ID | Interpret | Skladba | Album | |
151. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
152. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
153. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
154. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
155. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
156. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
157. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
158. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
159. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
160. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
161. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
162. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
163. | Dan Kaminsky | DNS Rebinding And More Packet Tricks | Chaos Communication Congress 2007 (24c3) | |
164. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
165. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
166. | Mark Vogelsberger | Simulating the Universe on Supercomputers | Chaos Communication Congress 2007 (24c3) | |
167. | Mark Vogelsberger | Simulating the Universe on Supercomputers | Chaos Communication Congress 2007 (24c3) | |
168. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
169. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
170. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
171. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
172. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
173. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
174. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
175. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
176. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
177. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
178. | Wolfgang Wippermann | Agenten des Bösen | Chaos Communication Congress 2007 (24c3) | |
179. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
180. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |