Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https and ftp. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/papers/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
052 Die Ueblichen Verdaechtigen.pdf47.0 KiB2005-06-27 18:34:01
153 Suchmaschinenpolitik.pdf3.3 MiB2005-06-27 18:34:41
068 NOC Overview.pdf1.2 MiB2005-06-27 18:34:52
271 Hidden Data in Internet Published Documents.pdf3.2 MiB2005-06-27 18:35:23
317 Unsicherheit von Personal Firewalls.pdf289.2 KiB2005-06-27 18:35:27
242 Weird Programming 1.pdf1.1 MiB2005-06-27 18:35:38
101 XMPP - Jabber.pdf92.2 KiB2005-06-27 18:35:39
041 Einfuehrung in Kryptographische Methoden.pdf97.6 KiB2005-06-27 18:35:40
067 Inside PDF.pdf115.4 KiB2005-06-27 18:35:43
053 Enforcing the GNU GPL.pdf77.1 KiB2005-06-27 18:35:44
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf1.9 MiB2005-06-27 18:36:02
062 Hacking EU funding for a FOSS project.pdf756.2 KiB2005-06-27 18:36:09
026 SAP R3 Protocol Reverse Engineering.pdf658.9 KiB2005-06-27 18:36:15
213 Haskell.pdf681.1 KiB2005-06-27 18:36:23
027 Biometrie in Ausweisdokumenten.pdf335.4 KiB2005-06-27 18:36:26
078 Aspects of Elliptic Curve Cryptography.pdf415.6 KiB2005-06-27 18:36:30
099 GPL fuer Anfaenger.pdf268.7 KiB2005-06-27 18:36:34
056 LiberTOS.pdf196.8 KiB2005-06-27 18:36:38
049 Zufallszahlengeneratoren.pdf485.4 KiB2005-06-27 18:37:01
115 The Fiasco Kernel.pdf742.0 KiB2005-06-27 18:37:08
059 Wikipedia Sociographics.pdf3.0 MiB2005-06-27 18:38:37
058 The Blinking Suspects.pdf1.1 MiB2005-06-27 18:38:48
044 Machine Learning in Science and Engineering.pdf4.3 MiB2005-06-27 18:39:42
118 Verified Fiasco.pdf1.6 MiB2005-06-27 18:40:06
277 Das Programmiersystem Forth.pdf759.1 KiB2005-06-27 18:40:23
060 Digital Prosthetics.pdf341.1 KiB2005-06-27 18:40:26
098 Portable Software-Installation with pkg source.pdf261.5 KiB2005-06-27 18:40:46
216 Hacking The Genome.pdf1.7 MiB2005-06-27 18:41:02
110 Applied Data Mining.pdf218.6 KiB2005-06-27 18:41:48
065 Grundlagen des Compilerdesign.pdf1.2 MiB2005-06-27 18:41:59
113 Automated Hacking via Google.pdf78.4 KiB2005-06-27 18:42:00
114 Der 2. Korb der Urheberrechtsnovelle.pdf380.2 KiB2005-06-27 18:42:04
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf3.1 MiB2005-06-27 18:43:28
129 Die Propagandawueste des realen Krieges.pdf94.1 KiB2005-06-27 18:43:30
029 Robocup.pdf3.2 MiB2005-06-27 18:43:59
146 Mehr Sicherheit fuer HostAP-WLANs.pdf656.1 KiB2005-06-27 18:44:04
306 Ruby.pdf365.8 KiB2005-06-27 18:44:09
016 Phishing the Web.pdf762.6 KiB2005-06-27 18:44:16
178 Humanoid Robots.pdf2.5 MiB2005-06-27 18:44:38
246 RFID Technologie und Implikationen.pdf866.4 KiB2005-06-27 18:44:47
042 Cored Programming.pdf196.2 KiB2005-06-27 18:44:50
055 CCC-Jahresrueckblick.pdf98.7 KiB2005-06-27 18:44:56
038 Free Software Usage in South America.pdf568.8 KiB2005-06-27 18:45:02
136 Hacking Linux-Powered Devices.pdf2.6 MiB2005-06-27 18:45:26
097 Das Literarische Code-Quartett.pdf911.8 KiB2005-06-27 18:45:34
077 Weird Programming 2.pdf2.2 MiB2005-06-27 18:46:19
316 Bericht von den BigBrotherAwards.pdf293.2 KiB2005-06-27 18:46:23
120 Softwarepatente - Ruestzeug zur Debatte.pdf149.2 KiB2005-06-27 18:46:27
255 Pixels want to talk.pdf1.2 MiB2005-06-27 18:47:04
131 Learning OpenPGP by Example.pdf287.7 KiB2005-06-27 18:47:08
064 Trusted Computing.pdf1.0 MiB2005-06-27 18:47:18
165 Softwarepatente - Der Tag danach.pdf905.1 KiB2005-06-27 18:47:35
176 Passive covert channels in the Linux kernel.pdf1.5 MiB2005-06-27 18:47:48
315 Fight for your Right to Fileshare.pdf637.2 KiB2005-06-27 18:48:41
012 Natural Language Steganography.pdf2.6 MiB2005-06-27 18:49:06
100 Anonymous communications.pdf83.5 KiB2005-06-27 18:49:17
289 Mixing VJing and Post-Production.pdf85.7 KiB2005-06-27 18:49:18
066 Bluetooth Hacking.pdf353.6 KiB2005-06-27 18:49:20
047 Datamining the NSA.pdf28.4 KiB2005-06-27 18:49:25
123 Gentoo Hardened.pdf197.1 KiB2005-06-27 18:49:27
183 Tor.pdf3.3 MiB2005-06-27 18:49:56
051 Recent features to OpenBSD-ntpd and bgpd.pdf898.0 KiB2005-06-27 18:50:06
023 Ciphire Mail.pdf984.5 KiB2005-06-27 18:50:19
159 State of Emergent Democracy.pdf486.0 KiB2005-06-27 18:50:23
057 SUN Bloody Daft Solaris Mechanisms.pdf115.9 KiB2005-06-27 18:50:26
079 AVG aint vector graphics.pdf3.0 MiB2005-06-27 18:50:53
014 Feuriges Hacken.pdf496.7 KiB2005-06-27 18:50:57
272 Sicherheitsmanagement.pdf476.0 KiB2005-06-27 18:51:07
117 Kampagne Fair Sharing.pdf146.6 KiB2005-06-27 18:51:11
244 High Speed Computing with FPGAs.pdf141.3 KiB2005-06-27 18:51:13
274 Praktische Anleitung zum Bau eines Radiosenders.pdf143.3 KiB2005-06-27 18:51:17
130 Physical Security.pdf1.6 MiB2005-06-27 18:51:32
045 Internet Censorship in China.pdf574.6 KiB2005-06-27 18:52:11
037 GNOME Anwendungsentwicklung.pdf817.2 KiB2005-06-27 18:52:27
039 Squeak and Croquet.pdf989.6 KiB2005-06-27 18:53:19
109 Anti-Honeypot Techniques.pdf1.3 MiB2005-06-27 18:54:04
080 USB-Unbekannter Serieller Bus.pdf972.6 KiB2005-06-27 18:54:32
187 Einfuehrung in die Rastersondenmikroskopie.pdf1.0 MiB2005-06-27 18:54:43
121 Black Ops of DNS.pdf3.7 MiB2005-06-27 18:55:27
081 Quantenmechanik fuer Nicht Physiker.pdf1.5 MiB2005-06-27 18:56:29
070 Fnord-Jahresrueckblick.pdf3.4 MiB2005-06-27 18:57:04
250 Lightning Talk-NetBSD Status Report.pdf651.4 KiB2005-06-27 18:57:10
046 Tollcollect.pdf1.1 MiB2005-06-27 18:57:21
127 Security Frameworks.pdf102.6 KiB2005-06-27 18:57:26
135 Voting Machine Technology.pdf82.9 KiB2005-06-27 18:57:30
015 Sicherheit bei VoIP-Systemen.pdf87.6 KiB2005-06-27 18:57:32
111 The Kernel Accelerator Device.pdf223.6 KiB2005-06-27 18:57:37
253 Pixels want to be many.pdf49.0 KiB2005-06-27 18:57:53
126 Apache Security.pdf1.8 MiB2005-06-27 18:57:53
163 SPAM Workshop.pdf43.9 KiB2005-06-27 18:57:59
011 xDash.pdf165.0 KiB2005-06-27 18:58:01
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf2.7 MiB2005-06-27 18:58:28
308 MD5 To Be Considered Harmful Someday.pdf153.7 KiB2005-06-27 18:58:31
278 TKUeV-Das Ohr am Draht.pdf201.7 KiB2005-06-27 18:58:35
017 Next Generation Peer to Peer Systems.pdf1012.3 KiB2005-06-27 18:58:50
134 Secure Instant Messaging.pdf120.7 KiB2005-06-27 18:58:53
168 Spampolitik.pdf1.7 MiB2005-06-27 18:59:13
218 Practical MacOS X Insecurities.pdf166.8 KiB2005-06-27 18:59:14
040 Firewall Piercing.pdf1.9 MiB2005-06-27 18:59:32
273 Crashkurs Mathematik am Beispiel Biometrie.pdf566.3 KiB2005-06-27 18:59:38
158 How to find anything on the web.pdf2.1 MiB2005-06-27 19:00:01
107 Embedded Devices as an attack vector.pdf297.9 KiB2005-06-27 19:00:04
072 The Reality of Network Address Translators.pdf63.9 KiB2005-06-27 19:00:05
125 Old Skewl Hacking Infra Red.pdf4.9 MiB2005-06-27 19:00:48
019 Verdeckte Netzwerkanalyse.pdf712.0 KiB2005-06-27 19:00:57
083 Quanteninformationstheorie fuer Nicht Physiker.pdf1.3 MiB2005-06-27 19:01:09
207 Amateurfunk.pdf1.7 MiB2005-06-27 19:01:26
313 Biometrie als datenschutzrechtliches Problem.pdf104.9 KiB2005-06-27 19:01:27
095 Security Nightmares 2005.pdf87.9 KiB2005-06-27 19:01:27
013 The Art of Fingerprinting.pdf1.1 MiB2005-06-27 19:01:39
063 Edit This Page.pdf1.3 MiB2005-10-22 01:41:00
122 Enforcement of Intellectual Property Rights under German Private Law.pdf78.1 KiB2005-10-22 14:11:18
208 GameCube Hacking.pdf1.7 MiB2005-10-22 14:42:16
105 Honeypot Forensics.pdf668.5 KiB2005-10-22 16:20:41
310 Information-Wissen-Macht.pdf3.7 MiB2005-10-22 16:44:19
214 Kryptographie in Theorie und Praxis.pdf913.5 KiB2005-10-22 16:58:01
151 Side Channel Analysis of Smart Cards.pdf1.5 MiB2005-10-22 19:20:32