB2005-04-25 11:02:00
017 Next Generation Peer to Peer Systems.mp324.9 MiB2005-04-25 11:02:00
018 Computer und Robotik in Entenhausen.mp323.6 MiB2005-04-25 11:02:00
019 Verdeckte Netzwerkanalyse.mp326.8 MiB2005-04-25 11:03:00
023 Ciphire Mail.mp323.7 MiB2005-04-25 11:03:00
028 Biometrie ueberwinden.mp323.0 MiB2005-04-25 11:03:00
029 Robocup.mp323.9 MiB2005-04-25 11:03:00
037 GNOME Anwendungsentwicklung.mp321.0 MiB2005-04-25 11:03:00
038 Free Software Usage in South America.mp323.5 MiB2005-04-25 11:03:00
039 Squeak and Croquet.mp325.0 MiB2005-04-25 11:03:00
040 Firewall Piercing.mp325.3 MiB2005-04-25 11:03:00
041 Einfuehrung in Kryptographische Methoden.mp325.5 MiB2005-04-25 11:03:00
044 Machine Learning in Science and Engineering.mp325.7 MiB2005-04-25 11:04:00
045 Internet Censorship in China.mp320.0 MiB2005-04-25 11:04:00
046 Tollcollect.mp328.2 MiB2005-04-25 11:04:00
047 Datamining the NSA.mp322.9 MiB2005-04-25 11:04:00
049 Zufallszahlengeneratoren.mp315.5 MiB2005-04-25 11:04:00
051 Recent features to OpenBSD-ntpd and bgpd.mp320.0 MiB2005-04-25 11:04:00
052 Die Ueblichen Verdaechtigen.mp313.6 MiB2005-04-25 11:04:00
055 CCC-Jahresrueckblick.mp325.3 MiB2005-04-25 11:04:00
056 LiberTOS.mp30 B2005-10-11 14:29:20
057 SUN Bloody Daft Solaris Mechanisms.mp316.1 MiB2005-04-25 11:05:00
058 The Blinking Suspects.mp314.3 MiB2005-04-25 11:05:00
059 Wikipedia Sociographics.mp329.2 MiB2005-04-25 11:05:00
060 Digital Prosthetics.mp316.9 MiB2005-04-25 11:05:00
063 Edit This Page.mp320.7 MiB2005-04-25 11:05:00
066 Bluetooth Hacking.mp344.9 MiB2005-04-25 11:05:00
072 The Reality of Network Address Translators.mp326.7 MiB2005-04-25 11:05:00
074 Hacker-Jeopardy.mp360.2 MiB2005-04-25 11:06:00
077 Weird Programming 2.mp324.2 MiB2005-04-25 11:06:00
078 Aspects of Elliptic Curve Cryptography.mp326.9 MiB2005-04-25 11:06:00
079 AVG aint vector graphics.mp324.8 MiB2005-04-25 11:06:00
080 USB-Unbekannter Serieller Bus.mp323.2 MiB2005-04-25 11:06:00
081 Quantenmechanik fuer Nicht Physiker.mp318.8 MiB2005-04-25 11:06:00
083 Quanteninformationstheorie fuer Nicht Physiker.mp323.8 MiB2005-04-25 11:06:00
090 Hacktivity.mp343.0 MiB2005-04-25 11:07:00
095 Security Nightmares 2005.mp350.3 MiB2005-04-25 11:07:00
097 Das Literarische Code-Quartett.mp326.2 MiB2005-04-25 11:07:00
098 Portable Software-Installation with pkg source.mp319.4 MiB2005-04-25 11:07:00
099 GPL fuer Anfaenger.mp320.8 MiB2005-04-25 11:07:00
100 Anonymous communications.mp323.8 MiB2005-04-25 11:07:00
101 XMPP - Jabber.mp317.1 MiB2005-04-25 11:07:00
109 Anti-Honeypot Techniques.mp325.8 MiB2005-04-25 11:08:00
111 The Kernel Accelerator Device.mp320.7 MiB2005-04-25 11:08:00
113 Automated Hacking via Google.mp37.9 MiB2005-04-25 11:08:00
114 Der 2. Korb der Urheberrechtsnovelle.mp325.4 MiB2005-04-25 11:08:00
115 The Fiasco Kernel.mp325.3 MiB2005-04-25 11:41:00
117 Kampagne Fair Sharing.mp325.1 MiB2005-04-25 11:40:00
118 Verified Fiasco.mp325.4 MiB2005-04-25 11:40:00
120 Softwarepatente - Ruestzeug zur Debatte.mp328.3 MiB2005-04-25 11:40:00
121 Black Ops of DNS.mp326.0 MiB2005-04-25 11:40:00
123 Gentoo Hardened.mp323.9 MiB2005-04-25 11:40:00
125 Old Skewl Hacking.mp313.7 MiB2005-04-25 11:40:00
126 Apache Security.mp328.6 MiB2005-04-25 11:41:00
127 Security Frameworks.mp320.7 MiB2005-04-25 11:41:00
129 Die Propagandawueste des realen Krieges.mp330.7 MiB2005-04-25 11:41:00
131 Learning OpenPGP by Example.mp321.0 MiB2005-04-25 11:41:00
133 How to Herd Cats.mp328.1 MiB2005-04-25 11:41:00
134 Secure Instant Messaging.mp321.6 MiB2005-04-25 11:41:00
135 Voting Machine Technology.mp323.3 MiB2005-04-25 11:41:00
141 Pirate Radio.mp319.8 MiB2005-04-25 11:45:00
142 Lightning Talks Day 1.mp316.6 MiB2005-04-25 11:45:00
146 Mehr Sicherheit fuer HostAP-WLANs.mp313.6 MiB2005-04-25 11:46:00
151 Side Channel Analysis of Smart Cards.mp319.0 MiB2005-04-25 11:46:00
153 Suchmaschinenpolitik.mp323.7 MiB2005-04-25 11:46:00
156 Videoueberwachung im europaeischen Vergleich.mp320.9 MiB2005-04-25 11:46:00
157 Lightning Talks Day 2.mp324.2 MiB2005-04-25 11:46:00
158 How to find anything on the web.mp339.2 MiB2005-04-25 11:46:00
159 State of Emergent Democracy.mp327.3 MiB2005-04-25 11:46:00
164 Barrierefreies Internet.mp324.7 MiB2005-04-25 11:47:00
165 Softwarepatente - Der Tag danach.mp324.6 MiB2005-04-25 11:47:00
168 Spampolitik.mp326.7 MiB2005-04-25 11:47:00
171 Siegerehrung Lockpicking.mp328.4 MiB2005-04-25 11:47:00
173 Closing Event.mp314.0 MiB2005-04-25 11:47:00
178 Humanoid Robots.mp322.7 MiB2005-04-25 11:47:00
182 Radioaktive Paesse.mp321.5 MiB2005-04-25 11:47:00
183 Tor.mp326.1 MiB2005-04-25 11:48:00
208 Gamecube Hacking.mp324.4 MiB2005-04-25 11:48:00
209 Freedom of expression in new Arab landscape.mp324.0 MiB2005-04-25 11:48:00
215 The Incomputable Alan Turing.mp317.3 MiB2005-04-25 11:48:00
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.mp325.0 MiB2005-04-25 11:48:00
244 High Speed Computing with FPGAs.mp323.4 MiB2005-04-25 11:48:00
246 RFID Technologie und Implikationen.mp325.3 MiB2005-04-25 11:48:00
249 Opening Event.mp36.8 MiB2005-04-25 11:48:00
250 Lightning Talks Day 3.mp325.9 MiB2005-04-25 11:48:00
278 TKUeV-Das Ohr am Draht.mp325.7 MiB2005-04-25 11:48:00
308 MD5 To Be Considered Harmful Someday.mp323.1 MiB2005-04-25 11:49:00
310 Information-Wissen-Macht.mp325.6 MiB2005-04-25 11:49:00
312 Wirklich selbst denken oder durchdrehen.mp311.4 MiB2005-04-25 11:49:00
316 Bericht von den BigBrotherAwards.mp339.1 MiB2005-04-25 11:49:00
331 Biometrie ueberwinden Wdh.mp31.6 MiB2005-04-25 11:49:00