ID | Interpret | Skladba | Album | |
151. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
152. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
153. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
154. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
155. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
156. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
157. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
158. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
159. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
160. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
161. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
162. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
163. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
164. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
165. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
166. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
167. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
168. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
169. | Stefano Di Paola, kuza55 | Attacking Rich Internet Applications | Chaos Communication Congress 2008 (25c3) | |
170. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
171. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
172. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
173. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
174. | Adrian Dabrowski | Zehn Big Brother Awards in .at | Chaos Communication Congress 2008 (25c3) | |
175. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
176. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
177. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
178. | Anne Roth | Terrorist All-Stars | Chaos Communication Congress 2008 (25c3) | |
179. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
180. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |