ID | Interpret | Skladba | Album | |
121. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
122. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
123. | Arjen Kamphuis | Open Source Lobbying, tips from the trenches | Chaos Communication Congress 2007 (24c3) | |
124. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
125. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
126. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
127. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
128. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
129. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
130. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
131. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
132. | Sway, Felix von Leitner | FeM-Streaming und Encoding | Chaos Communication Congress 2007 (24c3) | |
133. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
134. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
135. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
136. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
137. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
138. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
139. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
140. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
141. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
142. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
143. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
144. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
145. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
146. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
147. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
148. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
149. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
150. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |