Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2011/mp4-h264-HQ/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
28c3-4777-en-r0ket_h264.mp4.sha170 B2011-12-28 14:04:33
28c3-4869-de-tresor_h264.mp4.sha171 B2011-12-29 17:04:34
28c3-4897-en-keynote_h264.mp4.sha172 B2011-12-28 11:12:55
28c3-4669-en-bionic_ears_h264.mp4.sha176 B2011-12-28 20:14:38
28c3-4738-de-echtes_netz_h264.mp4.sha176 B2011-12-28 22:26:43
28c3-4916-en-buggedplanet_h264.mp4.sha177 B2011-12-28 14:46:20
28c3-4828-de-antiforensik_h264.mp4.sha177 B2011-12-30 14:01:30
28c3-4871-en-hacking_mfps_h264.mp4.sha177 B2011-12-28 20:12:18
28c3-4928-en-kinectfusion_h264.mp4.sha177 B2011-12-29 19:29:20
28c3-4899-en-closing_event_h264.mp4.sha178 B2011-12-30 18:48:15
28c3-4798-en-sovereign_keys_h264.mp4.sha179 B2011-12-30 10:57:13
28c3-4740-de-frag_den_staat_h264.mp4.sha179 B2011-12-29 16:42:40
28c3-4804-de-politik_hacken_h264.mp4.sha179 B2011-12-28 21:20:21
28c3-4813-en-macro_dragnets_h264.mp4.sha179 B2011-12-28 21:12:47
28c3-4700-en-what_is_whiteit_h264.mp4.sha180 B2011-12-28 13:55:31
28c3-4775-de-hacker_jeopardy_h264.mp4.sha180 B2011-12-29 02:40:58
28c3-4668-en-electronic_money_h264.mp4.sha181 B2011-12-30 03:32:50
28c3-4932-de-camp_review_2011_h264.mp4.sha181 B2011-12-28 19:28:30
28c3-4760-en-chokepointproject_h264.mp4.sha182 B2011-12-30 15:41:06
28c3-4832-de-neue_leichtigkeit_h264.mp4.sha182 B2011-12-30 15:48:35
28c3-4713-en-what_is_in_a_name_h264.mp4.sha182 B2011-12-28 21:10:43
28c3-4770-en-dont_scan_just_ask_h264.mp4.sha183 B2011-12-28 20:10:31
28c3-4648-en-quantum_of_science_h264.mp4.sha183 B2011-12-30 18:18:43
28c3-4640-en-time_is_on_my_side_h264.mp4.sha183 B2011-12-28 20:58:38
28c3-4937-en-security_nightmares_h264.mp4.sha184 B2012-01-02 00:11:07
28c3-4587-en-bup_git_for_backups_h264.mp4.sha184 B2011-12-30 16:00:58
28c3-4746-en-bitcoin_an_analysis_h264.mp4.sha184 B2011-12-29 16:34:39
28c3-4712-en-mining_your_geotags_h264.mp4.sha184 B2011-12-28 20:08:33
28c3-4898-de-security_nightmares_h264.mp4.sha184 B2012-01-01 23:07:05
28c3-4799-de-can_trains_be_hacked_h264.mp4.sha185 B2011-12-28 14:02:31
28c3-4780-en-print_me_if_you_dare_h264.mp4.sha185 B2011-12-30 03:42:53
28c3-4688-en-introducing_osmo_gmr_h264.mp4.sha185 B2011-12-30 10:32:44
28c3-4927-en-noc_review_28c3_camp_h264.mp4.sha185 B2011-12-30 15:42:15
28c3-4723-en-dc_plus_the_protocol_h264.mp4.sha185 B2011-12-30 17:22:09
28c3-4656-en-ooops_i_hacked_my_pbx_h264.mp4.sha186 B2011-12-29 17:42:36
28c3-4907-en-lightning_talks_day_4_h264.mp4.sha186 B2011-12-30 17:31:57
28c3-4905-en-lightning_talks_day_2_h264.mp4.sha186 B2011-12-29 00:34:21
28c3-4908-de-jahresrueckblick_2011_h264.mp4.sha186 B2011-12-29 16:15:55
28c3-4675-de-politik_neusprech_2011_h264.mp4.sha187 B2011-12-28 23:08:56
28c3-4732-en-datamining_for_hackers_h264.mp4.sha187 B2011-12-28 14:00:28
28c3-4936-en-fnord_jahresrueckblick_h264.mp4.sha187 B2012-01-02 15:03:02
28c3-4749-en-does_hacktivism_matter_h264.mp4.sha187 B2011-12-28 14:44:28
28c3-4748-en-the_best_of_the_oxcars_h264.mp4.sha187 B2011-12-30 03:37:28
28c3-4866-de-fnord_jahresrueckblick_h264.mp4.sha187 B2011-12-30 00:24:47
28c3-4736-en-defending_mobile_phones_h264.mp4.sha188 B2011-12-28 14:14:18
28c3-4722-de-dick_size_war_for_nerds_h264.mp4.sha188 B2011-12-29 01:51:34
28c3-4913-de-almighty_dna_and_beyond_h264.mp4.sha188 B2011-12-28 14:42:31
28c3-4876-de-die_spinnen_die_sachsen_h264.mp4.sha188 B2011-12-28 13:50:19
28c3-4930-en-black_ops_of_tcpip_2011_h264.mp4.sha188 B2011-12-28 21:16:32
28c3-4788-de-datenvieh_oder_daten_fee_h264.mp4.sha189 B2011-12-30 03:41:22
28c3-4710-en-the_future_of_cryptology_h264.mp4.sha189 B2011-12-30 13:41:41
28c3-4721-en-pentanews_game_show_2k11_h264.mp4.sha189 B2011-12-28 19:29:16
28c3-4754-en-smart_hacking_for_privacy_h264.mp4.sha190 B2011-12-30 18:21:30
28c3-4766-en-802_11_packets_in_packets_h264.mp4.sha190 B2011-12-28 14:12:22
28c3-4763-en-the_science_of_insecurity_h264.mp4.sha190 B2011-12-28 21:26:44
28c3-4910-de-demokratie_auf_saechsisch_h264.mp4.sha190 B2011-12-29 00:44:36
28c3-4768-en-eating_in_the_anthropocene_h264.mp4.sha191 B2011-12-28 21:18:57
28c3-4817-en-string_oriented_programming_h264.mp4.sha192 B2011-12-28 21:14:48
28c3-4934-en-hacker_jeopardy_translation_h264.mp4.sha192 B2011-12-29 16:00:03
28c3-4826-en-a_brief_history_of_plutocracy_h264.mp4.sha194 B2011-12-28 19:35:04
28c3-4652-en-data_mining_the_israeli_census_h264.mp4.sha195 B2011-12-28 21:22:22
28c3-4781-en-deceiving_authorship_detection_h264.mp4.sha195 B2011-12-29 22:32:28
28c3-4759-en-open_source_music_tracking_2_0_h264.mp4.sha195 B2011-12-30 03:22:37
28c3-4755-en-counterlobbying_eu_institutions_h264.mp4.sha196 B2011-12-28 21:08:56
28c3-4847-en-reverse_engineering_usb_devices_h264.mp4.sha196 B2011-12-28 19:29:12
28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264.mp4.sha196 B2011-12-30 10:39:21
28c3-4676-en-apple_vs_google_client_platforms_h264.mp4.sha197 B2011-12-29 00:09:12
28c3-4811-en-rootkits_in_your_web_application_h264.mp4.sha197 B2011-12-28 23:02:40
28c3-4935-en-eu_datenschutz_internet_der_dinge_h264.mp4.sha198 B2012-01-02 00:00:37
28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264.mp4.sha198 B2011-12-29 16:25:56
28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4.sha198 B2011-12-28 19:24:27
28c3-4821-en-not_your_grandfathers_moon_landing_h264.mp4.sha199 B2011-12-29 16:23:27
28c3-4581-en-taking_control_over_the_tor_network_h264.mp4.sha1100 B2011-12-29 16:21:36
28c3-4848-en-the_coming_war_on_general_computation_h264.mp4.sha1102 B2011-12-28 14:48:27
28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4.sha1102 B2011-12-30 03:26:39
28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4.sha1103 B2011-12-30 10:34:37
28c3-4660-en-post_memory_corruption_memory_analysis_h264.mp4.sha1103 B2011-12-29 00:41:16
28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.mp4.sha1104 B2011-12-28 22:29:01
28c3-4818-en-evolving_custom_communication_protocols_h264.mp4.sha1104 B2011-12-30 19:03:58
28c3-4706-en-power_gadgets_with_your_own_electricity_h264.mp4.sha1104 B2011-12-28 21:24:59
28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4.sha1104 B2011-12-28 21:04:40
28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4.sha1105 B2011-12-28 14:10:32
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.mp4.sha1105 B2011-12-28 14:07:17
28c3-4856-en-the_engineering_part_of_social_engineering_h264.mp4.sha1107 B2011-12-30 15:41:53
28c3-4802-en-towards_a_single_secure_european_cyberspace_h264.mp4.sha1108 B2011-12-30 10:37:29
28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.mp4.sha1110 B2011-12-29 01:09:03
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.mp4.sha1111 B2011-12-29 01:14:30
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.mp4.sha1111 B2011-12-30 13:52:10
28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.mp4.sha1113 B2011-12-30 16:07:25
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.mp4.sha1116 B2011-12-30 03:38:38
28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4.sha1117 B2011-12-29 16:32:37
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264.mp4.sha1118 B2011-12-29 01:48:23
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.mp4.sha1119 B2011-12-28 21:06:20
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.mp4.sha1119 B2011-12-28 19:33:41
28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.mp4.sha1120 B2011-12-29 00:11:49
28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.mp4.sha1120 B2011-12-28 19:31:50
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.mp4.sha1120 B2011-12-30 19:08:44
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264.mp4.sha1121 B2011-12-28 14:09:02
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.mp4.sha1121 B2011-12-29 01:52:43
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4.sha1125 B2011-12-30 13:55:35
28c3.mp4.hq.all.sha19.1 KiB2012-01-02 23:51:14
28c3-4899-en-closing_event_h264.mp478.8 MiB2011-12-30 18:48:11
28c3-4910-de-demokratie_auf_saechsisch_h264.mp479.3 MiB2011-12-29 00:44:19
28c3-4652-en-data_mining_the_israeli_census_h264.mp4146.1 MiB2011-12-28 21:22:13
28c3-4847-en-reverse_engineering_usb_devices_h264.mp4170.9 MiB2011-12-28 19:28:20
28c3-4770-en-dont_scan_just_ask_h264.mp4189.8 MiB2011-12-28 20:10:17
28c3-4587-en-bup_git_for_backups_h264.mp4198.1 MiB2011-12-30 16:00:43
28c3-4828-de-antiforensik_h264.mp4218.6 MiB2011-12-30 14:01:14
28c3-4656-en-ooops_i_hacked_my_pbx_h264.mp4220.1 MiB2011-12-29 17:42:27
28c3-4767-en-security_log_visualization_with_a_correlation_engine_h264.mp4229.8 MiB2011-12-29 16:32:23
28c3-4712-en-mining_your_geotags_h264.mp4234.9 MiB2011-12-28 20:08:20
28c3-4817-en-string_oriented_programming_h264.mp4257.6 MiB2011-12-28 21:14:26
28c3-4723-en-dc_plus_the_protocol_h264.mp4262.7 MiB2011-12-30 17:21:25
28c3-4869-de-tresor_h264.mp4268.4 MiB2011-12-29 17:04:21
28c3-4676-en-apple_vs_google_client_platforms_h264.mp4272.9 MiB2011-12-29 00:08:30
28c3-4760-en-chokepointproject_h264.mp4273.2 MiB2011-12-30 15:39:51
28c3-4761-en-new_ways_im_going_to_hack_your_web_app_h264.mp4282.9 MiB2011-12-30 10:34:20
28c3-4813-en-macro_dragnets_h264.mp4283.6 MiB2011-12-28 21:12:22
28c3-4730-en-crowdsourcing_genome_wide_association_studies_h264.mp4283.8 MiB2011-12-29 01:08:38
28c3-4927-en-noc_review_28c3_camp_h264.mp4288.9 MiB2011-12-30 15:41:07
28c3-4758-de-ein_mittelsmannangriff_auf_ein_digitales_signiergeraet_h264.mp4291.9 MiB2011-12-28 21:06:12
28c3-4871-en-hacking_mfps_h264.mp4293.7 MiB2011-12-28 20:12:12
28c3-4740-de-frag_den_staat_h264.mp4295.5 MiB2011-12-29 16:42:27
28c3-4763-en-the_science_of_insecurity_h264.mp4307.9 MiB2011-12-28 21:26:21
28c3-4746-en-bitcoin_an_analysis_h264.mp4308.4 MiB2011-12-29 16:34:25
28c3-4686-en-implementation_of_mitm_attack_on_hdcp_secured_links_h264.mp4313.7 MiB2011-12-30 03:38:21
28c3-4826-en-a_brief_history_of_plutocracy_h264.mp4313.8 MiB2011-12-28 19:34:34
28c3-4738-de-echtes_netz_h264.mp4313.8 MiB2011-12-28 22:26:29
28c3-4759-en-open_source_music_tracking_2_0_h264.mp4315.5 MiB2011-12-30 03:22:22
28c3-4916-en-buggedplanet_h264.mp4321.0 MiB2011-12-28 14:46:12
28c3-4818-en-evolving_custom_communication_protocols_h264.mp4324.8 MiB2011-12-30 19:03:26
28c3-4663-en-cellular_protocol_stacks_for_internet_h264.mp4326.1 MiB2011-12-30 03:26:25
28c3-4903-en-changing_techno_optimists_by_shaking_up_the_bureaucrats_h264.mp4335.2 MiB2011-12-30 19:08:24
28c3-4680-en-effective_dos_attacks_against_web_application_platforms_h264.mp4341.8 MiB2011-12-28 19:30:27
28c3-4710-en-the_future_of_cryptology_h264.mp4341.8 MiB2011-12-30 13:41:02
28c3-4804-de-politik_hacken_h264.mp4344.3 MiB2011-12-28 21:20:13
28c3-4688-en-introducing_osmo_gmr_h264.mp4345.8 MiB2011-12-30 10:32:29
28c3-4876-de-die_spinnen_die_sachsen_h264.mp4350.3 MiB2011-12-28 13:50:11
28c3-4897-en-keynote_h264.mp4351.4 MiB2011-12-28 11:12:48
28c3-4736-en-defending_mobile_phones_h264.mp4354.1 MiB2011-12-28 14:14:11
28c3-4711-en-the_atari_2600_video_computer_system_the_ultimate_talk_h264.mp4356.4 MiB2011-12-28 19:32:39
28c3-4814-en-behind_the_scenes_of_a_c64_demo_h264.mp4367.9 MiB2011-12-30 10:39:01
28c3-4798-en-sovereign_keys_h264.mp4389.6 MiB2011-12-30 10:56:47
28c3-4707-en-your_disaster_crisis_revolution_just_got_pwned_h264.mp4397.9 MiB2011-12-30 13:51:29
28c3-4781-en-deceiving_authorship_detection_h264.mp4399.8 MiB2011-12-29 22:32:19
28c3-4816-en-7_years_400_podcasts_and_lots_of_frequent_flyer_miles_h264.mp4399.9 MiB2011-12-29 01:46:47
28c3-4848-en-the_coming_war_on_general_computation_h264.mp4406.0 MiB2011-12-28 14:48:17
28c3-4742-en-from_press_freedom_to_the_freedom_of_information_h264.mp4410.3 MiB2011-12-30 16:06:34
28c3-4699-en-building_a_distributed_satellite_ground_station_network_h264.mp4411.8 MiB2011-12-29 00:10:37
28c3-4735-en-reverse_engineering_a_qualcomm_baseband_h264.mp4415.5 MiB2011-12-28 22:28:43
28c3-4755-en-counterlobbying_eu_institutions_h264.mp4417.8 MiB2011-12-28 21:08:33
28c3-4766-en-802_11_packets_in_packets_h264.mp4424.2 MiB2011-12-28 14:12:13
28c3-4669-en-bionic_ears_h264.mp4436.6 MiB2011-12-28 20:14:19
28c3-4648-en-quantum_of_science_h264.mp4444.0 MiB2011-12-30 18:17:25
28c3-4732-en-datamining_for_hackers_h264.mp4445.6 MiB2011-12-28 14:00:16
28c3-4668-en-electronic_money_h264.mp4447.1 MiB2011-12-30 03:32:31
28c3-4675-de-politik_neusprech_2011_h264.mp4449.0 MiB2011-12-28 23:08:37
28c3-4866-de-fnord_jahresrueckblick_h264.mp4452.1 MiB2011-12-30 00:24:27
28c3-4661-en-scade_and_plc_vulnerabilities_in_correctional_facilities_h264.mp4461.5 MiB2011-12-28 14:08:32
28c3-4936-en-fnord_jahresrueckblick_h264.mp4472.0 MiB2012-01-02 15:01:44
28c3-4753-en-the_movement_against_state_controlled_internet_in_turkey_h264.mp4475.6 MiB2011-12-29 01:50:50
28c3-4749-en-does_hacktivism_matter_h264.mp4476.5 MiB2011-12-28 14:44:17
28c3-4821-en-not_your_grandfathers_moon_landing_h264.mp4481.8 MiB2011-12-29 16:22:53
28c3-4780-en-print_me_if_you_dare_h264.mp4488.7 MiB2011-12-30 03:42:30
28c3-4706-en-power_gadgets_with_your_own_electricity_h264.mp4488.9 MiB2011-12-28 21:24:30
28c3-4640-en-time_is_on_my_side_h264.mp4498.3 MiB2011-12-28 20:58:24
28c3-4856-en-the_engineering_part_of_social_engineering_h264.mp4509.5 MiB2011-12-30 15:39:51
28c3-4764-en-automatic_algorithm_invention_with_a_gpu_h264.mp4522.4 MiB2011-12-28 14:10:18
28c3-4581-en-taking_control_over_the_tor_network_h264.mp4524.8 MiB2011-12-29 16:20:56
28c3-4802-en-towards_a_single_secure_european_cyberspace_h264.mp4526.0 MiB2011-12-30 10:36:56
28c3-4713-en-what_is_in_a_name_h264.mp4529.2 MiB2011-12-28 21:10:25
28c3-4799-de-can_trains_be_hacked_h264.mp4530.5 MiB2011-12-28 14:02:19
28c3-4930-en-black_ops_of_tcpip_2011_h264.mp4531.2 MiB2011-12-28 21:16:19
28c3-4741-en-neo_feudalism_or_why_julian_assange_might_be_wrong_after_all_h264.mp4532.2 MiB2011-12-30 13:55:18
28c3-4660-en-post_memory_corruption_memory_analysis_h264.mp4540.6 MiB2011-12-29 00:39:11
28c3-4754-en-smart_hacking_for_privacy_h264.mp4549.1 MiB2011-12-30 18:20:17
28c3-4768-en-eating_in_the_anthropocene_h264.mp4551.7 MiB2011-12-28 21:18:35
28c3-4700-en-what_is_whiteit_h264.mp4556.1 MiB2011-12-28 13:55:19
28c3-4811-en-rootkits_in_your_web_application_h264.mp4571.2 MiB2011-12-28 23:02:25
28c3-4913-de-almighty_dna_and_beyond_h264.mp4584.8 MiB2011-12-28 14:42:18
28c3-4777-en-r0ket_h264.mp4586.5 MiB2011-12-28 14:04:20
28c3-4756-en-quantified_self_and_neurofeedback_mind_hacking_h264.mp4595.4 MiB2011-12-29 01:12:54
28c3-4748-en-the_best_of_the_oxcars_h264.mp4598.3 MiB2011-12-30 03:36:51
28c3-4898-de-security_nightmares_h264.mp4600.4 MiB2012-01-01 23:04:34
28c3-4800-en-how_governments_have_tried_to_block_tor_h264.mp4601.6 MiB2011-12-28 21:04:25
28c3-4788-de-datenvieh_oder_daten_fee_h264.mp4602.4 MiB2011-12-30 03:40:48
28c3-4937-en-security_nightmares_h264.mp4618.0 MiB2012-01-02 00:08:32
28c3-4722-de-dick_size_war_for_nerds_h264.mp4618.2 MiB2011-12-29 01:49:07
28c3-4721-en-pentanews_game_show_2k11_h264.mp4631.7 MiB2011-12-28 19:26:47
28c3-4928-en-kinectfusion_h264.mp4633.3 MiB2011-12-29 19:28:56
28c3-4908-de-jahresrueckblick_2011_h264.mp4710.0 MiB2011-12-29 16:15:09
28c3-4901-de-der_staatstrojaner_aus_sicht_der_technik_h264.mp4776.7 MiB2011-12-28 14:06:27
28c3-4935-en-eu_datenschutz_internet_der_dinge_h264.mp4801.0 MiB2012-01-01 23:57:41
28c3-4844-de-eu_datenschutz_internet_der_dinge_h264.mp4803.1 MiB2011-12-28 19:22:59
28c3-4906-en-lightning_talks_day_3_pecha_kucha_h264.mp4875.9 MiB2011-12-29 16:25:10
28c3-4775-de-hacker_jeopardy_h264.mp4915.8 MiB2011-12-29 02:37:21
28c3-4934-en-hacker_jeopardy_translation_h264.mp4949.8 MiB2011-12-29 15:59:19
28c3-4932-de-camp_review_2011_h264.mp4965.8 MiB2011-12-28 19:25:16
28c3-4905-en-lightning_talks_day_2_h264.mp4989.2 MiB2011-12-29 00:29:55
28c3-4907-en-lightning_talks_day_4_h264.mp41004.9 MiB2011-12-30 17:29:10
28c3-4832-de-neue_leichtigkeit_h264.mp41.6 GiB2011-12-30 15:43:55