ID | Interpret | Skladba | Album | |
61. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
62. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
63. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
64. | Florian, Xavier Carcelle | FAIFA: A first open source PLC tool | Chaos Communication Congress 2008 (25c3) | |
65. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
66. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
67. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
68. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
69. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
70. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
71. | Florian, Xavier Carcelle | FAIFA: A first open source PLC tool | Chaos Communication Congress 2008 (25c3) | |
72. | Florian, Xavier Carcelle | FAIFA: A first open source PLC tool | Chaos Communication Congress 2008 (25c3) | |
73. | Florian, Xavier Carcelle | FAIFA: A first open source PLC tool | Chaos Communication Congress 2008 (25c3) | |
74. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
75. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
76. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
77. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
78. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
79. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
80. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
81. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
82. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
83. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
84. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
85. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
86. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
87. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
88. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
89. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
90. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |