ID | Interpret | Skladba | Album | |
61. | Martin Müller, Antoine Drouin | Paparazzi - The Free Autopilot | 24th Chaos Communication Congress | |
62. | Bill Himes | Bill Himes Message at Congress 2006 Saturday Morning | Leading Edge Congress 2006 | |
63. | Bill Ury | Seeking with the Mind of Christ | iConnect Youth Congress 2008 | |
64. | Bill Ury | Leading with the Purpose of Jesus | iConnect Youth Congress 2008 | |
65. | Bill Ury | Serving with the Heart of Jesus | iConnect Youth Congress 2008 | |
66. | Bill Ury | Leading with the Purpose of Jesus | iConnect Youth Congress 2008 | |
67. | Bill Ury | Serving with the Heart of Jesus | iConnect Youth Congress 2008 | |
68. | Felix von Leitner | Vortrag über Multicast und Stand der Technik | 16. Chaos Communication Congress, Berlin | |
69. | Felix von Leitner | Vortrag über Multicast und Stand der Technik | 16. Chaos Communication Congress, Berlin | |
70. | Felix von Leitner | Vortrag über Multicast und Stand der Technik | 16. Chaos Communication Congress, Berlin | |
71. | Benjamin Henrion | OOXML - A 12 euros campaign | 24th Chaos Communication Congress | |
72. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
73. | FX of Phenoelit, fabs | Port Scanning improved | Chaos Communication Congress 2007 (24c3) | |
74. | FX of Phenoelit, fabs | Port Scanning improved | Chaos Communication Congress 2007 (24c3) | |
75. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
76. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
77. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
78. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
79. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
80. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
81. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
82. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
83. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
84. | Ricardo Cristof Remmert-Fontes, Erik Josefsson | Data Retention and PNR | Chaos Communication Congress 2007 (24c3) | |
85. | Emerson | Hacking in the age of declining everything | Chaos Communication Congress 2007 (24c3) | |
86. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
87. | Emerson | Hacking in the age of declining everything | Chaos Communication Congress 2007 (24c3) | |
88. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
89. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
90. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |