ID | Interpret | Skladba | Album | |
121. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
122. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
123. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
124. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
125. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
126. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
127. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
128. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
129. | Bre | Rapid Prototype Your Life | Chaos Communication Congress 2008 (25c3) | |
130. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
131. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
132. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
133. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
134. | dash | Reverse Engineering of Embedded Devices | Chaos Communication Congress 2007 (24c3) | |
135. | Oona Leganovic, Daniel Kulla | Space Communism | Chaos Communication Congress 2007 (24c3) | |
136. | Cristian Yxen, Denis, Erdgeist | Tracker fahrn | Chaos Communication Congress 2007 (24c3) | |
137. | Wolfgang Wippermann | Agenten des Bösen | Chaos Communication Congress 2007 (24c3) | |
138. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
139. | Dan Kaminsky | DNS Rebinding And More Packet Tricks | Chaos Communication Congress 2007 (24c3) | |
140. | Dan Kaminsky | DNS Rebinding And More Packet Tricks | Chaos Communication Congress 2007 (24c3) | |
141. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
142. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
143. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
144. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
145. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
146. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
147. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
148. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
149. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
150. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |