#
Title
1

Krypta: DIY Serverhousing (23c3)

2

Nerds und Geeks zwischen Stereotyp und Subkultur (23c3)

3

Inside VMware (23c3)

4

Podjournalism (23c3)

5

TV-B-Gone (23c3)

6

Automated Botnet Detection and Mitigation (23c3)

7

Culture Jamming & Discordianism (23c3)

8

sFlow (23c3)

9

Lightning Talks Day 4 (23c3)

10

Software Reliability in Aerospace (23c3)

11

Fnord Jahresrückblick (23c3)

12

"We are great together, the liberal society and its enemies!" (23c3)

13

23C3 Network Review (23c3)

14

Security Nightmares 2007 (23c3)

15

Juristische Fragen um die Mitbenutzung fremder WLANs (23c3)

16

Chaos und Kritische Theorie (23c3)

17

CSRF, the Intranet and You (23c3)

18

Unusual bugs (23c3)

19

Closing Ceremony (23c3)

20

Ego Striptease - Ich zeig dir, wer du bist (23c3)

21

Virtuelle Sicherheit (23c3)

22

Schlossöffnung bei der Staatssicherheit der DDR (23c3)

23

OpenPCD / OpenPICC (23c3)

24

Sie haben das Recht zu schweigen (23c3)

25

Überwachungsdruck - einige Experimente (23c3)

26

Counter-Development (23c3)

27

Rootkits as Reversing Tools (23c3)

28

Freie Software - Eine Chance für Afrika? (23c3)

29

How to squeeze more performance out of your wifi (23c3)

30

Funkerspuk (23c3)

31

Advanced Attacks Against PocketPC Phones (23c3)

32

Powerpoint Karaoke (23c3)

33

Void the warranty! (23c3)

34

On Free, and the Differences between Culture and Code (23c3)

35

Fuzzing in the corporate world (23c3)

36

Security in the cardholder data processing?! (23c3)

37

Lightning Talks Day 3 (23c3)

38

Unlocking FileVault (23c3)

39

SIP Security (23c3)

40

Bluetooth Hacking Revisited (23c3)

41

Pornography and Technology (23c3)

42

Geschichte der Automaten, Androiden und Homunculi (23c3)

43

Nintendo DS (23c3)

44

An Introduction to Traffic Analysis (23c3)

45

Trust Your Eyes (23c3)

46

DVB-T - From Pixeldata to COFDM Transmission (23c3)

47

DRM comes to European digital TV (23c3)

48

Subverting AJAX (23c3)

49

Hacker Jeopardy (23c3)

50

The worst part of censorship is XXXXX (23c3)

51

A 10GE monitoring system (23c3)

52

A Natural Language Database Interface using Fuzzy Semantics (23c3)

53

Automated Exploit Detection in Binaries (23c3)

54

Software Protection and the TPM (23c3)

55

Mining Search Queries (23c3)

56

JSON RPC (23c3)

57

CCC Jahresrückblick (23c3)

58

Überwachen und Strafen in Entenhausen (23c3)

59

Secure Network Server Programming on Unix (23c3)

60

Homegrown Interactive Tables (23c3)

61

Dying Giraffe Recordings: A non-evil recordlabel (23c3)

62

Warum wir uns so gerne überwachen lassen… (23c3)

63

Jabber-Showcase (23c3)

64

Mobile phone call encryption (23c3)

65

Detecting temperature through clock skew (23c3)

66

Stealth malware - can good guys win? (23c3)

67

Black Ops 2006 Viz Edition (23c3)

68

Biometrics in Science Fiction (23c3)

69

How to implement bignum arithmetic (23c3)

70

To live outside the law you gotta be honest (23c3)

71

Console Hacking 2006 (23c3)

72

Tracking von Personen in Videoszenen (23c3)

73

Vehicular Communication and VANETs (23c3)

74

The Story of The Hacker Foundation (23c3)

75

Lightning Talks Day 2 (23c3)

76

Ethernet mit Mikrocontrollern (23c3)

77

Body hacking (23c3)

78

Router and Infrastructure Hacking (23c3)

79

MMORPGs (23c3)

80

Kritik an den Illuminaten zwischen 1787 und 2006 (23c3)

81

Elektronische Reisedokumente (23c3)

82

Barrierefreies Web (23c3)

83

Analysis of a strong Random Number Generator (23c3)

84

Hackerspaces (23c3)

85

In the Absence of Trust (23c3)

86

Faster PwninG Assured (23c3)

87

Tor and China (23c3)

88

RFID hacking (23c3)

89

Tap the Electronic Frontier Foundation (23c3)

90

A Hacker's Toolkit for RFID Emulation and Jamming (23c3)

91

Who can you trust? (23c3)

92

The Rise and Fall of Open Source (23c3)

93

Lightning Talks Day 1 (23c3)

94

Go - Das Spiel für die Menschen (23c3)

95

A Probabilistic Trust Model for GnuPG (23c3)

96

Project Sputnik (23c3)

97

Building an Open Source PKI using OpenXPKI (23c3)

98

Güter und Personen "tracken" - Lokalisierung im Pizzamann-Universum (23c3)

99

Design and Implementation of an object-oriented, secure TCP/IP Stack (23c3)

100

Konrad Zuse - Der rechnende Raum (23c3)

101

4+2+1 Jahre BigBrotherAwards Deutschland (23c3)

102

Introduction to matrix programming: trance codes (23c3)

103

Digitale Bildforensik (23c3)

104

Gäste-Überwachung in Hotels durch staatliche und private Schnüffler (23c3)

105

Revenge of the Female Nerds (23c3)

106

Hacking the Electoral Law (23c3)

107

Drones (23c3)

108

Hacking fingerprint recognition systems (23c3)

109

Kollaboratives Wissensmanagement im Bildungsbereich (23c3)

110

Know Your Citizens (23c3)

111

Data Retention Update (23c3)

112

The gift of sharing (23c3)

113

Fudging with Firmware (23c3)

114

The Grim Meathook Future (23c3)

115

How To Design A Decent User Interface (23c3)

116

Transparency and Privacy (23c3)

117

Das neue gesetzliche Verbot des Hackings (23c3)

118

We don't trust voting computers (23c3)

119

A not so smart card (23c3)

120

Open Source Machine Translation (23c3)

121

Privacy, Identity, and Anonymity in Web 2.0 (23c3)

122

Java wird Groovy (23c3)

123

Information Operations (23c3)

124

Hacking a Country: FOSS in India (23c3)