ID | Interpret | Skladba | Album | |
121. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
122. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
123. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
124. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
125. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
126. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
127. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
128. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
129. | Martin Ling | Flying for free | Chaos Communication Congress 2008 (25c3) | |
130. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
131. | Rose White | The history of guerilla knitting | Chaos Communication Congress 2007 (24c3) | |
132. | Rose White | The Role of Brilliant Deviants in the Liberalization of Society | Chaos Communication Congress 2007 (24c3) | |
133. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
134. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
135. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
136. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
137. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
138. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
139. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
140. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
141. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
142. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
143. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
144. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
145. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
146. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
147. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
148. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
149. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
150. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |