Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https and ftp. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/papers/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
011 xDash.pdf165.0 KiB2005-06-27 18:58:01
012 Natural Language Steganography.pdf2.6 MiB2005-06-27 18:49:06
013 The Art of Fingerprinting.pdf1.1 MiB2005-06-27 19:01:39
014 Feuriges Hacken.pdf496.7 KiB2005-06-27 18:50:57
015 Sicherheit bei VoIP-Systemen.pdf87.6 KiB2005-06-27 18:57:32
016 Phishing the Web.pdf762.6 KiB2005-06-27 18:44:16
017 Next Generation Peer to Peer Systems.pdf1012.3 KiB2005-06-27 18:58:50
019 Verdeckte Netzwerkanalyse.pdf712.0 KiB2005-06-27 19:00:57
023 Ciphire Mail.pdf984.5 KiB2005-06-27 18:50:19
026 SAP R3 Protocol Reverse Engineering.pdf658.9 KiB2005-06-27 18:36:15
027 Biometrie in Ausweisdokumenten.pdf335.4 KiB2005-06-27 18:36:26
029 Robocup.pdf3.2 MiB2005-06-27 18:43:59
037 GNOME Anwendungsentwicklung.pdf817.2 KiB2005-06-27 18:52:27
038 Free Software Usage in South America.pdf568.8 KiB2005-06-27 18:45:02
039 Squeak and Croquet.pdf989.6 KiB2005-06-27 18:53:19
040 Firewall Piercing.pdf1.9 MiB2005-06-27 18:59:32
041 Einfuehrung in Kryptographische Methoden.pdf97.6 KiB2005-06-27 18:35:40
042 Cored Programming.pdf196.2 KiB2005-06-27 18:44:50
044 Machine Learning in Science and Engineering.pdf4.3 MiB2005-06-27 18:39:42
045 Internet Censorship in China.pdf574.6 KiB2005-06-27 18:52:11
046 Tollcollect.pdf1.1 MiB2005-06-27 18:57:21
047 Datamining the NSA.pdf28.4 KiB2005-06-27 18:49:25
049 Zufallszahlengeneratoren.pdf485.4 KiB2005-06-27 18:37:01
051 Recent features to OpenBSD-ntpd and bgpd.pdf898.0 KiB2005-06-27 18:50:06
052 Die Ueblichen Verdaechtigen.pdf47.0 KiB2005-06-27 18:34:01
053 Enforcing the GNU GPL.pdf77.1 KiB2005-06-27 18:35:44
055 CCC-Jahresrueckblick.pdf98.7 KiB2005-06-27 18:44:56
056 LiberTOS.pdf196.8 KiB2005-06-27 18:36:38
057 SUN Bloody Daft Solaris Mechanisms.pdf115.9 KiB2005-06-27 18:50:26
058 The Blinking Suspects.pdf1.1 MiB2005-06-27 18:38:48
059 Wikipedia Sociographics.pdf3.0 MiB2005-06-27 18:38:37
060 Digital Prosthetics.pdf341.1 KiB2005-06-27 18:40:26
062 Hacking EU funding for a FOSS project.pdf756.2 KiB2005-06-27 18:36:09
063 Edit This Page.pdf1.3 MiB2005-10-22 01:41:00
064 Trusted Computing.pdf1.0 MiB2005-06-27 18:47:18
065 Grundlagen des Compilerdesign.pdf1.2 MiB2005-06-27 18:41:59
066 Bluetooth Hacking.pdf353.6 KiB2005-06-27 18:49:20
067 Inside PDF.pdf115.4 KiB2005-06-27 18:35:43
068 NOC Overview.pdf1.2 MiB2005-06-27 18:34:52
070 Fnord-Jahresrueckblick.pdf3.4 MiB2005-06-27 18:57:04
072 The Reality of Network Address Translators.pdf63.9 KiB2005-06-27 19:00:05
077 Weird Programming 2.pdf2.2 MiB2005-06-27 18:46:19
078 Aspects of Elliptic Curve Cryptography.pdf415.6 KiB2005-06-27 18:36:30
079 AVG aint vector graphics.pdf3.0 MiB2005-06-27 18:50:53
080 USB-Unbekannter Serieller Bus.pdf972.6 KiB2005-06-27 18:54:32
081 Quantenmechanik fuer Nicht Physiker.pdf1.5 MiB2005-06-27 18:56:29
083 Quanteninformationstheorie fuer Nicht Physiker.pdf1.3 MiB2005-06-27 19:01:09
095 Security Nightmares 2005.pdf87.9 KiB2005-06-27 19:01:27
097 Das Literarische Code-Quartett.pdf911.8 KiB2005-06-27 18:45:34
098 Portable Software-Installation with pkg source.pdf261.5 KiB2005-06-27 18:40:46
099 GPL fuer Anfaenger.pdf268.7 KiB2005-06-27 18:36:34
100 Anonymous communications.pdf83.5 KiB2005-06-27 18:49:17
101 XMPP - Jabber.pdf92.2 KiB2005-06-27 18:35:39
105 Honeypot Forensics.pdf668.5 KiB2005-10-22 16:20:41
107 Embedded Devices as an attack vector.pdf297.9 KiB2005-06-27 19:00:04
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf1.9 MiB2005-06-27 18:36:02
109 Anti-Honeypot Techniques.pdf1.3 MiB2005-06-27 18:54:04
110 Applied Data Mining.pdf218.6 KiB2005-06-27 18:41:48
111 The Kernel Accelerator Device.pdf223.6 KiB2005-06-27 18:57:37
113 Automated Hacking via Google.pdf78.4 KiB2005-06-27 18:42:00
114 Der 2. Korb der Urheberrechtsnovelle.pdf380.2 KiB2005-06-27 18:42:04
115 The Fiasco Kernel.pdf742.0 KiB2005-06-27 18:37:08
117 Kampagne Fair Sharing.pdf146.6 KiB2005-06-27 18:51:11
118 Verified Fiasco.pdf1.6 MiB2005-06-27 18:40:06
120 Softwarepatente - Ruestzeug zur Debatte.pdf149.2 KiB2005-06-27 18:46:27
121 Black Ops of DNS.pdf3.7 MiB2005-06-27 18:55:27
122 Enforcement of Intellectual Property Rights under German Private Law.pdf78.1 KiB2005-10-22 14:11:18
123 Gentoo Hardened.pdf197.1 KiB2005-06-27 18:49:27
125 Old Skewl Hacking Infra Red.pdf4.9 MiB2005-06-27 19:00:48
126 Apache Security.pdf1.8 MiB2005-06-27 18:57:53
127 Security Frameworks.pdf102.6 KiB2005-06-27 18:57:26
129 Die Propagandawueste des realen Krieges.pdf94.1 KiB2005-06-27 18:43:30
130 Physical Security.pdf1.6 MiB2005-06-27 18:51:32
131 Learning OpenPGP by Example.pdf287.7 KiB2005-06-27 18:47:08
134 Secure Instant Messaging.pdf120.7 KiB2005-06-27 18:58:53
135 Voting Machine Technology.pdf82.9 KiB2005-06-27 18:57:30
136 Hacking Linux-Powered Devices.pdf2.6 MiB2005-06-27 18:45:26
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf2.7 MiB2005-06-27 18:58:28
146 Mehr Sicherheit fuer HostAP-WLANs.pdf656.1 KiB2005-06-27 18:44:04
151 Side Channel Analysis of Smart Cards.pdf1.5 MiB2005-10-22 19:20:32
153 Suchmaschinenpolitik.pdf3.3 MiB2005-06-27 18:34:41
158 How to find anything on the web.pdf2.1 MiB2005-06-27 19:00:01
159 State of Emergent Democracy.pdf486.0 KiB2005-06-27 18:50:23
163 SPAM Workshop.pdf43.9 KiB2005-06-27 18:57:59
165 Softwarepatente - Der Tag danach.pdf905.1 KiB2005-06-27 18:47:35
168 Spampolitik.pdf1.7 MiB2005-06-27 18:59:13
176 Passive covert channels in the Linux kernel.pdf1.5 MiB2005-06-27 18:47:48
178 Humanoid Robots.pdf2.5 MiB2005-06-27 18:44:38
183 Tor.pdf3.3 MiB2005-06-27 18:49:56
187 Einfuehrung in die Rastersondenmikroskopie.pdf1.0 MiB2005-06-27 18:54:43
207 Amateurfunk.pdf1.7 MiB2005-06-27 19:01:26
208 GameCube Hacking.pdf1.7 MiB2005-10-22 14:42:16
213 Haskell.pdf681.1 KiB2005-06-27 18:36:23
214 Kryptographie in Theorie und Praxis.pdf913.5 KiB2005-10-22 16:58:01
216 Hacking The Genome.pdf1.7 MiB2005-06-27 18:41:02
218 Practical MacOS X Insecurities.pdf166.8 KiB2005-06-27 18:59:14
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf3.1 MiB2005-06-27 18:43:28
242 Weird Programming 1.pdf1.1 MiB2005-06-27 18:35:38
244 High Speed Computing with FPGAs.pdf141.3 KiB2005-06-27 18:51:13
246 RFID Technologie und Implikationen.pdf866.4 KiB2005-06-27 18:44:47
250 Lightning Talk-NetBSD Status Report.pdf651.4 KiB2005-06-27 18:57:10
253 Pixels want to be many.pdf49.0 KiB2005-06-27 18:57:53
255 Pixels want to talk.pdf1.2 MiB2005-06-27 18:47:04
271 Hidden Data in Internet Published Documents.pdf3.2 MiB2005-06-27 18:35:23
272 Sicherheitsmanagement.pdf476.0 KiB2005-06-27 18:51:07
273 Crashkurs Mathematik am Beispiel Biometrie.pdf566.3 KiB2005-06-27 18:59:38
274 Praktische Anleitung zum Bau eines Radiosenders.pdf143.3 KiB2005-06-27 18:51:17
277 Das Programmiersystem Forth.pdf759.1 KiB2005-06-27 18:40:23
278 TKUeV-Das Ohr am Draht.pdf201.7 KiB2005-06-27 18:58:35
289 Mixing VJing and Post-Production.pdf85.7 KiB2005-06-27 18:49:18
306 Ruby.pdf365.8 KiB2005-06-27 18:44:09
308 MD5 To Be Considered Harmful Someday.pdf153.7 KiB2005-06-27 18:58:31
310 Information-Wissen-Macht.pdf3.7 MiB2005-10-22 16:44:19
313 Biometrie als datenschutzrechtliches Problem.pdf104.9 KiB2005-06-27 19:01:27
315 Fight for your Right to Fileshare.pdf637.2 KiB2005-06-27 18:48:41
316 Bericht von den BigBrotherAwards.pdf293.2 KiB2005-06-27 18:46:23
317 Unsicherheit von Personal Firewalls.pdf289.2 KiB2005-06-27 18:35:27