Index of /cdn.media.ccc.de/congress/2010/mp4-h264-HQ
 Name                                                                      Last modified      Size  Description
 Parent Directory                                                                               -   
 27c3.mp4.all.sha1                                                         2011-01-19 01:51  8.2K  
 27c3.mp4.all.md5                                                          2011-01-19 01:25  7.5K  
 27c3-4339-en-openleaks.mp4.sha1                                           2011-01-08 23:34   69   
 27c3-4339-en-openleaks.mp4.md5                                            2011-01-08 23:33   61   
 27c3-4339-en-openleaks.mp4                                                2011-01-08 18:37  874M  
 27c3-4338-de-wikileaks_und_mehr.mp4.sha1                                  2011-01-05 01:42   78   
 27c3-4338-de-wikileaks_und_mehr.mp4.md5                                   2011-01-05 01:41   70   
 27c3-4338-de-wikileaks_und_mehr.mp4                                       2011-01-04 13:50  641M  
 27c3-4334-en-fnord_jahresrueckblick.mp4.sha1                              2011-01-03 01:44   82   
 27c3-4334-en-fnord_jahresrueckblick.mp4.md5                               2011-01-03 01:42   74   
 27c3-4334-en-fnord_jahresrueckblick.mp4                                   2011-01-03 00:51  679M  
 27c3-4333-en-hacker_jeopardy_translation.mp4.sha1                         2011-01-04 01:53   87   
 27c3-4333-en-hacker_jeopardy_translation.mp4.md5                          2011-01-04 01:49   79   
 27c3-4333-en-hacker_jeopardy_translation.mp4                              2011-01-04 00:35  1.6G  
 27c3-4326-de-radio_der_zukunft.mp4.sha1                                   2011-01-03 01:40   77   
 27c3-4326-de-radio_der_zukunft.mp4.md5                                    2011-01-03 01:37   69   
 27c3-4326-de-radio_der_zukunft.mp4                                        2011-01-02 22:33  829M  
 27c3-4302-en-27c3_keynote_we_come_in_peace.mp4.sha1                       2011-01-04 01:47   89   
 27c3-4302-en-27c3_keynote_we_come_in_peace.mp4.md5                        2011-01-04 01:45   81   
 27c3-4302-en-27c3_keynote_we_come_in_peace.mp4                            2011-01-04 00:31  412M  
 27c3-4301-en-flow_analysis_of_internet_activities.mp4.sha1                2011-01-08 23:32   96   
 27c3-4301-en-flow_analysis_of_internet_activities.mp4.md5                 2011-01-08 23:32   88   
 27c3-4301-en-flow_analysis_of_internet_activities.mp4                     2011-01-08 20:42  579M  
 27c3-4300-en-lightning_talks_d4.mp4.sha1                                  2011-01-08 23:31   78   
 27c3-4300-en-lightning_talks_d4.mp4.md5                                   2011-01-08 23:30   70   
 27c3-4300-en-lightning_talks_d4.mp4                                       2011-01-08 17:56  1.1G  
 27c3-4299-en-closing_event.mp4.sha1                                       2011-01-05 01:40   73   
 27c3-4299-en-closing_event.mp4.md5                                        2011-01-05 01:40   65   
 27c3-4299-en-closing_event.mp4                                            2011-01-04 17:09  192M  
 27c3-4298-de-ccc_jahresrueckblick_2010.mp4.sha1                           2011-01-05 20:42   85   
 27c3-4298-de-ccc_jahresrueckblick_2010.mp4.md5                            2011-01-05 20:41   77   
 27c3-4298-de-ccc_jahresrueckblick_2010.mp4                                2011-01-05 20:25  915M  
 27c3-4297-de-die_gesamte_technik_ist_sicher.mp4.sha1                      2011-01-04 01:45   90   
 27c3-4297-de-die_gesamte_technik_ist_sicher.mp4.md5                       2011-01-04 01:43   82   
 27c3-4297-de-die_gesamte_technik_ist_sicher.mp4                           2011-01-03 11:08  578M  
 27c3-4296-en-lightning_days_d2.mp4.sha1                                   2011-01-08 23:30   77   
 27c3-4296-en-lightning_days_d2.mp4.md5                                    2011-01-08 23:30   69   
 27c3-4296-en-lightning_days_d2.mp4                                        2011-01-08 15:06  795M  
 27c3-4295-en-high_speed_high_security_cryptography.mp4.sha1               2011-01-08 23:29   97   
 27c3-4295-en-high_speed_high_security_cryptography.mp4.md5                2011-01-08 23:29   89   
 27c3-4295-en-high_speed_high_security_cryptography.mp4                    2011-01-08 16:07  424M  
 27c3-4276-en-cognitive_psychology_for_hackers.mp4.sha1                    2011-01-14 00:46   92   
 27c3-4276-en-cognitive_psychology_for_hackers.mp4.md5                     2011-01-14 00:46   84   
 27c3-4276-en-cognitive_psychology_for_hackers.mp4                         2011-01-13 23:18  1.0G  
 27c3-4265-en-hacking_smart_phones.mp4.sha1                                2011-01-05 01:39   80   
 27c3-4265-en-hacking_smart_phones.mp4.md5                                 2011-01-05 01:38   72   
 27c3-4265-en-hacking_smart_phones.mp4                                     2011-01-04 17:06  956M  
 27c3-4263-en-resisting_excessive_government_surveillance.mp4.sha1         2011-01-08 23:28  103   
 27c3-4263-en-resisting_excessive_government_surveillance.mp4.md5          2011-01-08 23:27   95   
 27c3-4263-en-resisting_excessive_government_surveillance.mp4              2011-01-08 18:42  746M  
 27c3-4261-en-key_recovery_attacks_rc4.mp4.sha1                            2011-01-08 23:27   84   
 27c3-4261-en-key_recovery_attacks_rc4.mp4.md5                             2011-01-08 23:27   76   
 27c3-4261-en-key_recovery_attacks_rc4.mp4                                 2011-01-08 20:32  393M  
 27c3-4253-en-pentanews_game_show.mp4.sha1                                 2011-01-05 01:37   79   
 27c3-4253-en-pentanews_game_show.mp4.md5                                  2011-01-05 01:36   71   
 27c3-4253-en-pentanews_game_show.mp4                                      2011-01-04 17:35  692M  
 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4.sha1         2011-01-18 21:59  103   
 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4.md5          2011-01-18 21:58   95   
 27c3-4252-de-von_zensursula_ueber_censilia_zum_kindernet.mp4              2011-01-18 14:48  1.0G  
 27c3-4245-en-adventures_in_analyzing_stuxnet.mp4.sha1                     2011-01-08 23:27   91   
 27c3-4245-en-adventures_in_analyzing_stuxnet.mp4.md5                      2011-01-08 23:26   83   
 27c3-4245-en-adventures_in_analyzing_stuxnet.mp4                          2011-01-08 12:30  440M  
 27c3-4244-en-critical_overview_of_10_years_pet.mp4.sha1                   2011-01-03 01:36   93   
 27c3-4244-en-critical_overview_of_10_years_pet.mp4.md5                    2011-01-03 01:34   85   
 27c3-4244-en-critical_overview_of_10_years_pet.mp4                        2011-01-03 01:07  614M  
 27c3-4239-en-lightning_talks_d3.mp4.sha1                                  2011-01-05 01:32   78   
 27c3-4239-en-lightning_talks_d3.mp4.md5                                   2011-01-05 01:30   70   
 27c3-4239-en-lightning_talks_d3.mp4                                       2011-01-05 00:01  1.2G  
 27c3-4237-en-indect_eu_surveillance_project.mp4.sha1                      2011-01-03 01:33   90   
 27c3-4237-en-indect_eu_surveillance_project.mp4.md5                       2011-01-03 01:29   82   
 27c3-4237-en-indect_eu_surveillance_project.mp4                           2011-01-03 00:15  960M  
 27c3-4236-en-international_cyber_jurisdiction.mp4.sha1                    2011-01-05 01:30   92   
 27c3-4236-en-international_cyber_jurisdiction.mp4.md5                     2011-01-05 01:29   84   
 27c3-4236-en-international_cyber_jurisdiction.mp4                         2011-01-05 00:05  903M  
 27c3-4234-en-usb_and_libusb.mp4.sha1                                      2011-01-05 01:29   74   
 27c3-4234-en-usb_and_libusb.mp4.md5                                       2011-01-05 01:29   66   
 27c3-4234-en-usb_and_libusb.mp4                                           2011-01-05 00:12  666M  
 27c3-4231-en-datenrettung_fun_with_hard_drives.mp4.sha1                   2011-01-04 01:43   93   
 27c3-4231-en-datenrettung_fun_with_hard_drives.mp4.md5                    2011-01-04 01:39   85   
 27c3-4231-en-datenrettung_fun_with_hard_drives.mp4                        2011-01-03 12:46  856M  
 27c3-4230-de-security_nightmares.mp4.sha1                                 2011-01-05 01:28   79   
 27c3-4230-de-security_nightmares.mp4.md5                                  2011-01-05 01:28   71   
 27c3-4230-de-security_nightmares.mp4                                      2011-01-05 00:08  597M  
 27c3-4221-en-omg_wtf_pdf.mp4.sha1                                         2011-01-03 01:29   71   
 27c3-4221-en-omg_wtf_pdf.mp4.md5                                          2011-01-03 01:29   63   
 27c3-4221-en-omg_wtf_pdf.mp4                                              2011-01-03 00:45  365M  
 27c3-4211-en-chip_and_pin_is_broken.mp4.sha1                              2011-01-03 01:28   82   
 27c3-4211-en-chip_and_pin_is_broken.mp4.md5                               2011-01-03 01:28   74   
 27c3-4211-en-chip_and_pin_is_broken.mp4                                   2011-01-02 23:31  437M  
 27c3-4210-en-lying_to_the_neighbours.mp4.sha1                             2011-01-08 23:26   83   
 27c3-4210-en-lying_to_the_neighbours.mp4.md5                              2011-01-08 23:25   75   
 27c3-4210-en-lying_to_the_neighbours.mp4                                  2011-01-08 15:01  460M  
 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4.sha1  2011-01-03 01:28  110   
 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4.md5   2011-01-03 01:27  102   
 27c3-4209-en-zero_sized_heap_allocations_vulnerability_analysis.mp4       2011-01-02 23:30  803M  
 27c3-4208-en-wideband_gsm_sniffing.mp4.sha1                               2011-01-05 01:27   81   
 27c3-4208-en-wideband_gsm_sniffing.mp4.md5                                2011-01-05 01:27   73   
 27c3-4208-en-wideband_gsm_sniffing.mp4                                    2011-01-05 00:16  511M  
 27c3-4206-en-immi_from_concept_to_reality.mp4.sha1                        2011-01-08 23:25   88   
 27c3-4206-en-immi_from_concept_to_reality.mp4.md5                         2011-01-08 23:24   80   
 27c3-4206-en-immi_from_concept_to_reality.mp4                             2011-01-08 16:02  513M  
 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4.sha1    2011-01-05 20:40  108   
 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4.md5     2011-01-05 20:39  100   
 27c3-4203-en-distributed_fpga_number_crunching_for_the_masses.mp4         2011-01-05 19:55  660M  
 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4.sha1 2011-01-10 16:43  111   
 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4.md5  2011-01-10 16:43  103   
 27c3-4201-en-the_concert_a_disconcerting_moment_for_free_culture.mp4      2011-01-10 16:33  587M  
 27c3-4195-de-literarischer_abend.mp4.sha1                                 2011-01-05 01:27   79   
 27c3-4195-de-literarischer_abend.mp4.md5                                  2011-01-05 01:26   71   
 27c3-4195-de-literarischer_abend.mp4                                      2011-01-05 00:23  844M  
 27c3-4193-en-having_fun_with_rtp.mp4.sha1                                 2011-01-08 23:23   79   
 27c3-4193-en-having_fun_with_rtp.mp4.md5                                  2011-01-08 23:23   71   
 27c3-4193-en-having_fun_with_rtp.mp4                                      2011-01-08 20:19  379M  
 27c3-4190-en-data_retention_in_the_eu.mp4.sha1                            2011-01-05 01:26   84   
 27c3-4190-en-data_retention_in_the_eu.mp4.md5                             2011-01-05 01:26   76   
 27c3-4190-en-data_retention_in_the_eu.mp4                                 2011-01-05 00:34  603M  
 27c3-4187-en-your_infrastructure_will_kill_you.mp4.sha1                   2011-01-05 01:25   93   
 27c3-4187-en-your_infrastructure_will_kill_you.mp4.md5                    2011-01-05 01:24   85   
 27c3-4187-en-your_infrastructure_will_kill_you.mp4                        2011-01-05 00:19  858M  
 27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4.sha1                     2011-01-08 23:22   91   
 27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4.md5                      2011-01-08 23:22   83   
 27c3-4185-de-whistleblowing_licht_ins_dunkel.mp4                          2011-01-08 14:31  510M  
 27c3-4184-de-stanislaw_lem_weltverbesserer.mp4.sha1                       2011-01-12 13:26   89   
 27c3-4184-de-stanislaw_lem_weltverbesserer.mp4.md5                        2011-01-12 13:26   81   
 27c3-4184-de-stanislaw_lem_weltverbesserer.mp4                            2011-01-12 13:22  564M  
 27c3-4183-en-safety_on_open_sea.mp4.sha1                                  2011-01-05 20:39   78   
 27c3-4183-en-safety_on_open_sea.mp4.md5                                   2011-01-05 20:37   70   
 27c3-4183-en-safety_on_open_sea.mp4                                       2011-01-05 19:51  1.1G  
 27c3-4181-en-sip_home_gateways_under_fire.mp4.sha1                        2011-01-03 01:27   88   
 27c3-4181-en-sip_home_gateways_under_fire.mp4.md5                         2011-01-03 01:26   80   
 27c3-4181-en-sip_home_gateways_under_fire.mp4                             2011-01-02 23:29  308M  
 27c3-4176-de-hacking_ibuttons.mp4.sha1                                    2011-01-05 20:36   76   
 27c3-4176-de-hacking_ibuttons.mp4.md5                                     2011-01-05 20:36   68   
 27c3-4176-de-hacking_ibuttons.mp4                                         2011-01-05 19:46  778M  
 27c3-4175-en-from_robot_to_robot.mp4.sha1                                 2011-01-08 23:21   79   
 27c3-4175-en-from_robot_to_robot.mp4.md5                                  2011-01-08 23:21   71   
 27c3-4175-en-from_robot_to_robot.mp4                                      2011-01-08 14:44  572M  
 27c3-4174-en-the_hidden_nemesis.mp4.sha1                                  2011-01-05 20:35   78   
 27c3-4174-en-the_hidden_nemesis.mp4.md5                                   2011-01-05 20:35   70   
 27c3-4174-en-the_hidden_nemesis.mp4                                       2011-01-05 19:52  625M  
 27c3-4168-en-automated_architecture_independent_gadget_search.mp4.sha1    2011-01-05 20:35  108   
 27c3-4168-en-automated_architecture_independent_gadget_search.mp4.md5     2011-01-05 20:34  100   
 27c3-4168-en-automated_architecture_independent_gadget_search.mp4         2011-01-05 19:49  425M  
 27c3-4164-de-friede_sei_mit_euren_daten.mp4.sha1                          2011-01-08 23:20   86   
 27c3-4164-de-friede_sei_mit_euren_daten.mp4.md5                           2011-01-08 23:20   78   
 27c3-4164-de-friede_sei_mit_euren_daten.mp4                               2011-01-08 13:25  674M  
 27c3-4160-en-automatic_identification_cryptographic_primitives.mp4.sha1   2011-01-05 01:24  109   
 27c3-4160-en-automatic_identification_cryptographic_primitives.mp4.md5    2011-01-05 01:23  101   
 27c3-4160-en-automatic_identification_cryptographic_primitives.mp4        2011-01-05 00:53  713M  
 27c3-4159-en-reverse_engineering_mos_6502.mp4.sha1                        2011-01-08 23:19   88   
 27c3-4159-en-reverse_engineering_mos_6502.mp4.md5                         2011-01-08 23:19   80   
 27c3-4159-en-reverse_engineering_mos_6502.mp4                             2011-01-08 15:07  342M  
 27c3-4151-en-android_geolocation_using_gsm_network.mp4.sha1               2011-01-08 23:18   97   
 27c3-4151-en-android_geolocation_using_gsm_network.mp4.md5                2011-01-08 23:18   89   
 27c3-4151-en-android_geolocation_using_gsm_network.mp4                    2011-01-08 18:20  801M  
 27c3-4149-en-i_control_your_code.mp4.sha1                                 2011-01-05 01:22   79   
 27c3-4149-en-i_control_your_code.mp4.md5                                  2011-01-05 01:21   71   
 27c3-4149-en-i_control_your_code.mp4                                      2011-01-05 00:27  666M  
 27c3-4145-en-spoilers_human_interfaces_airplanes.mp4.sha1                 2011-01-05 20:34   95   
 27c3-4145-en-spoilers_human_interfaces_airplanes.mp4.md5                  2011-01-05 20:33   87   
 27c3-4145-en-spoilers_human_interfaces_airplanes.mp4                      2011-01-05 19:53  1.1G  
 27c3-4144-en-short_political_history_of_acoustics.mp4.sha1                2011-01-05 20:33   96   
 27c3-4144-en-short_political_history_of_acoustics.mp4.md5                 2011-01-05 20:32   88   
 27c3-4144-en-short_political_history_of_acoustics.mp4                     2011-01-05 19:55  711M  
 27c3-4143-en-parttimescientists.mp4.sha1                                  2011-02-06 14:50   78   
 27c3-4143-en-parttimescientists.mp4.md5                                   2011-02-06 14:50   70   
 27c3-4143-en-parttimescientists.mp4                                       2011-01-31 13:37  448M  
 27c3-4142-en-nodejs_as_a_networking_tool.mp4.sha1                         2011-01-05 01:19   87   
 27c3-4142-en-nodejs_as_a_networking_tool.mp4.md5                          2011-01-05 01:19   79   
 27c3-4142-en-nodejs_as_a_networking_tool.mp4                              2011-01-05 00:30  442M  
 27c3-4141-de-hacker_jeopardy.mp4.sha1                                     2011-01-03 01:26   75   
 27c3-4141-de-hacker_jeopardy.mp4.md5                                      2011-01-03 01:24   67   
 27c3-4141-de-hacker_jeopardy.mp4                                          2011-01-03 00:14  1.6G  
 27c3-4140-en-contemporary_profiling_of_web_users.mp4.sha1                 2011-01-08 23:18   95   
 27c3-4140-en-contemporary_profiling_of_web_users.mp4.md5                  2011-01-08 23:17   87   
 27c3-4140-en-contemporary_profiling_of_web_users.mp4                      2011-01-08 14:40  566M  
 27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4.sha1   2011-01-08 23:17  109   
 27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4.md5    2011-01-08 23:17  101   
 27c3-4138-en-secure_communications_below_the_hearing_threshold.mp4        2011-01-08 17:04  679M  
 27c3-4125-de-spinning_the_electronic_wheel.mp4.sha1                       2011-01-08 23:17   89   
 27c3-4125-de-spinning_the_electronic_wheel.mp4.md5                        2011-01-08 23:16   81   
 27c3-4125-de-spinning_the_electronic_wheel.mp4                            2011-01-08 14:50  844M  
 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4.sha1         2011-01-05 01:18  103   
 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4.md5          2011-01-05 01:18   95   
 27c3-4124-en-three_jobs_that_journalists_will_do_in_2050.mp4              2011-01-05 00:46  518M  
 27c3-4123-en-defense_is_not_dead.mp4.sha1                                 2011-01-05 01:17   79   
 27c3-4123-en-defense_is_not_dead.mp4.md5                                  2011-01-05 01:16   71   
 27c3-4123-en-defense_is_not_dead.mp4                                      2011-01-04 18:04  912M  
 27c3-4121-en-is_the_ssliverse_a_safe_place.mp4.sha1                       2011-01-05 01:15   89   
 27c3-4121-en-is_the_ssliverse_a_safe_place.mp4.md5                        2011-01-05 01:14   81   
 27c3-4121-en-is_the_ssliverse_a_safe_place.mp4                            2011-01-04 23:57  969M  
 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4.sha1         2011-01-08 23:16  103   
 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4.md5          2011-01-08 23:16   95   
 27c3-4114-en-analyzing_modern_cryptographic_rfid_stystem.mp4              2011-01-08 18:18  865M  
 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4.sha1                      2011-01-08 23:15   90   
 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4.md5                       2011-01-08 23:14   82   
 27c3-4111-de-eins_zwei_drei_alle_sind_dabei.mp4                           2011-01-08 13:59  836M  
 27c3-4103-en-copyright_enforcement_versus_freedoms.mp4.sha1               2011-01-08 23:14   97   
 27c3-4103-en-copyright_enforcement_versus_freedoms.mp4.md5                2011-01-08 23:14   89   
 27c3-4103-en-copyright_enforcement_versus_freedoms.mp4                    2011-01-08 14:46  529M  
 27c3-4099-en-file_print_electronics.mp4.sha1                              2011-01-05 01:14   82   
 27c3-4099-en-file_print_electronics.mp4.md5                               2011-01-05 01:14   74   
 27c3-4099-en-file_print_electronics.mp4                                   2011-01-04 04:15  383M  
 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4.sha1            2011-01-03 01:23  100   
 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4.md5             2011-01-03 01:21   92   
 27c3-4098-en-tor_is_peace_software_freedom_is_slavery.mp4                 2011-01-03 00:53  754M  
 27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4.sha1             2011-01-08 23:13   99   
 27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4.md5              2011-01-08 23:13   91   
 27c3-4097-de-identifizierung_von_netzwerkprotokollen.mp4                  2011-01-08 16:54  384M  
 27c3-4096-en-code_deobfuscation_by_optimization.mp4.sha1                  2011-01-05 01:14   94   
 27c3-4096-en-code_deobfuscation_by_optimization.mp4.md5                   2011-01-05 01:14   86   
 27c3-4096-en-code_deobfuscation_by_optimization.mp4                       2011-01-04 22:05  469M  
 27c3-4094-de-netzneutralitaet_und_qos.mp4.sha1                            2011-01-04 01:38   84   
 27c3-4094-de-netzneutralitaet_und_qos.mp4.md5                             2011-01-04 01:35   76   
 27c3-4094-de-netzneutralitaet_und_qos.mp4                                 2011-01-04 00:21  928M  
 27c3-4090-en-baseband_apocalypse.mp4.sha1                                 2011-01-04 01:33   79   
 27c3-4090-en-baseband_apocalypse.mp4.md5                                  2011-01-04 01:30   71   
 27c3-4090-en-baseband_apocalypse.mp4                                      2011-01-04 00:12  1.0G  
 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4.sha1      2011-01-03 01:21  106   
 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4.md5       2011-01-03 01:20   98   
 27c3-4089-de-ich_sehe_nicht_dass_wir_nicht_zustimmen_werden.mp4           2011-01-03 00:33  651M  
 27c3-4087-en-console_hacking_2010.mp4.sha1                                2011-01-04 01:29   80   
 27c3-4087-en-console_hacking_2010.mp4.md5                                 2011-01-04 01:29   72   
 27c3-4087-en-console_hacking_2010.mp4                                     2011-01-03 23:46  275M  
 27c3-4085-de-digitale_spaltung_per_gesetz.mp4.sha1                        2011-01-05 01:13   88   
 27c3-4085-de-digitale_spaltung_per_gesetz.mp4.md5                         2011-01-05 01:13   80   
 27c3-4085-de-digitale_spaltung_per_gesetz.mp4                             2011-01-04 16:25  675M  
 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4.sha1        2011-01-03 01:16  104   
 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4.md5         2011-01-03 01:15   96   
 27c3-4084-en-ignorance_and_peace_narratives_in_cyberspace.mp4             2011-01-02 22:13  350M  
 27c3-4082-en-sap_landscape.mp4.sha1                                       2011-01-08 23:13   73   
 27c3-4082-en-sap_landscape.mp4.md5                                        2011-01-08 23:12   65   
 27c3-4082-en-sap_landscape.mp4                                            2011-01-08 16:00  749M  
 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4.sha1               2011-01-04 01:28   97   
 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4.md5                2011-01-04 01:27   89   
 27c3-4081-de-netzmedienrecht_lobbyismus_korruption.mp4                    2011-01-03 23:28  884M  
 27c3-4073-de-logikschaltungen_ohne_elektronik.mp4.sha1                    2011-01-04 01:27   92   
 27c3-4073-de-logikschaltungen_ohne_elektronik.mp4.md5                     2011-01-04 01:26   84   
 27c3-4073-de-logikschaltungen_ohne_elektronik.mp4                         2011-01-03 23:00  463M  
 27c3-4070-de-fnord_jahresrueckblick.mp4.sha1                              2011-01-03 01:15   82   
 27c3-4070-de-fnord_jahresrueckblick.mp4.md5                               2011-01-03 01:14   74   
 27c3-4070-de-fnord_jahresrueckblick.mp4                                   2011-01-03 01:03  680M  
 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4.sha1           2011-01-08 23:12  101   
 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4.md5            2011-01-08 23:11   93   
 27c3-4067-en-data_analysis_in_terabit_ethernet_traffic.mp4                2011-01-08 18:31  671M  
 27c3-4061-en-building_custom_disassemblers.mp4.sha1                       2011-01-12 13:25   89   
 27c3-4061-en-building_custom_disassemblers.mp4.md5                        2011-01-12 13:25   81   
 27c3-4061-en-building_custom_disassemblers.mp4                            2011-01-12 13:02  590M  
 27c3-4060-en-attacking_mobile_phones.mp4.sha1                             2011-01-05 01:13   83   
 27c3-4060-en-attacking_mobile_phones.mp4.md5                              2011-01-05 01:12   75   
 27c3-4060-en-attacking_mobile_phones.mp4                                  2011-01-04 17:26  391M  
 27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4.sha1         2011-01-08 23:11  103   
 27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4.md5          2011-01-08 23:11   95   
 27c3-4057-en-adventures_in_mapping_afghanistan_elections.mp4              2011-01-08 16:42  480M  
 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4.sha1   2011-01-05 01:12  109   
 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4.md5    2011-01-05 01:12  101   
 27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4        2011-01-04 16:44  766M  
 27c3-4046-en-all_colours_are_beautiful.mp4.sha1                           2011-01-04 01:26   85   
 27c3-4046-en-all_colours_are_beautiful.mp4.md5                            2011-01-04 01:26   77   
 27c3-4046-en-all_colours_are_beautiful.mp4                                2011-01-03 13:16  429M  
 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4.sha1 2011-01-03 01:13  111   
 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4.md5  2011-01-03 01:12  103   
 27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4      2011-01-03 00:52  782M  
 27c3-4018-en-frozencache.mp4.sha1                                         2011-01-08 23:11   71   
 27c3-4018-en-frozencache.mp4.md5                                          2011-01-08 23:10   63   
 27c3-4018-en-frozencache.mp4                                              2011-01-08 17:18  689M  
 27c3-4017-en-desktop_on_the_linux.mp4.sha1                                2011-01-03 01:12   80   
 27c3-4017-en-desktop_on_the_linux.mp4.md5                                 2011-01-03 01:12   72   
 27c3-4017-en-desktop_on_the_linux.mp4                                     2011-01-02 23:21  635M  
 27c3-4011-en-embedded_reverse_engineering.mp4.sha1                        2011-01-04 01:25   88   
 27c3-4011-en-embedded_reverse_engineering.mp4.md5                         2011-01-04 01:25   80   
 27c3-4011-en-embedded_reverse_engineering.mp4                             2011-01-03 13:22  819M  
 27c3-4006-en-diy_synthesizers_and_sound_generators.mp4.sha1               2011-01-04 01:25   97   
 27c3-4006-en-diy_synthesizers_and_sound_generators.mp4.md5                2011-01-04 01:24   89   
 27c3-4006-en-diy_synthesizers_and_sound_generators.mp4                    2011-01-03 13:11  266M  
 27c3-4003-en-cybernetics_for_the_masses.mp4.sha1                          2011-01-03 01:11   86   
 27c3-4003-en-cybernetics_for_the_masses.mp4.md5                           2011-01-03 01:11   78   
 27c3-4003-en-cybernetics_for_the_masses.mp4                               2011-01-03 00:38  538M  
 27c3-3983-en-hackers_and_computer_science.mp4.sha1                        2011-01-04 01:24   88   
 27c3-3983-en-hackers_and_computer_science.mp4.md5                         2011-01-04 01:24   80   
 27c3-3983-en-hackers_and_computer_science.mp4                             2011-01-03 13:03  353M  
 27c3-3957-en-ipv6_insecurities.mp4.sha1                                   2011-01-08 23:10   77   
 27c3-3957-en-ipv6_insecurities.mp4.md5                                    2011-01-08 23:09   69   
 27c3-3957-en-ipv6_insecurities.mp4                                        2011-01-08 13:17  672M  
 27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4.sha1     2011-01-03 01:11  107   
 27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4.md5      2011-01-03 01:11   99   
 27c3-3952-en-running_your_own_gsm_stack_on_a_phone_osmocombb.mp4          2011-01-02 23:19  403M  
Apache/2.4.58 (Ubuntu) Server at www.ftp.uni-erlangen.de Port 80