ID | Interpret | Skladba | Album | |
181. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
182. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
183. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
184. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
185. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
186. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
187. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
188. | Wolfgang Wippermann | Agenten des Bösen | Chaos Communication Congress 2007 (24c3) | |
189. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
190. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
191. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
192. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
193. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
194. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
195. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
196. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
197. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
198. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
199. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
200. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |