Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /cdn.media.ccc.de/congress/2004/papers/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
317 Unsicherheit von Personal Firewalls.pdf289.2 KiB2005-06-27 18:35:27
316 Bericht von den BigBrotherAwards.pdf293.2 KiB2005-06-27 18:46:23
315 Fight for your Right to Fileshare.pdf637.2 KiB2005-06-27 18:48:41
313 Biometrie als datenschutzrechtliches Problem.pdf104.9 KiB2005-06-27 19:01:27
310 Information-Wissen-Macht.pdf3.7 MiB2005-10-22 16:44:19
308 MD5 To Be Considered Harmful Someday.pdf153.7 KiB2005-06-27 18:58:31
306 Ruby.pdf365.8 KiB2005-06-27 18:44:09
289 Mixing VJing and Post-Production.pdf85.7 KiB2005-06-27 18:49:18
278 TKUeV-Das Ohr am Draht.pdf201.7 KiB2005-06-27 18:58:35
277 Das Programmiersystem Forth.pdf759.1 KiB2005-06-27 18:40:23
274 Praktische Anleitung zum Bau eines Radiosenders.pdf143.3 KiB2005-06-27 18:51:17
273 Crashkurs Mathematik am Beispiel Biometrie.pdf566.3 KiB2005-06-27 18:59:38
272 Sicherheitsmanagement.pdf476.0 KiB2005-06-27 18:51:07
271 Hidden Data in Internet Published Documents.pdf3.2 MiB2005-06-27 18:35:23
255 Pixels want to talk.pdf1.2 MiB2005-06-27 18:47:04
253 Pixels want to be many.pdf49.0 KiB2005-06-27 18:57:53
250 Lightning Talk-NetBSD Status Report.pdf651.4 KiB2005-06-27 18:57:10
246 RFID Technologie und Implikationen.pdf866.4 KiB2005-06-27 18:44:47
244 High Speed Computing with FPGAs.pdf141.3 KiB2005-06-27 18:51:13
242 Weird Programming 1.pdf1.1 MiB2005-06-27 18:35:38
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf3.1 MiB2005-06-27 18:43:28
218 Practical MacOS X Insecurities.pdf166.8 KiB2005-06-27 18:59:14
216 Hacking The Genome.pdf1.7 MiB2005-06-27 18:41:02
214 Kryptographie in Theorie und Praxis.pdf913.5 KiB2005-10-22 16:58:01
213 Haskell.pdf681.1 KiB2005-06-27 18:36:23
208 GameCube Hacking.pdf1.7 MiB2005-10-22 14:42:16
207 Amateurfunk.pdf1.7 MiB2005-06-27 19:01:26
187 Einfuehrung in die Rastersondenmikroskopie.pdf1.0 MiB2005-06-27 18:54:43
183 Tor.pdf3.3 MiB2005-06-27 18:49:56
178 Humanoid Robots.pdf2.5 MiB2005-06-27 18:44:38
176 Passive covert channels in the Linux kernel.pdf1.5 MiB2005-06-27 18:47:48
168 Spampolitik.pdf1.7 MiB2005-06-27 18:59:13
165 Softwarepatente - Der Tag danach.pdf905.1 KiB2005-06-27 18:47:35
163 SPAM Workshop.pdf43.9 KiB2005-06-27 18:57:59
159 State of Emergent Democracy.pdf486.0 KiB2005-06-27 18:50:23
158 How to find anything on the web.pdf2.1 MiB2005-06-27 19:00:01
153 Suchmaschinenpolitik.pdf3.3 MiB2005-06-27 18:34:41
151 Side Channel Analysis of Smart Cards.pdf1.5 MiB2005-10-22 19:20:32
146 Mehr Sicherheit fuer HostAP-WLANs.pdf656.1 KiB2005-06-27 18:44:04
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf2.7 MiB2005-06-27 18:58:28
136 Hacking Linux-Powered Devices.pdf2.6 MiB2005-06-27 18:45:26
135 Voting Machine Technology.pdf82.9 KiB2005-06-27 18:57:30
134 Secure Instant Messaging.pdf120.7 KiB2005-06-27 18:58:53
131 Learning OpenPGP by Example.pdf287.7 KiB2005-06-27 18:47:08
130 Physical Security.pdf1.6 MiB2005-06-27 18:51:32
129 Die Propagandawueste des realen Krieges.pdf94.1 KiB2005-06-27 18:43:30
127 Security Frameworks.pdf102.6 KiB2005-06-27 18:57:26
126 Apache Security.pdf1.8 MiB2005-06-27 18:57:53
125 Old Skewl Hacking Infra Red.pdf4.9 MiB2005-06-27 19:00:48
123 Gentoo Hardened.pdf197.1 KiB2005-06-27 18:49:27
122 Enforcement of Intellectual Property Rights under German Private Law.pdf78.1 KiB2005-10-22 14:11:18
121 Black Ops of DNS.pdf3.7 MiB2005-06-27 18:55:27
120 Softwarepatente - Ruestzeug zur Debatte.pdf149.2 KiB2005-06-27 18:46:27
118 Verified Fiasco.pdf1.6 MiB2005-06-27 18:40:06
117 Kampagne Fair Sharing.pdf146.6 KiB2005-06-27 18:51:11
115 The Fiasco Kernel.pdf742.0 KiB2005-06-27 18:37:08
114 Der 2. Korb der Urheberrechtsnovelle.pdf380.2 KiB2005-06-27 18:42:04
113 Automated Hacking via Google.pdf78.4 KiB2005-06-27 18:42:00
111 The Kernel Accelerator Device.pdf223.6 KiB2005-06-27 18:57:37
110 Applied Data Mining.pdf218.6 KiB2005-06-27 18:41:48
109 Anti-Honeypot Techniques.pdf1.3 MiB2005-06-27 18:54:04
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf1.9 MiB2005-06-27 18:36:02
107 Embedded Devices as an attack vector.pdf297.9 KiB2005-06-27 19:00:04
105 Honeypot Forensics.pdf668.5 KiB2005-10-22 16:20:41
101 XMPP - Jabber.pdf92.2 KiB2005-06-27 18:35:39
100 Anonymous communications.pdf83.5 KiB2005-06-27 18:49:17
099 GPL fuer Anfaenger.pdf268.7 KiB2005-06-27 18:36:34
098 Portable Software-Installation with pkg source.pdf261.5 KiB2005-06-27 18:40:46
097 Das Literarische Code-Quartett.pdf911.8 KiB2005-06-27 18:45:34
095 Security Nightmares 2005.pdf87.9 KiB2005-06-27 19:01:27
083 Quanteninformationstheorie fuer Nicht Physiker.pdf1.3 MiB2005-06-27 19:01:09
081 Quantenmechanik fuer Nicht Physiker.pdf1.5 MiB2005-06-27 18:56:29
080 USB-Unbekannter Serieller Bus.pdf972.6 KiB2005-06-27 18:54:32
079 AVG aint vector graphics.pdf3.0 MiB2005-06-27 18:50:53
078 Aspects of Elliptic Curve Cryptography.pdf415.6 KiB2005-06-27 18:36:30
077 Weird Programming 2.pdf2.2 MiB2005-06-27 18:46:19
072 The Reality of Network Address Translators.pdf63.9 KiB2005-06-27 19:00:05
070 Fnord-Jahresrueckblick.pdf3.4 MiB2005-06-27 18:57:04
068 NOC Overview.pdf1.2 MiB2005-06-27 18:34:52
067 Inside PDF.pdf115.4 KiB2005-06-27 18:35:43
066 Bluetooth Hacking.pdf353.6 KiB2005-06-27 18:49:20
065 Grundlagen des Compilerdesign.pdf1.2 MiB2005-06-27 18:41:59
064 Trusted Computing.pdf1.0 MiB2005-06-27 18:47:18
063 Edit This Page.pdf1.3 MiB2005-10-22 01:41:00
062 Hacking EU funding for a FOSS project.pdf756.2 KiB2005-06-27 18:36:09
060 Digital Prosthetics.pdf341.1 KiB2005-06-27 18:40:26
059 Wikipedia Sociographics.pdf3.0 MiB2005-06-27 18:38:37
058 The Blinking Suspects.pdf1.1 MiB2005-06-27 18:38:48
057 SUN Bloody Daft Solaris Mechanisms.pdf115.9 KiB2005-06-27 18:50:26
056 LiberTOS.pdf196.8 KiB2005-06-27 18:36:38
055 CCC-Jahresrueckblick.pdf98.7 KiB2005-06-27 18:44:56
053 Enforcing the GNU GPL.pdf77.1 KiB2005-06-27 18:35:44
052 Die Ueblichen Verdaechtigen.pdf47.0 KiB2005-06-27 18:34:01
051 Recent features to OpenBSD-ntpd and bgpd.pdf898.0 KiB2005-06-27 18:50:06
049 Zufallszahlengeneratoren.pdf485.4 KiB2005-06-27 18:37:01
047 Datamining the NSA.pdf28.4 KiB2005-06-27 18:49:25
046 Tollcollect.pdf1.1 MiB2005-06-27 18:57:21
045 Internet Censorship in China.pdf574.6 KiB2005-06-27 18:52:11
044 Machine Learning in Science and Engineering.pdf4.3 MiB2005-06-27 18:39:42
042 Cored Programming.pdf196.2 KiB2005-06-27 18:44:50
041 Einfuehrung in Kryptographische Methoden.pdf97.6 KiB2005-06-27 18:35:40
040 Firewall Piercing.pdf1.9 MiB2005-06-27 18:59:32
039 Squeak and Croquet.pdf989.6 KiB2005-06-27 18:53:19
038 Free Software Usage in South America.pdf568.8 KiB2005-06-27 18:45:02
037 GNOME Anwendungsentwicklung.pdf817.2 KiB2005-06-27 18:52:27
029 Robocup.pdf3.2 MiB2005-06-27 18:43:59
027 Biometrie in Ausweisdokumenten.pdf335.4 KiB2005-06-27 18:36:26
026 SAP R3 Protocol Reverse Engineering.pdf658.9 KiB2005-06-27 18:36:15
023 Ciphire Mail.pdf984.5 KiB2005-06-27 18:50:19
019 Verdeckte Netzwerkanalyse.pdf712.0 KiB2005-06-27 19:00:57
017 Next Generation Peer to Peer Systems.pdf1012.3 KiB2005-06-27 18:58:50
016 Phishing the Web.pdf762.6 KiB2005-06-27 18:44:16
015 Sicherheit bei VoIP-Systemen.pdf87.6 KiB2005-06-27 18:57:32
014 Feuriges Hacken.pdf496.7 KiB2005-06-27 18:50:57
013 The Art of Fingerprinting.pdf1.1 MiB2005-06-27 19:01:39
012 Natural Language Steganography.pdf2.6 MiB2005-06-27 18:49:06
011 xDash.pdf165.0 KiB2005-06-27 18:58:01