Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/papers/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
151 Side Channel Analysis of Smart Cards.pdf1.5 MiB2005-10-22 19:20:32
214 Kryptographie in Theorie und Praxis.pdf913.5 KiB2005-10-22 16:58:01
310 Information-Wissen-Macht.pdf3.7 MiB2005-10-22 16:44:19
105 Honeypot Forensics.pdf668.5 KiB2005-10-22 16:20:41
208 GameCube Hacking.pdf1.7 MiB2005-10-22 14:42:16
122 Enforcement of Intellectual Property Rights under German Private Law.pdf78.1 KiB2005-10-22 14:11:18
063 Edit This Page.pdf1.3 MiB2005-10-22 01:41:00
013 The Art of Fingerprinting.pdf1.1 MiB2005-06-27 19:01:39
313 Biometrie als datenschutzrechtliches Problem.pdf104.9 KiB2005-06-27 19:01:27
095 Security Nightmares 2005.pdf87.9 KiB2005-06-27 19:01:27
207 Amateurfunk.pdf1.7 MiB2005-06-27 19:01:26
083 Quanteninformationstheorie fuer Nicht Physiker.pdf1.3 MiB2005-06-27 19:01:09
019 Verdeckte Netzwerkanalyse.pdf712.0 KiB2005-06-27 19:00:57
125 Old Skewl Hacking Infra Red.pdf4.9 MiB2005-06-27 19:00:48
072 The Reality of Network Address Translators.pdf63.9 KiB2005-06-27 19:00:05
107 Embedded Devices as an attack vector.pdf297.9 KiB2005-06-27 19:00:04
158 How to find anything on the web.pdf2.1 MiB2005-06-27 19:00:01
273 Crashkurs Mathematik am Beispiel Biometrie.pdf566.3 KiB2005-06-27 18:59:38
040 Firewall Piercing.pdf1.9 MiB2005-06-27 18:59:32
218 Practical MacOS X Insecurities.pdf166.8 KiB2005-06-27 18:59:14
168 Spampolitik.pdf1.7 MiB2005-06-27 18:59:13
134 Secure Instant Messaging.pdf120.7 KiB2005-06-27 18:58:53
017 Next Generation Peer to Peer Systems.pdf1012.3 KiB2005-06-27 18:58:50
278 TKUeV-Das Ohr am Draht.pdf201.7 KiB2005-06-27 18:58:35
308 MD5 To Be Considered Harmful Someday.pdf153.7 KiB2005-06-27 18:58:31
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf2.7 MiB2005-06-27 18:58:28
011 xDash.pdf165.0 KiB2005-06-27 18:58:01
163 SPAM Workshop.pdf43.9 KiB2005-06-27 18:57:59
126 Apache Security.pdf1.8 MiB2005-06-27 18:57:53
253 Pixels want to be many.pdf49.0 KiB2005-06-27 18:57:53
111 The Kernel Accelerator Device.pdf223.6 KiB2005-06-27 18:57:37
015 Sicherheit bei VoIP-Systemen.pdf87.6 KiB2005-06-27 18:57:32
135 Voting Machine Technology.pdf82.9 KiB2005-06-27 18:57:30
127 Security Frameworks.pdf102.6 KiB2005-06-27 18:57:26
046 Tollcollect.pdf1.1 MiB2005-06-27 18:57:21
250 Lightning Talk-NetBSD Status Report.pdf651.4 KiB2005-06-27 18:57:10
070 Fnord-Jahresrueckblick.pdf3.4 MiB2005-06-27 18:57:04
081 Quantenmechanik fuer Nicht Physiker.pdf1.5 MiB2005-06-27 18:56:29
121 Black Ops of DNS.pdf3.7 MiB2005-06-27 18:55:27
187 Einfuehrung in die Rastersondenmikroskopie.pdf1.0 MiB2005-06-27 18:54:43
080 USB-Unbekannter Serieller Bus.pdf972.6 KiB2005-06-27 18:54:32
109 Anti-Honeypot Techniques.pdf1.3 MiB2005-06-27 18:54:04
039 Squeak and Croquet.pdf989.6 KiB2005-06-27 18:53:19
037 GNOME Anwendungsentwicklung.pdf817.2 KiB2005-06-27 18:52:27
045 Internet Censorship in China.pdf574.6 KiB2005-06-27 18:52:11
130 Physical Security.pdf1.6 MiB2005-06-27 18:51:32
274 Praktische Anleitung zum Bau eines Radiosenders.pdf143.3 KiB2005-06-27 18:51:17
244 High Speed Computing with FPGAs.pdf141.3 KiB2005-06-27 18:51:13
117 Kampagne Fair Sharing.pdf146.6 KiB2005-06-27 18:51:11
272 Sicherheitsmanagement.pdf476.0 KiB2005-06-27 18:51:07
014 Feuriges Hacken.pdf496.7 KiB2005-06-27 18:50:57
079 AVG aint vector graphics.pdf3.0 MiB2005-06-27 18:50:53
057 SUN Bloody Daft Solaris Mechanisms.pdf115.9 KiB2005-06-27 18:50:26
159 State of Emergent Democracy.pdf486.0 KiB2005-06-27 18:50:23
023 Ciphire Mail.pdf984.5 KiB2005-06-27 18:50:19
051 Recent features to OpenBSD-ntpd and bgpd.pdf898.0 KiB2005-06-27 18:50:06
183 Tor.pdf3.3 MiB2005-06-27 18:49:56
123 Gentoo Hardened.pdf197.1 KiB2005-06-27 18:49:27
047 Datamining the NSA.pdf28.4 KiB2005-06-27 18:49:25
066 Bluetooth Hacking.pdf353.6 KiB2005-06-27 18:49:20
289 Mixing VJing and Post-Production.pdf85.7 KiB2005-06-27 18:49:18
100 Anonymous communications.pdf83.5 KiB2005-06-27 18:49:17
012 Natural Language Steganography.pdf2.6 MiB2005-06-27 18:49:06
315 Fight for your Right to Fileshare.pdf637.2 KiB2005-06-27 18:48:41
176 Passive covert channels in the Linux kernel.pdf1.5 MiB2005-06-27 18:47:48
165 Softwarepatente - Der Tag danach.pdf905.1 KiB2005-06-27 18:47:35
064 Trusted Computing.pdf1.0 MiB2005-06-27 18:47:18
131 Learning OpenPGP by Example.pdf287.7 KiB2005-06-27 18:47:08
255 Pixels want to talk.pdf1.2 MiB2005-06-27 18:47:04
120 Softwarepatente - Ruestzeug zur Debatte.pdf149.2 KiB2005-06-27 18:46:27
316 Bericht von den BigBrotherAwards.pdf293.2 KiB2005-06-27 18:46:23
077 Weird Programming 2.pdf2.2 MiB2005-06-27 18:46:19
097 Das Literarische Code-Quartett.pdf911.8 KiB2005-06-27 18:45:34
136 Hacking Linux-Powered Devices.pdf2.6 MiB2005-06-27 18:45:26
038 Free Software Usage in South America.pdf568.8 KiB2005-06-27 18:45:02
055 CCC-Jahresrueckblick.pdf98.7 KiB2005-06-27 18:44:56
042 Cored Programming.pdf196.2 KiB2005-06-27 18:44:50
246 RFID Technologie und Implikationen.pdf866.4 KiB2005-06-27 18:44:47
178 Humanoid Robots.pdf2.5 MiB2005-06-27 18:44:38
016 Phishing the Web.pdf762.6 KiB2005-06-27 18:44:16
306 Ruby.pdf365.8 KiB2005-06-27 18:44:09
146 Mehr Sicherheit fuer HostAP-WLANs.pdf656.1 KiB2005-06-27 18:44:04
029 Robocup.pdf3.2 MiB2005-06-27 18:43:59
129 Die Propagandawueste des realen Krieges.pdf94.1 KiB2005-06-27 18:43:30
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf3.1 MiB2005-06-27 18:43:28
114 Der 2. Korb der Urheberrechtsnovelle.pdf380.2 KiB2005-06-27 18:42:04
113 Automated Hacking via Google.pdf78.4 KiB2005-06-27 18:42:00
065 Grundlagen des Compilerdesign.pdf1.2 MiB2005-06-27 18:41:59
110 Applied Data Mining.pdf218.6 KiB2005-06-27 18:41:48
216 Hacking The Genome.pdf1.7 MiB2005-06-27 18:41:02
098 Portable Software-Installation with pkg source.pdf261.5 KiB2005-06-27 18:40:46
060 Digital Prosthetics.pdf341.1 KiB2005-06-27 18:40:26
277 Das Programmiersystem Forth.pdf759.1 KiB2005-06-27 18:40:23
118 Verified Fiasco.pdf1.6 MiB2005-06-27 18:40:06
044 Machine Learning in Science and Engineering.pdf4.3 MiB2005-06-27 18:39:42
058 The Blinking Suspects.pdf1.1 MiB2005-06-27 18:38:48
059 Wikipedia Sociographics.pdf3.0 MiB2005-06-27 18:38:37
115 The Fiasco Kernel.pdf742.0 KiB2005-06-27 18:37:08
049 Zufallszahlengeneratoren.pdf485.4 KiB2005-06-27 18:37:01
056 LiberTOS.pdf196.8 KiB2005-06-27 18:36:38
099 GPL fuer Anfaenger.pdf268.7 KiB2005-06-27 18:36:34
078 Aspects of Elliptic Curve Cryptography.pdf415.6 KiB2005-06-27 18:36:30
027 Biometrie in Ausweisdokumenten.pdf335.4 KiB2005-06-27 18:36:26
213 Haskell.pdf681.1 KiB2005-06-27 18:36:23
026 SAP R3 Protocol Reverse Engineering.pdf658.9 KiB2005-06-27 18:36:15
062 Hacking EU funding for a FOSS project.pdf756.2 KiB2005-06-27 18:36:09
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf1.9 MiB2005-06-27 18:36:02
053 Enforcing the GNU GPL.pdf77.1 KiB2005-06-27 18:35:44
067 Inside PDF.pdf115.4 KiB2005-06-27 18:35:43
041 Einfuehrung in Kryptographische Methoden.pdf97.6 KiB2005-06-27 18:35:40
101 XMPP - Jabber.pdf92.2 KiB2005-06-27 18:35:39
242 Weird Programming 1.pdf1.1 MiB2005-06-27 18:35:38
317 Unsicherheit von Personal Firewalls.pdf289.2 KiB2005-06-27 18:35:27
271 Hidden Data in Internet Published Documents.pdf3.2 MiB2005-06-27 18:35:23
068 NOC Overview.pdf1.2 MiB2005-06-27 18:34:52
153 Suchmaschinenpolitik.pdf3.3 MiB2005-06-27 18:34:41
052 Die Ueblichen Verdaechtigen.pdf47.0 KiB2005-06-27 18:34:01