Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2008/video_h264_720x576/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4383.7 MiB2008-12-27 22:33:57
25c3-2665-en-the_trust_situation.mp4465.9 MiB2008-12-28 00:30:53
25c3-2976-en-hacking_the_iphone.mp4447.1 MiB2008-12-28 11:06:03
25c3-2839-en-cracking_the_msp430_bsl.mp4287.0 MiB2008-12-29 16:15:26
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4460.4 MiB2008-12-29 18:26:37
25c3-2799-en-console_hacking_2008_wii_fail.mp4433.7 MiB2008-12-29 19:13:10
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4378.5 MiB2008-12-29 19:23:25
25c3-2814-de-datenpannen.mp4405.2 MiB2008-12-29 19:26:15
25c3-2896-en-chip_reverse_engineering.mp4344.6 MiB2008-12-29 20:17:17
25c3-2970-en-coreboot_beyond_the_final_frontier.mp4389.7 MiB2008-12-29 22:02:36
25c3-3044-en-all_your_bases_are_belong_to_us.mp4425.3 MiB2008-12-29 23:38:23
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4233.9 MiB2008-12-30 01:49:04
25c3-2882-en-full-disk-encryption_crash-course.mp4369.8 MiB2008-12-30 01:50:31
25c3-3047-en-lightning_talks_day3_morning.mp4455.9 MiB2008-12-30 01:52:58
25c3-2873-en-privacy_in_the_social_semantic_web.mp4352.2 MiB2008-12-30 02:56:01
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4498.4 MiB2008-12-30 11:56:45
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4449.0 MiB2008-12-30 12:42:40
25c3-2827-de-u23.mp4382.9 MiB2008-12-30 15:16:48
25c3-2832-en-exploiting_symbian.mp4482.6 MiB2008-12-30 15:17:32
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4503.0 MiB2008-12-30 15:34:40
25c3-2812-de-fnord_news_show.mp4385.2 MiB2008-12-30 15:41:36
25c3-2860-de-neusprech_im_berwachungsstaat.mp4537.2 MiB2008-12-30 18:57:07
25c3-2773-en-soviet_unterzoegersdorf.mp4547.2 MiB2008-12-30 19:30:35
25c3-3015-en-rapid_prototype_your_life.mp4436.7 MiB2008-12-30 20:02:17
25c3-2997-en-locating_mobile_phones_using_ss7.mp4372.0 MiB2008-12-30 20:10:48
25c3-2799-en-console_hacking_2008_wii_fail.mp4.md581 B2009-01-04 12:18:47
25c3-2773-en-soviet_unterzoegersdorf.mp4.md575 B2009-01-04 12:18:47
25c3-2665-en-the_trust_situation.mp4.md571 B2009-01-04 12:18:47
25c3-2815-en-beyond_asimov_-_laws_for_robots.mp4.md583 B2009-01-04 12:18:47
25c3-2814-de-datenpannen.mp4.md563 B2009-01-04 12:18:47
25c3-2827-de-u23.mp4.md555 B2009-01-04 12:18:47
25c3-2860-de-neusprech_im_berwachungsstaat.mp4.md581 B2009-01-04 12:18:47
25c3-2873-en-privacy_in_the_social_semantic_web.mp4.md586 B2009-01-04 12:18:47
25c3-2806-en-building_an_international_movement_hackerspacesorg.mp4.md5102 B2009-01-04 12:18:47
25c3-2839-en-cracking_the_msp430_bsl.mp4.md575 B2009-01-04 12:18:47
25c3-2812-de-fnord_news_show.mp4.md567 B2009-01-04 12:18:47
25c3-2678-en-vulnerability_discovery_in_encrypted_closed_source_php_applications.mp4.md5119 B2009-01-04 12:18:47
25c3-2832-en-exploiting_symbian.mp4.md570 B2009-01-04 12:18:47
25c3-2896-en-chip_reverse_engineering.mp4.md576 B2009-01-04 12:18:49
25c3-2882-en-full-disk-encryption_crash-course.mp4.md585 B2009-01-04 12:18:49
25c3-2909-en-tcp_denial_of_service_vulnerabilities.mp4.md589 B2009-01-04 12:18:51
25c3-3041-en-evoting_after_nedap_and_digital_pen.mp4.md587 B2009-01-04 12:18:51
25c3-3015-en-rapid_prototype_your_life.mp4.md577 B2009-01-04 12:18:51
25c3-2970-en-coreboot_beyond_the_final_frontier.mp4.md586 B2009-01-04 12:18:51
25c3-2997-en-locating_mobile_phones_using_ss7.mp4.md584 B2009-01-04 12:18:51
25c3-3047-en-lightning_talks_day3_morning.mp4.md580 B2009-01-04 12:18:51
25c3-2976-en-hacking_the_iphone.mp4.md570 B2009-01-04 12:18:51
25c3-3044-en-all_your_bases_are_belong_to_us.mp4.md583 B2009-01-04 12:18:51
25c3-2922-en-advanced_memory_forensics_the_cold_boot_attacks.mp4.md599 B2009-01-04 12:18:51
25c3-2901-en-faifa_a_first_open_source_plc_tool.mp4.md586 B2009-01-04 12:18:51
25c3-2874-en-the_ultimate_commodore_64_talk.mp4.md582 B2009-01-06 20:50:09
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4.md5106 B2009-01-06 20:50:09
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4.md599 B2009-01-06 20:50:09
25c3-2899-en-mining_social_contacts_with_active_rfid.mp4.md591 B2009-01-06 20:50:09
25c3-2942-de-vertex_hacking.mp4.md566 B2009-01-06 20:50:10
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4.md592 B2009-01-06 20:50:10
25c3-2937-en-dect.mp4.md556 B2009-01-06 20:50:10
25c3-2988-en-just_estonia_and_georgia.mp4.md576 B2009-01-06 20:50:11
25c3-3004-en-why_technology_sucks.mp4.md572 B2009-01-06 20:50:11
25c3-2991-en-terrorist_all-stars.mp4.md571 B2009-01-06 20:50:11
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4.md597 B2009-01-06 20:50:11
25c3-3023-en-making_the_theoretical_possible.mp4.md583 B2009-01-06 20:50:12
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4.md581 B2009-01-06 20:50:12
25c3-2791-en-la_quadrature_du_net_-_campaigning_on_telecoms_package.mp4507.4 MiB2009-01-06 20:53:48
25c3-2831-en-security_of_mica-based_wireless_sensor_networks.mp4283.9 MiB2009-01-06 20:54:58
25c3-2874-en-the_ultimate_commodore_64_talk.mp4469.4 MiB2009-01-06 20:58:24
25c3-2899-en-mining_social_contacts_with_active_rfid.mp4454.0 MiB2009-01-06 21:03:49
25c3-2923-de-das_grundrecht_auf_digitale_intimsphaere.mp4423.6 MiB2009-01-06 21:13:43
25c3-2937-en-dect.mp4512.5 MiB2009-01-06 21:17:17
25c3-2942-de-vertex_hacking.mp4375.2 MiB2009-01-06 21:21:23
25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4477.2 MiB2009-01-06 21:29:26
25c3-2988-en-just_estonia_and_georgia.mp4342.6 MiB2009-01-06 21:30:55
25c3-2991-en-terrorist_all-stars.mp4499.9 MiB2009-01-06 21:31:35
25c3-3004-en-why_technology_sucks.mp4342.6 MiB2009-01-06 21:32:29
25c3-3023-en-making_the_theoretical_possible.mp4473.4 MiB2009-01-06 21:33:04
25c3-3028-de-der_hackerparagraph_202c_stgb.mp4469.8 MiB2009-01-06 21:33:39
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4.md5138 B2009-01-07 23:10:59
25c3-2596-en-swf_and_the_malware_tragedy.mp4.md579 B2009-01-07 23:10:59
25c3-2872-en-the_privacy_workshop_project.mp4.md580 B2009-01-07 23:11:00
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4.md586 B2009-01-07 23:11:00
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4.md596 B2009-01-07 23:11:00
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4.md5108 B2009-01-07 23:11:00
25c3-2979-en-embracing_post-privacy.mp4.md574 B2009-01-07 23:11:00
25c3-2992-en-tricks_makes_you_smile.mp4.md574 B2009-01-07 23:11:00
25c3-2890-en-scalable_swarm_robotics.mp4.md575 B2009-01-07 23:11:00
25c3-2934-en-blinkenlights_stereoscope.mp4.md577 B2009-01-07 23:11:00
25c3-2843-en-algorithmic_music_in_a_box.mp4.md578 B2009-01-07 23:11:00
25c3-2980-en-the_infinite_library.mp4.md572 B2009-01-07 23:11:00
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4.md5116 B2009-01-07 23:11:00
25c3-2816-en-cisco_ios_attack_and_defense.mp4.md580 B2009-01-07 23:11:00
25c3-3008-en-anatomy_of_smartphone_hardware.mp4.md582 B2009-01-07 23:11:01
25c3-3053-en-lightning_talks_day3_-_evening.mp4.md582 B2009-01-07 23:11:01
25c3-3032-en-analyzing_rfid_security.mp4.md575 B2009-01-07 23:11:01
25c3-2596-en-swf_and_the_malware_tragedy.mp4372.8 MiB2009-01-07 23:13:06
25c3-2680-en-not_soy_fast_genetically_modified_resource_greedy_and_coming_to_a_supermarket_near_you.mp4369.0 MiB2009-01-07 23:15:23
25c3-2816-en-cisco_ios_attack_and_defense.mp4508.0 MiB2009-01-07 23:18:35
25c3-2828-en-onioncat_a_tor-based_anonymous_vpn.mp4338.3 MiB2009-01-07 23:20:35
25c3-2843-en-algorithmic_music_in_a_box.mp4391.9 MiB2009-01-07 23:22:48
25c3-2872-en-the_privacy_workshop_project.mp4371.2 MiB2009-01-07 23:24:41
25c3-2875-en-an_introduction_to_new_stream_cipher_designs.mp4359.2 MiB2009-01-07 23:26:44
25c3-2890-en-scalable_swarm_robotics.mp4300.5 MiB2009-01-07 23:28:15
25c3-2934-en-blinkenlights_stereoscope.mp4498.8 MiB2009-01-07 23:31:10
25c3-2938-en-methods_for_understanding_targeted_attacks_with_office_documents.mp4391.6 MiB2009-01-07 23:32:02
25c3-2979-en-embracing_post-privacy.mp4455.5 MiB2009-01-07 23:32:44
25c3-2980-en-the_infinite_library.mp4450.0 MiB2009-01-07 23:33:26
25c3-2992-en-tricks_makes_you_smile.mp4281.3 MiB2009-01-07 23:33:52
25c3-2995-en-predictable_rng_in_the_vulnerable_debian_openssl_package.mp4388.0 MiB2009-01-07 23:34:29
25c3-3008-en-anatomy_of_smartphone_hardware.mp4436.1 MiB2009-01-07 23:35:11
25c3-3032-en-analyzing_rfid_security.mp4413.8 MiB2009-01-07 23:35:54
25c3-3053-en-lightning_talks_day3_-_evening.mp4427.5 MiB2009-01-07 23:36:42
25c3-2781-en-objects_as_software_the_coming_revolution.mp4.md593 B2009-01-11 21:43:09
25c3-2895-de-der_elektronische_personalausweis.mp4.md585 B2009-01-11 21:43:09
25c3-2973-en-lightning_talks_day4.mp4.md572 B2009-01-11 21:43:09
25c3-2893-en-attacking_rich_internet_applications.mp4.md588 B2009-01-11 21:43:09
25c3-2958-de-hacker_jeopardy.mp4.md567 B2009-01-11 21:43:09
25c3-2639-en-attacking_nfc_mobile_phones.mp4.md579 B2009-01-11 21:43:09
25c3-2999-en-closing_ceremony.mp4.md568 B2009-01-11 21:43:09
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4.md5102 B2009-01-11 21:43:09
25c3-2952-de-pflanzenhacken.mp4.md566 B2009-01-11 21:43:09
25c3-2681-en-repurposing_the_ti_ez430u.mp4.md577 B2009-01-11 21:43:09
25c3-2734-en-short_attention_span_security.mp4.md581 B2009-01-11 21:43:09
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4.md580 B2009-01-11 21:43:09
25c3-2916-en-wikileaks.mp4.md561 B2009-01-11 21:43:09
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4.md591 B2009-01-11 21:43:09
25c3-2669-en-collapsing_the_european_security_architecture.mp4.md597 B2009-01-11 21:43:09
25c3-3002-en-squeezing_attack_traces.mp4.md575 B2009-01-11 21:43:10
25c3-3016-en-life_is_a_holodeck.mp4.md570 B2009-01-11 21:43:10
25c3-3030-en-messing_around_with_garage_doors.mp4.md584 B2009-01-11 21:43:10
25c3-3021-de-security_nightmares_2009.mp4.md576 B2009-01-11 21:43:10
25c3-3024-de-jahresrueckblick.mp4.md568 B2009-01-11 21:43:10
25c3-3020-en-banking_malware_101.mp4.md571 B2009-01-11 21:43:10
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4.md587 B2009-01-11 21:43:10
25c3-2639-en-attacking_nfc_mobile_phones.mp4629.8 MiB2009-01-11 21:44:37
25c3-2669-en-collapsing_the_european_security_architecture.mp4448.5 MiB2009-01-11 21:45:22
25c3-2681-en-repurposing_the_ti_ez430u.mp4257.9 MiB2009-01-11 21:45:45
25c3-2734-en-short_attention_span_security.mp4410.9 MiB2009-01-11 21:46:23
25c3-2777-en-crafting_and_hacking_separated_at_birth.mp4277.0 MiB2009-01-11 21:46:50
25c3-2781-en-objects_as_software_the_coming_revolution.mp4398.8 MiB2009-01-11 21:47:24
25c3-2892-en-about_cyborgs_and_gargoyles_.mp4342.8 MiB2009-01-11 21:48:02
25c3-2893-en-attacking_rich_internet_applications.mp4472.4 MiB2009-01-11 21:48:45
25c3-2895-de-der_elektronische_personalausweis.mp4466.7 MiB2009-01-11 21:49:31
25c3-2906-en-why_were_we_so_vulnerable_to_the_dns_vulnerability.mp4556.9 MiB2009-01-11 21:50:49
25c3-2916-en-wikileaks.mp4449.2 MiB2009-01-11 21:51:48
25c3-2952-de-pflanzenhacken.mp4417.5 MiB2009-01-11 21:52:29
25c3-2958-de-hacker_jeopardy.mp4790.5 MiB2009-01-11 21:53:43
25c3-2973-en-lightning_talks_day4.mp4468.7 MiB2009-01-11 21:54:27
25c3-2999-en-closing_ceremony.mp4384.3 MiB2009-01-11 21:55:01
25c3-3000-en-stormfucker_owning_the_storm_botnet.mp4618.7 MiB2009-01-11 21:55:55
25c3-3002-en-squeezing_attack_traces.mp4291.2 MiB2009-01-11 21:56:24
25c3-3016-en-life_is_a_holodeck.mp4516.1 MiB2009-01-11 21:57:24
25c3-3020-en-banking_malware_101.mp4485.1 MiB2009-01-11 21:58:24
25c3-3021-de-security_nightmares_2009.mp4722.0 MiB2009-01-11 21:59:41
25c3-3024-de-jahresrueckblick.mp4956.5 MiB2009-01-11 22:01:02
25c3-3030-en-messing_around_with_garage_doors.mp4586.6 MiB2009-01-11 22:01:57
25c3-3048-en-lightning_talks_day2.mp4.md572 B2009-01-12 01:40:27
25c3-3056-en-fnord_news_show_english_interpretation.mp4.md590 B2009-01-12 01:40:27
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4.md596 B2009-01-12 01:40:27
25c3-3058-en-security_nightmares_2009_english_interpretation.mp4.md599 B2009-01-12 01:40:27
25c3-3048-en-lightning_talks_day2.mp4392.8 MiB2009-01-12 01:41:13
25c3-3050-de-kurt_goedel_-_i_do_not_fit_into_this_century.mp4365.6 MiB2009-01-12 01:41:40
25c3-3056-en-fnord_news_show_english_interpretation.mp4385.5 MiB2009-01-12 01:42:08
25c3-3058-en-security_nightmares_2009_english_interpretation.mp4708.7 MiB2009-01-12 01:43:02
25c3-3007-en-running_your_own_gsm_network.mp4.md580 B2009-01-13 16:59:27
25c3-2975-de-zehn_big_brother_awards_in_at.mp4.md581 B2009-01-13 16:59:27
25c3-3057-en-hacker_jeopardy_english_interpretation.mp4.md590 B2009-01-13 16:59:27
25c3-2863-en-climate_change_-_state_of_the_science.mp4.md589 B2009-01-13 16:59:27
25c3-2863-en-climate_change_-_state_of_the_science.mp4495.4 MiB2009-01-13 17:00:01
25c3-2975-de-zehn_big_brother_awards_in_at.mp4441.3 MiB2009-01-13 17:00:35
25c3-3007-en-running_your_own_gsm_network.mp4343.4 MiB2009-01-13 17:01:04
25c3-3057-en-hacker_jeopardy_english_interpretation.mp4787.3 MiB2009-01-13 17:02:03
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4.md599 B2009-01-22 23:28:53
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4.md598 B2009-01-22 23:28:53
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4.md587 B2009-01-22 23:28:53
25c3-2845-en-rf_fingerprinting_of_rfid.mp4.md577 B2009-01-22 23:28:53
25c3-2940-en-flying_for_free.mp4.md567 B2009-01-22 23:28:53
25c3-2904-en-solar-powering_your_geek_gear.mp4.md581 B2009-01-22 23:28:53
25c3-2807-de-erich_muehsams_tagebuecher_in_der_festungshaft.mp4397.0 MiB2009-01-22 23:29:06
25c3-2845-en-rf_fingerprinting_of_rfid.mp4341.1 MiB2009-01-22 23:29:17
25c3-2904-en-solar-powering_your_geek_gear.mp4222.7 MiB2009-01-22 23:29:24
25c3-2940-en-flying_for_free.mp4463.0 MiB2009-01-22 23:29:39
25c3-2953-en-security_failures_in_smart_card_payment_systems.mp4450.1 MiB2009-01-22 23:29:54
25c3-3025-en-opening_and_keynote_nothing_to_hide.mp4598.8 MiB2009-01-22 23:30:13
25c3-2963-de-handschellen_hacken.mp4.md571 B2009-01-26 11:39:54
25c3-2963-de-handschellen_hacken.mp4470.6 MiB2009-01-26 11:40:10