Welcome to mirrors.dotsrc.org

All our mirrors of open source software are available via http, https, ftp and an onion service. More information about our mirrors including statistics and contact information is available on our mirror info pages.

For information about dotsrc.org and our other services please go to our website.

Index of /pub/mirrors/cdn.media.ccc.de/congress/2006/video/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
23C3-pressekonferenz.m4v139.7 MiB2020-05-24 12:29:24
23C3-1760-en-on_free.m4v303.9 MiB2007-01-18 17:28:06
23C3-1760-en-on_free.iso3.7 GiB2007-02-09 11:23:40
23C3-1759-de-schlossoeffnung_staatssicherheit.m4v439.5 MiB2007-01-18 17:26:45
23C3-1758-en-fuzzing_corporate_world.m4v247.8 MiB2007-01-07 11:58:55
23C3-1740-en-in_the_absence_of_trust.m4v135.6 MiB2007-01-07 11:57:52
23C3-1738-en-mmorpgs.m4v254.5 MiB2007-01-07 11:57:16
23C3-1736-en-project_sputnik.m4v552.2 MiB2007-03-10 01:01:11
23C3-1735-en-faster_pwning_assured.m4v110.7 MiB2007-01-07 11:56:13
23C3-1733-en-bluetooth_hacking_revisited.m4v234.5 MiB2007-01-07 11:55:48
23C3-1728-en-23c3_network_review.m4v180.5 MiB2007-02-07 08:47:29
23C3-1727-en-closing_ceremony.m4v127.7 MiB2007-02-07 08:46:47
23C3-1724-en-transparency_and_privacy.m4v295.7 MiB2007-03-10 00:58:30
23C3-1721-en-software_protection_and_the_tpm.m4v281.8 MiB2007-01-07 11:54:54
23C3-1714-de-warum_wir_uns_so_gerne_ueberwachen_lassen.m4v251.8 MiB2007-02-07 08:46:16
23C3-1713-en-black_ops_2006.m4v237.7 MiB2007-01-07 11:53:48
23C3-1710-en-tap_the_eff.m4v618.9 MiB2007-03-10 00:57:05
23C3-1709-en-revenge_of_the_female_nerds.m4v118.9 MiB2007-01-07 11:52:51
23C3-1708-en-tv_b_gone.m4v258.1 MiB2007-01-18 17:24:50
23C3-1701-en-open_source_machine_translation.m4v127.6 MiB2007-01-07 11:52:21
23C3-1700-en-router_and_infrastructure_hacking.m4v134.4 MiB2007-01-07 11:51:51
23C3-1699-en-drm_comes_to_european_digital_tv.m4v141.8 MiB2007-01-18 17:23:42
23C3-1698-en-culture_jamming_discordianism.m4v173.3 MiB2007-01-18 17:22:58
23C3-1694-en-automated_exploit_detection_in_binaries.m4v203.3 MiB2007-01-18 17:22:08
23C3-1692-en-hacking_the_electoral_law.m4v261.3 MiB2007-03-10 00:54:06
23C3-1688-en-rootkits_as_reversing_tools.m4v249.6 MiB2007-02-07 08:45:13
23C3-1685-de-go_menschen.m4v248.2 MiB2007-03-10 00:52:52
23C3-1683-de-powerpoint_karaoke.m4v462.2 MiB2007-01-18 17:21:15
23C3-1682-de-security_nightmares.m4v200.9 MiB2007-01-18 17:19:02
23C3-1680-de-neues_gesetzliches_verbot_des_hackings.m4v254.7 MiB2007-03-10 00:51:41
23C3-1679-de-ueberwachungsdruck.m4v227.3 MiB2007-01-18 17:18:03
23C3-1678-de-kritik_an_den_illuminaten.m4v149.0 MiB2007-01-07 11:51:18
23C3-1670-de-barrierefreies_web.m4v126.1 MiB2007-01-07 11:50:38
23C3-1667-de-jabber_showcase.m4v143.6 MiB2007-01-07 11:50:08
23C3-1663-de-tracking_goods_and_tracing_people.m4v240.2 MiB2007-01-07 11:49:30
23C3-1658-en-bignum_arithmetic.m4v80.1 MiB2007-01-07 11:48:33
23C3-1656-en-dylan_network_security.m4v242.2 MiB2007-03-10 00:50:29
23C3-1655-de-elektronische_reisedokumente.m4v123.7 MiB2007-01-07 11:48:15
23C3-1652-de-geschichte_der_automaten.m4v219.1 MiB2007-02-07 08:44:13
23C3-1651-de-ueberwachen_und_strafen_in_entenhausen.m4v119.4 MiB2007-01-07 11:47:47
23C3-1646-en-dvb_t.m4v141.9 MiB2007-01-18 17:17:01
23C3-1644-en-sflow.m4v111.1 MiB2007-01-18 17:16:28
23C3-1642-en-unlocking_filevault.m4v204.6 MiB2007-01-07 11:47:17
23C3-1640-en-10ge_monitoring_system.m4v108.2 MiB2007-01-07 11:46:26
23C3-1638-de-freie_software.m4v181.7 MiB2007-01-07 11:46:01
23C3-1634-en-how_to_squeeze_more_performance_out_of_your_wifi.m4v172.6 MiB2007-01-07 11:45:17
23C3-1629-en-body_hacking.m4v184.2 MiB2007-01-07 11:44:32
23C3-1627-en-software_reliability.m4v107.0 MiB2007-01-18 17:16:01
23C3-1622-en-void_the_warranty.m4v259.0 MiB2007-01-18 17:15:37
23C3-1619-en-introduction_to_matrix_programming.m4v229.2 MiB2007-02-07 08:43:23
23C3-1616-de-nerds_und_geeks.m4v312.9 MiB2007-03-10 00:49:20
23C3-1611-en-privacy_identity_and_anonymity_in_web_20.m4v175.5 MiB2007-03-10 00:47:50
23C3-1610-en-fudging_with_firmware.m4v167.4 MiB2007-01-07 11:43:44
23C3-1609-en-data_retention_update.m4v185.7 MiB2007-01-07 11:43:00
23C3-1608-en-vehicular_communication_and_vanets.m4v295.4 MiB2007-01-07 11:42:12
23C3-1607-de-probabilistic_trust_model_for_gnupg.m4v322.2 MiB2007-03-10 00:47:00
23C3-1606-en-console_hacking_2006.m4v132.2 MiB2007-01-07 11:40:55
23C3-1605-de-digitale_bildforensik.m4v231.3 MiB2007-01-07 11:40:21
23C3-1604-de-tracking_von_personen_in_videoszenen.m4v218.2 MiB2007-01-18 17:14:35
23C3-1603-en-foss_in_india.m4v144.2 MiB2007-01-07 11:39:24
23C3-1602-en-subverting_ajax.m4v282.6 MiB2007-03-10 00:45:28
23C3-1600-en-biometrics.m4v207.4 MiB2007-03-10 00:44:08
23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.m4v252.2 MiB2007-01-18 17:13:36
23C3-1596-en-openxpki.m4v321.4 MiB2007-03-10 00:43:09
23C3-1593-de-krypta.m4v147.2 MiB2007-01-18 17:11:46
23C3-1592-en-inside_vmware.m4v127.1 MiB2007-01-18 17:10:35
23C3-1578-de-hacking_fingerprint_recognition_systems.m4v198.0 MiB2007-03-10 00:41:38
23C3-1576-en-rfid_hacking.m4v217.8 MiB2007-03-10 00:40:41
23C3-1568-en-json_rpc.m4v88.7 MiB2007-01-18 17:09:45
23C3-1567-en-hacker_jeopardy.m4v392.3 MiB2007-01-18 17:09:09
23C3-1566-en-openpcd_openpicc.m4v409.9 MiB2007-01-07 11:38:46
23C3-1563-en-funkerspuk.m4v128.2 MiB2007-01-07 11:36:30
23C3-1561-de-big_brother_awards.m4v244.5 MiB2007-03-10 00:39:39
23C3-1560-en-csrf.m4v169.0 MiB2007-01-18 17:07:03
23C3-1555-de-konrad_zuse_der_rechnende_raum.m4v96.1 MiB2007-01-18 17:06:20
23C3-1554-de-ethernet_mit_mikrocontrollern.m4v224.1 MiB2007-01-07 11:35:44
23C3-1552-en-nintendo_ds.m4v189.1 MiB2007-01-07 11:34:49
23C3-1545-en-advanced_attacks_against_pocketpc_phones.m4v191.9 MiB2007-02-07 08:42:21
23C3-1543-de-kollaboratives_wissenmanagement.m4v214.1 MiB2007-03-10 00:38:30
23C3-1540-de-learn_to_be_honest.m4v104.4 MiB2007-01-07 11:34:04
23C3-1537-en-know_your_citizens.m4v157.1 MiB2007-03-10 00:37:27
23C3-1523-en-the_rise_and_fall_of_open_source.m4v165.8 MiB2007-03-10 00:36:38
23C3-1520-en-counter_development.m4v242.3 MiB2007-01-07 11:33:40
23C3-1517-en-lightning_talks_day_4.m4v621.1 MiB2007-02-07 08:41:38
23C3-1516-en-lightning_talks_day_3.m4v231.2 MiB2007-01-07 11:32:46
23C3-1515-en-lightning_talks_day_2.m4v121.3 MiB2007-01-18 17:05:52
23C3-1514-en-lightning_talks_day_1.m4v270.8 MiB2007-03-10 00:35:51
23C3-1513-en-detecting_temperature_through_clock_skew.m4v231.2 MiB2007-02-07 08:39:19
23C3-1512-de-homegrown_interactive_tables.m4v109.8 MiB2007-01-18 17:05:18
23C3-1505-de-gaeste_ueberwachung.m4v130.5 MiB2007-01-07 11:31:55
23C3-1502-en-the_gift_of_sharing.m4v242.9 MiB2007-03-10 00:34:32
23C3-1500-en-hackerspaces.m4v178.0 MiB2007-01-07 11:31:26
23C3-1498-en-mining_aol_search_queries.m4v189.7 MiB2007-01-18 17:04:44
23C3-1495-en-green_phone.m4v132.8 MiB2007-01-18 17:03:46
23C3-1494-de-ego_striptease.m4v201.2 MiB2007-02-07 08:38:23
23C3-1493-de-virtuelle_sicherheit.m4v114.2 MiB2007-01-18 17:03:05
23C3-1492-en-dying_giraffe_recordings.m4v148.7 MiB2007-01-07 11:30:01
23C3-1487-de-ccc_jahresrueckblick.m4v238.6 MiB2007-01-07 11:29:06
23C3-1478-en-traffic_analysis.m4v217.2 MiB2007-01-07 11:27:49
23C3-1473-en-large_scale_internet_content_filtering.m4v199.4 MiB2007-01-07 11:26:56
23C3-1461-en-the_grim_meathook_future.m4v330.3 MiB2007-03-10 00:33:22
23C3-1459-en-sip_security.m4v139.3 MiB2007-01-07 11:26:06
23C3-1457-en-credit_card_security.m4v257.9 MiB2007-01-07 11:25:33
23C3-1456-en-unusual_bugs.m4v236.7 MiB2007-01-18 17:02:18
23C3-1454-en-natural_language_database_interface.m4v245.0 MiB2007-01-07 11:24:29
23C3-1452-de-critical_theory_and_chaos.m4v296.0 MiB2007-01-18 16:59:44
23C3-1449-en-not_so_smart_card.m4v81.6 MiB2007-03-10 00:31:46
23C3-1446-en-secure_network_server_programming_on_unix.m4v83.2 MiB2007-01-07 11:23:22
23C3-1444-en-tor_and_china.m4v353.8 MiB2007-01-07 11:23:00
23C3-1439-en-information_operations.m4v171.8 MiB2007-01-07 11:21:33
23C3-1433-en-design_a_decent_user_interface.m4v288.3 MiB2007-03-10 00:31:22
23C3-1429-de-fnord_jahresrueckblick.m4v217.3 MiB2007-01-18 16:58:35
23C3-1423-en-we_dont_trust_voting_computers.m4v333.6 MiB2007-03-22 18:56:53
23C3-1422-en-pornography_and_technology.m4v106.2 MiB2007-01-18 16:57:38
23C3-1420-en-strong_random_number_generator.m4v670.6 MiB2007-03-10 00:28:24
23C3-1419-de-java_wird_groovy.m4v381.1 MiB2007-03-10 00:24:06
23C3-1418-de-trust_your_eyes.m4v77.0 MiB2007-01-07 11:19:52
23C3-1416-de-wlan_schwarzsurfen_und_das_recht.m4v239.1 MiB2007-01-18 16:57:10
23C3-1402-de-drones.m4v214.3 MiB2007-01-07 11:19:33
23C3-1381-en-stealth_malware.m4v289.1 MiB2007-01-07 11:18:46
23C3-1373-en-hacker_foundation.m4v99.1 MiB2007-01-07 11:17:42
23C3-1347-en-we_are_great_together.m4v208.2 MiB2007-01-18 16:55:22
23C3-1346-de-sie_haben_das_recht_zu_schweigen.m4v348.1 MiB2007-01-18 16:53:31
23C3-1342-en-botnet_detection.m4v85.2 MiB2007-01-18 16:47:49
23C3-1257-en-podjournalism.m4v219.2 MiB2007-01-18 16:46:12
23C3-1256-en-who_can_you_trust.m4v297.5 MiB2007-03-10 00:21:34