Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/papers/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
047 Datamining the NSA.pdf28.4 KiB2005-06-27 18:49:25
163 SPAM Workshop.pdf43.9 KiB2005-06-27 18:57:59
052 Die Ueblichen Verdaechtigen.pdf47.0 KiB2005-06-27 18:34:01
253 Pixels want to be many.pdf49.0 KiB2005-06-27 18:57:53
072 The Reality of Network Address Translators.pdf63.9 KiB2005-06-27 19:00:05
053 Enforcing the GNU GPL.pdf77.1 KiB2005-06-27 18:35:44
122 Enforcement of Intellectual Property Rights under German Private Law.pdf78.1 KiB2005-10-22 14:11:18
113 Automated Hacking via Google.pdf78.4 KiB2005-06-27 18:42:00
135 Voting Machine Technology.pdf82.9 KiB2005-06-27 18:57:30
100 Anonymous communications.pdf83.5 KiB2005-06-27 18:49:17
289 Mixing VJing and Post-Production.pdf85.7 KiB2005-06-27 18:49:18
015 Sicherheit bei VoIP-Systemen.pdf87.6 KiB2005-06-27 18:57:32
095 Security Nightmares 2005.pdf87.9 KiB2005-06-27 19:01:27
101 XMPP - Jabber.pdf92.2 KiB2005-06-27 18:35:39
129 Die Propagandawueste des realen Krieges.pdf94.1 KiB2005-06-27 18:43:30
041 Einfuehrung in Kryptographische Methoden.pdf97.6 KiB2005-06-27 18:35:40
055 CCC-Jahresrueckblick.pdf98.7 KiB2005-06-27 18:44:56
127 Security Frameworks.pdf102.6 KiB2005-06-27 18:57:26
313 Biometrie als datenschutzrechtliches Problem.pdf104.9 KiB2005-06-27 19:01:27
067 Inside PDF.pdf115.4 KiB2005-06-27 18:35:43
057 SUN Bloody Daft Solaris Mechanisms.pdf115.9 KiB2005-06-27 18:50:26
134 Secure Instant Messaging.pdf120.7 KiB2005-06-27 18:58:53
244 High Speed Computing with FPGAs.pdf141.3 KiB2005-06-27 18:51:13
274 Praktische Anleitung zum Bau eines Radiosenders.pdf143.3 KiB2005-06-27 18:51:17
117 Kampagne Fair Sharing.pdf146.6 KiB2005-06-27 18:51:11
120 Softwarepatente - Ruestzeug zur Debatte.pdf149.2 KiB2005-06-27 18:46:27
308 MD5 To Be Considered Harmful Someday.pdf153.7 KiB2005-06-27 18:58:31
011 xDash.pdf165.0 KiB2005-06-27 18:58:01
218 Practical MacOS X Insecurities.pdf166.8 KiB2005-06-27 18:59:14
042 Cored Programming.pdf196.2 KiB2005-06-27 18:44:50
056 LiberTOS.pdf196.8 KiB2005-06-27 18:36:38
123 Gentoo Hardened.pdf197.1 KiB2005-06-27 18:49:27
278 TKUeV-Das Ohr am Draht.pdf201.7 KiB2005-06-27 18:58:35
110 Applied Data Mining.pdf218.6 KiB2005-06-27 18:41:48
111 The Kernel Accelerator Device.pdf223.6 KiB2005-06-27 18:57:37
098 Portable Software-Installation with pkg source.pdf261.5 KiB2005-06-27 18:40:46
099 GPL fuer Anfaenger.pdf268.7 KiB2005-06-27 18:36:34
131 Learning OpenPGP by Example.pdf287.7 KiB2005-06-27 18:47:08
317 Unsicherheit von Personal Firewalls.pdf289.2 KiB2005-06-27 18:35:27
316 Bericht von den BigBrotherAwards.pdf293.2 KiB2005-06-27 18:46:23
107 Embedded Devices as an attack vector.pdf297.9 KiB2005-06-27 19:00:04
027 Biometrie in Ausweisdokumenten.pdf335.4 KiB2005-06-27 18:36:26
060 Digital Prosthetics.pdf341.1 KiB2005-06-27 18:40:26
066 Bluetooth Hacking.pdf353.6 KiB2005-06-27 18:49:20
306 Ruby.pdf365.8 KiB2005-06-27 18:44:09
114 Der 2. Korb der Urheberrechtsnovelle.pdf380.2 KiB2005-06-27 18:42:04
078 Aspects of Elliptic Curve Cryptography.pdf415.6 KiB2005-06-27 18:36:30
272 Sicherheitsmanagement.pdf476.0 KiB2005-06-27 18:51:07
049 Zufallszahlengeneratoren.pdf485.4 KiB2005-06-27 18:37:01
159 State of Emergent Democracy.pdf486.0 KiB2005-06-27 18:50:23
014 Feuriges Hacken.pdf496.7 KiB2005-06-27 18:50:57
273 Crashkurs Mathematik am Beispiel Biometrie.pdf566.3 KiB2005-06-27 18:59:38
038 Free Software Usage in South America.pdf568.8 KiB2005-06-27 18:45:02
045 Internet Censorship in China.pdf574.6 KiB2005-06-27 18:52:11
315 Fight for your Right to Fileshare.pdf637.2 KiB2005-06-27 18:48:41
250 Lightning Talk-NetBSD Status Report.pdf651.4 KiB2005-06-27 18:57:10
146 Mehr Sicherheit fuer HostAP-WLANs.pdf656.1 KiB2005-06-27 18:44:04
026 SAP R3 Protocol Reverse Engineering.pdf658.9 KiB2005-06-27 18:36:15
105 Honeypot Forensics.pdf668.5 KiB2005-10-22 16:20:41
213 Haskell.pdf681.1 KiB2005-06-27 18:36:23
019 Verdeckte Netzwerkanalyse.pdf712.0 KiB2005-06-27 19:00:57
115 The Fiasco Kernel.pdf742.0 KiB2005-06-27 18:37:08
062 Hacking EU funding for a FOSS project.pdf756.2 KiB2005-06-27 18:36:09
277 Das Programmiersystem Forth.pdf759.1 KiB2005-06-27 18:40:23
016 Phishing the Web.pdf762.6 KiB2005-06-27 18:44:16
037 GNOME Anwendungsentwicklung.pdf817.2 KiB2005-06-27 18:52:27
246 RFID Technologie und Implikationen.pdf866.4 KiB2005-06-27 18:44:47
051 Recent features to OpenBSD-ntpd and bgpd.pdf898.0 KiB2005-06-27 18:50:06
165 Softwarepatente - Der Tag danach.pdf905.1 KiB2005-06-27 18:47:35
097 Das Literarische Code-Quartett.pdf911.8 KiB2005-06-27 18:45:34
214 Kryptographie in Theorie und Praxis.pdf913.5 KiB2005-10-22 16:58:01
080 USB-Unbekannter Serieller Bus.pdf972.6 KiB2005-06-27 18:54:32
023 Ciphire Mail.pdf984.5 KiB2005-06-27 18:50:19
039 Squeak and Croquet.pdf989.6 KiB2005-06-27 18:53:19
017 Next Generation Peer to Peer Systems.pdf1012.3 KiB2005-06-27 18:58:50
187 Einfuehrung in die Rastersondenmikroskopie.pdf1.0 MiB2005-06-27 18:54:43
064 Trusted Computing.pdf1.0 MiB2005-06-27 18:47:18
242 Weird Programming 1.pdf1.1 MiB2005-06-27 18:35:38
013 The Art of Fingerprinting.pdf1.1 MiB2005-06-27 19:01:39
058 The Blinking Suspects.pdf1.1 MiB2005-06-27 18:38:48
046 Tollcollect.pdf1.1 MiB2005-06-27 18:57:21
068 NOC Overview.pdf1.2 MiB2005-06-27 18:34:52
255 Pixels want to talk.pdf1.2 MiB2005-06-27 18:47:04
065 Grundlagen des Compilerdesign.pdf1.2 MiB2005-06-27 18:41:59
109 Anti-Honeypot Techniques.pdf1.3 MiB2005-06-27 18:54:04
083 Quanteninformationstheorie fuer Nicht Physiker.pdf1.3 MiB2005-06-27 19:01:09
063 Edit This Page.pdf1.3 MiB2005-10-22 01:41:00
176 Passive covert channels in the Linux kernel.pdf1.5 MiB2005-06-27 18:47:48
081 Quantenmechanik fuer Nicht Physiker.pdf1.5 MiB2005-06-27 18:56:29
151 Side Channel Analysis of Smart Cards.pdf1.5 MiB2005-10-22 19:20:32
118 Verified Fiasco.pdf1.6 MiB2005-06-27 18:40:06
130 Physical Security.pdf1.6 MiB2005-06-27 18:51:32
208 GameCube Hacking.pdf1.7 MiB2005-10-22 14:42:16
216 Hacking The Genome.pdf1.7 MiB2005-06-27 18:41:02
207 Amateurfunk.pdf1.7 MiB2005-06-27 19:01:26
168 Spampolitik.pdf1.7 MiB2005-06-27 18:59:13
126 Apache Security.pdf1.8 MiB2005-06-27 18:57:53
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf1.9 MiB2005-06-27 18:36:02
040 Firewall Piercing.pdf1.9 MiB2005-06-27 18:59:32
158 How to find anything on the web.pdf2.1 MiB2005-06-27 19:00:01
077 Weird Programming 2.pdf2.2 MiB2005-06-27 18:46:19
178 Humanoid Robots.pdf2.5 MiB2005-06-27 18:44:38
136 Hacking Linux-Powered Devices.pdf2.6 MiB2005-06-27 18:45:26
012 Natural Language Steganography.pdf2.6 MiB2005-06-27 18:49:06
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf2.7 MiB2005-06-27 18:58:28
079 AVG aint vector graphics.pdf3.0 MiB2005-06-27 18:50:53
059 Wikipedia Sociographics.pdf3.0 MiB2005-06-27 18:38:37
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf3.1 MiB2005-06-27 18:43:28
271 Hidden Data in Internet Published Documents.pdf3.2 MiB2005-06-27 18:35:23
029 Robocup.pdf3.2 MiB2005-06-27 18:43:59
183 Tor.pdf3.3 MiB2005-06-27 18:49:56
153 Suchmaschinenpolitik.pdf3.3 MiB2005-06-27 18:34:41
070 Fnord-Jahresrueckblick.pdf3.4 MiB2005-06-27 18:57:04
310 Information-Wissen-Macht.pdf3.7 MiB2005-10-22 16:44:19
121 Black Ops of DNS.pdf3.7 MiB2005-06-27 18:55:27
044 Machine Learning in Science and Engineering.pdf4.3 MiB2005-06-27 18:39:42
125 Old Skewl Hacking Infra Red.pdf4.9 MiB2005-06-27 19:00:48