Parent directory/ | - | - |
047 Datamining the NSA.pdf | 28.4 KiB | 2005-06-27 18:49:25 |
163 SPAM Workshop.pdf | 43.9 KiB | 2005-06-27 18:57:59 |
052 Die Ueblichen Verdaechtigen.pdf | 47.0 KiB | 2005-06-27 18:34:01 |
253 Pixels want to be many.pdf | 49.0 KiB | 2005-06-27 18:57:53 |
072 The Reality of Network Address Translators.pdf | 63.9 KiB | 2005-06-27 19:00:05 |
053 Enforcing the GNU GPL.pdf | 77.1 KiB | 2005-06-27 18:35:44 |
122 Enforcement of Intellectual Property Rights under German Private Law.pdf | 78.1 KiB | 2005-10-22 14:11:18 |
113 Automated Hacking via Google.pdf | 78.4 KiB | 2005-06-27 18:42:00 |
135 Voting Machine Technology.pdf | 82.9 KiB | 2005-06-27 18:57:30 |
100 Anonymous communications.pdf | 83.5 KiB | 2005-06-27 18:49:17 |
289 Mixing VJing and Post-Production.pdf | 85.7 KiB | 2005-06-27 18:49:18 |
015 Sicherheit bei VoIP-Systemen.pdf | 87.6 KiB | 2005-06-27 18:57:32 |
095 Security Nightmares 2005.pdf | 87.9 KiB | 2005-06-27 19:01:27 |
101 XMPP - Jabber.pdf | 92.2 KiB | 2005-06-27 18:35:39 |
129 Die Propagandawueste des realen Krieges.pdf | 94.1 KiB | 2005-06-27 18:43:30 |
041 Einfuehrung in Kryptographische Methoden.pdf | 97.6 KiB | 2005-06-27 18:35:40 |
055 CCC-Jahresrueckblick.pdf | 98.7 KiB | 2005-06-27 18:44:56 |
127 Security Frameworks.pdf | 102.6 KiB | 2005-06-27 18:57:26 |
313 Biometrie als datenschutzrechtliches Problem.pdf | 104.9 KiB | 2005-06-27 19:01:27 |
067 Inside PDF.pdf | 115.4 KiB | 2005-06-27 18:35:43 |
057 SUN Bloody Daft Solaris Mechanisms.pdf | 115.9 KiB | 2005-06-27 18:50:26 |
134 Secure Instant Messaging.pdf | 120.7 KiB | 2005-06-27 18:58:53 |
244 High Speed Computing with FPGAs.pdf | 141.3 KiB | 2005-06-27 18:51:13 |
274 Praktische Anleitung zum Bau eines Radiosenders.pdf | 143.3 KiB | 2005-06-27 18:51:17 |
117 Kampagne Fair Sharing.pdf | 146.6 KiB | 2005-06-27 18:51:11 |
120 Softwarepatente - Ruestzeug zur Debatte.pdf | 149.2 KiB | 2005-06-27 18:46:27 |
308 MD5 To Be Considered Harmful Someday.pdf | 153.7 KiB | 2005-06-27 18:58:31 |
011 xDash.pdf | 165.0 KiB | 2005-06-27 18:58:01 |
218 Practical MacOS X Insecurities.pdf | 166.8 KiB | 2005-06-27 18:59:14 |
042 Cored Programming.pdf | 196.2 KiB | 2005-06-27 18:44:50 |
056 LiberTOS.pdf | 196.8 KiB | 2005-06-27 18:36:38 |
123 Gentoo Hardened.pdf | 197.1 KiB | 2005-06-27 18:49:27 |
278 TKUeV-Das Ohr am Draht.pdf | 201.7 KiB | 2005-06-27 18:58:35 |
110 Applied Data Mining.pdf | 218.6 KiB | 2005-06-27 18:41:48 |
111 The Kernel Accelerator Device.pdf | 223.6 KiB | 2005-06-27 18:57:37 |
098 Portable Software-Installation with pkg source.pdf | 261.5 KiB | 2005-06-27 18:40:46 |
099 GPL fuer Anfaenger.pdf | 268.7 KiB | 2005-06-27 18:36:34 |
131 Learning OpenPGP by Example.pdf | 287.7 KiB | 2005-06-27 18:47:08 |
317 Unsicherheit von Personal Firewalls.pdf | 289.2 KiB | 2005-06-27 18:35:27 |
316 Bericht von den BigBrotherAwards.pdf | 293.2 KiB | 2005-06-27 18:46:23 |
107 Embedded Devices as an attack vector.pdf | 297.9 KiB | 2005-06-27 19:00:04 |
027 Biometrie in Ausweisdokumenten.pdf | 335.4 KiB | 2005-06-27 18:36:26 |
060 Digital Prosthetics.pdf | 341.1 KiB | 2005-06-27 18:40:26 |
066 Bluetooth Hacking.pdf | 353.6 KiB | 2005-06-27 18:49:20 |
306 Ruby.pdf | 365.8 KiB | 2005-06-27 18:44:09 |
114 Der 2. Korb der Urheberrechtsnovelle.pdf | 380.2 KiB | 2005-06-27 18:42:04 |
078 Aspects of Elliptic Curve Cryptography.pdf | 415.6 KiB | 2005-06-27 18:36:30 |
272 Sicherheitsmanagement.pdf | 476.0 KiB | 2005-06-27 18:51:07 |
049 Zufallszahlengeneratoren.pdf | 485.4 KiB | 2005-06-27 18:37:01 |
159 State of Emergent Democracy.pdf | 486.0 KiB | 2005-06-27 18:50:23 |
014 Feuriges Hacken.pdf | 496.7 KiB | 2005-06-27 18:50:57 |
273 Crashkurs Mathematik am Beispiel Biometrie.pdf | 566.3 KiB | 2005-06-27 18:59:38 |
038 Free Software Usage in South America.pdf | 568.8 KiB | 2005-06-27 18:45:02 |
045 Internet Censorship in China.pdf | 574.6 KiB | 2005-06-27 18:52:11 |
315 Fight for your Right to Fileshare.pdf | 637.2 KiB | 2005-06-27 18:48:41 |
250 Lightning Talk-NetBSD Status Report.pdf | 651.4 KiB | 2005-06-27 18:57:10 |
146 Mehr Sicherheit fuer HostAP-WLANs.pdf | 656.1 KiB | 2005-06-27 18:44:04 |
026 SAP R3 Protocol Reverse Engineering.pdf | 658.9 KiB | 2005-06-27 18:36:15 |
105 Honeypot Forensics.pdf | 668.5 KiB | 2005-10-22 16:20:41 |
213 Haskell.pdf | 681.1 KiB | 2005-06-27 18:36:23 |
019 Verdeckte Netzwerkanalyse.pdf | 712.0 KiB | 2005-06-27 19:00:57 |
115 The Fiasco Kernel.pdf | 742.0 KiB | 2005-06-27 18:37:08 |
062 Hacking EU funding for a FOSS project.pdf | 756.2 KiB | 2005-06-27 18:36:09 |
277 Das Programmiersystem Forth.pdf | 759.1 KiB | 2005-06-27 18:40:23 |
016 Phishing the Web.pdf | 762.6 KiB | 2005-06-27 18:44:16 |
037 GNOME Anwendungsentwicklung.pdf | 817.2 KiB | 2005-06-27 18:52:27 |
246 RFID Technologie und Implikationen.pdf | 866.4 KiB | 2005-06-27 18:44:47 |
051 Recent features to OpenBSD-ntpd and bgpd.pdf | 898.0 KiB | 2005-06-27 18:50:06 |
165 Softwarepatente - Der Tag danach.pdf | 905.1 KiB | 2005-06-27 18:47:35 |
097 Das Literarische Code-Quartett.pdf | 911.8 KiB | 2005-06-27 18:45:34 |
214 Kryptographie in Theorie und Praxis.pdf | 913.5 KiB | 2005-10-22 16:58:01 |
080 USB-Unbekannter Serieller Bus.pdf | 972.6 KiB | 2005-06-27 18:54:32 |
023 Ciphire Mail.pdf | 984.5 KiB | 2005-06-27 18:50:19 |
039 Squeak and Croquet.pdf | 989.6 KiB | 2005-06-27 18:53:19 |
017 Next Generation Peer to Peer Systems.pdf | 1012.3 KiB | 2005-06-27 18:58:50 |
187 Einfuehrung in die Rastersondenmikroskopie.pdf | 1.0 MiB | 2005-06-27 18:54:43 |
064 Trusted Computing.pdf | 1.0 MiB | 2005-06-27 18:47:18 |
242 Weird Programming 1.pdf | 1.1 MiB | 2005-06-27 18:35:38 |
013 The Art of Fingerprinting.pdf | 1.1 MiB | 2005-06-27 19:01:39 |
058 The Blinking Suspects.pdf | 1.1 MiB | 2005-06-27 18:38:48 |
046 Tollcollect.pdf | 1.1 MiB | 2005-06-27 18:57:21 |
068 NOC Overview.pdf | 1.2 MiB | 2005-06-27 18:34:52 |
255 Pixels want to talk.pdf | 1.2 MiB | 2005-06-27 18:47:04 |
065 Grundlagen des Compilerdesign.pdf | 1.2 MiB | 2005-06-27 18:41:59 |
109 Anti-Honeypot Techniques.pdf | 1.3 MiB | 2005-06-27 18:54:04 |
083 Quanteninformationstheorie fuer Nicht Physiker.pdf | 1.3 MiB | 2005-06-27 19:01:09 |
063 Edit This Page.pdf | 1.3 MiB | 2005-10-22 01:41:00 |
176 Passive covert channels in the Linux kernel.pdf | 1.5 MiB | 2005-06-27 18:47:48 |
081 Quantenmechanik fuer Nicht Physiker.pdf | 1.5 MiB | 2005-06-27 18:56:29 |
151 Side Channel Analysis of Smart Cards.pdf | 1.5 MiB | 2005-10-22 19:20:32 |
118 Verified Fiasco.pdf | 1.6 MiB | 2005-06-27 18:40:06 |
130 Physical Security.pdf | 1.6 MiB | 2005-06-27 18:51:32 |
208 GameCube Hacking.pdf | 1.7 MiB | 2005-10-22 14:42:16 |
216 Hacking The Genome.pdf | 1.7 MiB | 2005-06-27 18:41:02 |
207 Amateurfunk.pdf | 1.7 MiB | 2005-06-27 19:01:26 |
168 Spampolitik.pdf | 1.7 MiB | 2005-06-27 18:59:13 |
126 Apache Security.pdf | 1.8 MiB | 2005-06-27 18:57:53 |
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf | 1.9 MiB | 2005-06-27 18:36:02 |
040 Firewall Piercing.pdf | 1.9 MiB | 2005-06-27 18:59:32 |
158 How to find anything on the web.pdf | 2.1 MiB | 2005-06-27 19:00:01 |
077 Weird Programming 2.pdf | 2.2 MiB | 2005-06-27 18:46:19 |
178 Humanoid Robots.pdf | 2.5 MiB | 2005-06-27 18:44:38 |
136 Hacking Linux-Powered Devices.pdf | 2.6 MiB | 2005-06-27 18:45:26 |
012 Natural Language Steganography.pdf | 2.6 MiB | 2005-06-27 18:49:06 |
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf | 2.7 MiB | 2005-06-27 18:58:28 |
079 AVG aint vector graphics.pdf | 3.0 MiB | 2005-06-27 18:50:53 |
059 Wikipedia Sociographics.pdf | 3.0 MiB | 2005-06-27 18:38:37 |
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf | 3.1 MiB | 2005-06-27 18:43:28 |
271 Hidden Data in Internet Published Documents.pdf | 3.2 MiB | 2005-06-27 18:35:23 |
029 Robocup.pdf | 3.2 MiB | 2005-06-27 18:43:59 |
183 Tor.pdf | 3.3 MiB | 2005-06-27 18:49:56 |
153 Suchmaschinenpolitik.pdf | 3.3 MiB | 2005-06-27 18:34:41 |
070 Fnord-Jahresrueckblick.pdf | 3.4 MiB | 2005-06-27 18:57:04 |
310 Information-Wissen-Macht.pdf | 3.7 MiB | 2005-10-22 16:44:19 |
121 Black Ops of DNS.pdf | 3.7 MiB | 2005-06-27 18:55:27 |
044 Machine Learning in Science and Engineering.pdf | 4.3 MiB | 2005-06-27 18:39:42 |
125 Old Skewl Hacking Infra Red.pdf | 4.9 MiB | 2005-06-27 19:00:48 |