Quantcast
Channel: 25C3 Audio Recordings
Browsing latest articles
Browse All 93 View Live

25C3_3015 Rapid Prototype Your Life

The time is now to make anything you can imagine

View Article



25C3_3044 All your base(s) are belong to us

Dawn of the high-throughput DNA sequencing era

View Article

25C3_3020 Banking Malware 101

Overview of Current Keylogger Threats

View Article

25C3_2980 The Infinite Library

Storage and Access of Pornographic Information

View Article

25C3_2992 Tricks: makes you smile

A clever or ingenious device or expedient; adroit technique: the tricks of the trade.

View Article


25C3_2799 Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

View Article

25C3_3056 Fnord News Show (English interpretation)

We help in seeing teh Fnords

View Article

25C3_3016 Life is a Holodeck!

An overview of holographic techniques

View Article


25C3_2812 Fnord News Show

Wir helfen Euch, die Fnords zu sehen

View Article


25C3_2773 Soviet Unterzoegersdorf

A Nation In Transit

View Article

25C3_2872 The Privacy Workshop Project

Enhancing the value of privacy in todays students view

View Article

25C3_3047 Lightning Talks Day3 - Morning

4 minutes of fame

View Article

25C3_3007 Running your own GSM network

View Article


25C3_2975 Zehn Big Brother Awards in .at

Rückblick über eine bewegte Zeit

View Article

25C3_3041 eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent elections

View Article


25C3_2681 Repurposing the TI EZ430U

with msp430static, solder, and syringe

View Article

25C3_2873 Privacy in the social semantic web

Social networks based on XMPP

View Article


25C3_2860 Neusprech im Überwachungsstaat

Politikersprache zwischen Orwell und Online

View Article

25C3_2875 An introduction to new stream cipher designs

Turning data into line noise and back

View Article

25C3_3002 Squeezing Attack Traces

How to get useable information out of your honeypot

View Article

25C3_3032 Analyzing RFID Security

View Article


25C3_2874 The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

View Article


25C3_3000 Stormfucker: Owning the Storm Botnet

View Article

25C3_2937 DECT

The Digital Enhanced Cordless Telecommunications standard

View Article

25C3_2977 Security and anonymity vulnerabilities in Tor

Past, present, and future

View Article


25C3_2828 OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

View Article

25C3_2639 Attacking NFC mobile phones

First look at the security of NFC mobile phones

View Article

25C3_2596 SWF and the Malware Tragedy

Hide and Seek in A. Flash

View Article

25C3_3053 Lightning Talks Day3 - Evening

4 minutes of fame

View Article



25C3_2938 Methods for Understanding Targeted Attacks with Office Documents

View Article

25C3_2895 Der elektronische Personalausweis

Endlich wird jeder zum "Trusted Citizen"

View Article

25C3_2781 Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as we know it (and already have)

View Article

25C3_3052 Weizenbaum

Rebel at work

View Article


25C3_2816 Cisco IOS attack and defense

The State of the Art

View Article

25C3_3057 Hacker Jeopardy (English interpretation)

The ultimative Hacker-Quizshow

View Article

25C3_2958 Hacker Jeopardy

Die ultimative Hacker-Quizshow

View Article


25C3_3004 Why technology sucks

If technology is the solution, politicians are the problem

View Article


25C3_2973 Lightning Talks Day4

4 minutes of fame

View Article

25C3_2680 Not Soy Fast: Genetically Modified, Resource Greedy, and coming to...

The silent march of the multinational GMO soy industry and its growing power in South America, the EU, and around the World.

View Article

25C3_2791 La Quadrature du Net - Campaigning on Telecoms Package

Pan-european activism for patching a "pirated" law

View Article

25C3_2995 Predictable RNG in the vulnerable Debian OpenSSL package

the What and the How

View Article


25C3_2942 Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

View Article

25C3_2777 Crafting and Hacking: Separated at Birth

View Article


25C3_2916 Wikileaks

Wikileaks vs. the World

View Article

25C3_3023 MD5 considered harmful today

Creating a rogue CA Certificate

View Article


25C3_2899 Mining social contacts with active RFID

View Article

25C3_2952 Pflanzenhacken

Züchten 2.0

View Article

25C3_3058 Security Nightmares 2009 (English interpretation)

Or: about what we will laugh next year

View Article

25C3_3021 Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

View Article


25C3_2999 Closing Ceremony

View Article

Browsing latest articles
Browse All 93 View Live




Latest Images