23C3 Audio Recordings cover art

All Episodes

23C3 Audio Recordings — 124 episodes

#
Title
1

23C3_1727 Closing Ceremony

2

23C3_1698 Culture Jamming & Discordianism

3

23C3_1728 23C3 Network Review

4

23C3_1429 Fnord Jahresrückblick

5

23C3_1593 Krypta: DIY Serverhousing

6

23C3_1644 sFlow

7

23C3_1452 Chaos und Kritische Theorie

8

23C3_1517 Lightning Talks Day 4

9

23C3_1682 Security Nightmares 2007

10

23C3_1347 "We are great together, the liberal society and its enemies!"

11

23C3_1592 Inside VMware

12

23C3_1616 Nerds und Geeks zwischen Stereotyp und Subkultur

13

23C3_1708 TV-B-Gone

14

23C3_1257 Podjournalism

15

23C3_1416 Juristische Fragen um die Mitbenutzung fremder WLANs

16

23C3_1493 Virtuelle Sicherheit

17

23C3_1627 Software Reliability in Aerospace

18

23C3_1342 Automated Botnet Detection and Mitigation

19

23C3_1456 Unusual bugs

20

23C3_1494 Ego Striptease - Ich zeig dir, wer du bist

21

23C3_1560 CSRF, the Intranet and You

22

23C3_1567 Hacker Jeopardy

23

23C3_1683 Powerpoint Karaoke

24

23C3_1759 Schlossöffnung bei der Staatssicherheit der DDR

25

23C3_1346 Sie haben das Recht zu schweigen

26

23C3_1422 Pornography and Technology

27

23C3_1688 Rootkits as Reversing Tools

28

23C3_1694 Automated Exploit Detection in Binaries

29

23C3_1545 Advanced Attacks Against PocketPC Phones

30

23C3_1679 Überwachungsdruck - einige Experimente

31

23C3_1699 DRM comes to European digital TV

32

23C3_1760 On Free, and the Differences between Culture and Code

33

23C3_1457 Security in the cardholder data processing?!

34

23C3_1498 Mining Search Queries

35

23C3_1646 DVB-T - From Pixeldata to COFDM Transmission

36

23C3_1652 Geschichte der Automaten, Androiden und Homunculi

37

23C3_1478 An Introduction to Traffic Analysis

38

23C3_1602 Subverting AJAX

39

23C3_1622 Void the warranty!

40

23C3_1459 SIP Security

41

23C3_1516 Lightning Talks Day 3

42

23C3_1552 Nintendo DS

43

23C3_1566 OpenPCD / OpenPICC

44

23C3_1418 Trust Your Eyes

45

23C3_1520 Counter-Development

46

23C3_1640 A 10GE monitoring system

47

23C3_1733 Bluetooth Hacking Revisited

48

23C3_1473 The worst part of censorship is XXXXX

49

23C3_1563 Funkerspuk

50

23C3_1721 Software Protection and the TPM

51

23C3_1758 Fuzzing in the corporate world

52

23C3_1454 A Natural Language Database Interface using Fuzzy Semantics

53

23C3_1634 How to squeeze more performance out of your wifi

54

23C3_1638 Freie Software - Eine Chance für Afrika?

55

23C3_1642 Unlocking FileVault

56

23C3_1600 Biometrics in Science Fiction

57

23C3_1678 Kritik an den Illuminaten zwischen 1787 und 2006

58

23C3_1735 Faster PwninG Assured

59

23C3_1495 Mobile phone call encryption

60

23C3_1651 Überwachen und Strafen in Entenhausen

61

23C3_1710 Tap the Electronic Frontier Foundation

62

23C3_1713 Black Ops 2006 Viz Edition

63

23C3_1512 Homegrown Interactive Tables

64

23C3_1606 Console Hacking 2006

65

23C3_1608 Vehicular Communication and VANETs

66

23C3_1655 Elektronische Reisedokumente

67

23C3_1381 Stealth malware - can good guys win?

68

23C3_1540 To live outside the law you gotta be honest

69

23C3_1714 Warum wir uns so gerne überwachen lassen…

70

23C3_1740 In the Absence of Trust

71

23C3_1373 The Story of The Hacker Foundation

72

23C3_1576 RFID hacking

73

23C3_1629 Body hacking

74

23C3_1670 Barrierefreies Web

75

23C3_1500 Hackerspaces

76

23C3_1515 Lightning Talks Day 2

77

23C3_1597 A Hacker's Toolkit for RFID Emulation and Jamming

78

23C3_1667 Jabber-Showcase

79

23C3_1444 Tor and China

80

23C3_1446 Secure Network Server Programming on Unix

81

23C3_1554 Ethernet mit Mikrocontrollern

82

23C3_1658 How to implement bignum arithmetic

83

23C3_1492 Dying Giraffe Recordings: A non-evil recordlabel

84

23C3_1513 Detecting temperature through clock skew

85

23C3_1568 JSON RPC

86

23C3_1604 Tracking von Personen in Videoszenen

87

23C3_1420 Analysis of a strong Random Number Generator

88

23C3_1487 CCC Jahresrückblick

89

23C3_1700 Router and Infrastructure Hacking

90

23C3_1738 MMORPGs

91

23C3_1555 Konrad Zuse - Der rechnende Raum

92

23C3_1605 Digitale Bildforensik

93

23C3_1609 Data Retention Update

94

23C3_1709 Revenge of the Female Nerds

95

23C3_1543 Kollaboratives Wissensmanagement im Bildungsbereich

96

23C3_1596 Building an Open Source PKI using OpenXPKI

97

23C3_1724 Transparency and Privacy

98

23C3_1423 We don't trust voting computers

99

23C3_1603 Hacking a Country: FOSS in India

100

23C3_1663 Güter und Personen "tracken" - Lokalisierung im Pizzamann-Universum

101

23C3_1701 Open Source Machine Translation

102

23C3_1502 The gift of sharing

103

23C3_1578 Hacking fingerprint recognition systems

104

23C3_1692 Hacking the Electoral Law

105

23C3_1402 Drones

106

23C3_1419 Java wird Groovy

107

23C3_1439 Information Operations

108

23C3_1449 A not so smart card

109

23C3_1514 Lightning Talks Day 1

110

23C3_1523 The Rise and Fall of Open Source

111

23C3_1610 Fudging with Firmware

112

23C3_1611 Privacy, Identity, and Anonymity in Web 2.0

113

23C3_1461 The Grim Meathook Future

114

23C3_1505 Gäste-Überwachung in Hotels durch staatliche und private Schnüffler

115

23C3_1619 Introduction to matrix programming: trance codes

116

23C3_1736 Project Sputnik

117

23C3_1433 How To Design A Decent User Interface

118

23C3_1537 Know Your Citizens

119

23C3_1561 4+2+1 Jahre BigBrotherAwards Deutschland

120

23C3_1685 Go - Das Spiel für die Menschen

121

23C3_1607 A Probabilistic Trust Model for GnuPG

122

23C3_1656 Design and Implementation of an object-oriented, secure TCP/IP Stack

123

23C3_1680 Das neue gesetzliche Verbot des Hackings

124

23C3_1256 Who can you trust?