Index of /events/HAR/


../
timelapse/                                         12-May-2012 03:01                   -
197_l3132_quantum_cryptography_an_introduction.mp4 12-May-2012 02:55           248106548
243_l_Opening_ceremony.mp4                         12-May-2012 02:57            53156475
244_l3083_Wikileaks.mp4                            12-May-2012 02:59           244629742
245_l5329_The_Future_of_Science.mp4                12-May-2012 02:50           422001182
246_l3218_Anonymous_Vs_Scientology.mp4             12-May-2012 02:59           254156341
247_l2931_Electrical_enginering_with_freelibre_..> 12-May-2012 02:50           232159246
248_l3320_Teh_Internetz_are_pwned.mp4              12-May-2012 02:56           263061795
249_l2758_Rootkits_are_awesome.mp4                 12-May-2012 02:56           218337246
251_l3610_The_Complex_Ethics_of_Piracy.mp4         12-May-2012 02:51           286056122
252_The_Censoring_Mob.mp4                          12-May-2012 02:58           260782428
254_l_Policy_hacking.mp4                           12-May-2012 02:50           265457836
255_Flipping_the_Phishing_Con_Game_-_Design_and..> 12-May-2012 02:57           213352896
257_l_Design_and_Build_a_2_MeV_Cyclotron.mp4       12-May-2012 03:01           219044217
257_part2_Design_and_Build_a_2_MeV_Cyclotron.mp4   12-May-2012 02:59            55969059
257_part3_Design_and_Build_a_2_MeV_Cyclotron.mp4   12-May-2012 02:50            21222579
259_l2932_Advanced_MySQL_Exploitation.mp4          12-May-2012 02:57           232166379
260_i2827_Securing_networks_from_an_ISP_perspec..> 12-May-2012 02:57           223700743
261_l1892_(Un)limited_design.mp4                   12-May-2012 02:57           149925988
262_l1892_Protheses_for_50_instead_of_250000.mp4   12-May-2012 02:57           149925988
265_l2198_Programming_the_cloud.mp4                12-May-2012 02:57           174110329
266_l2042_Countering_behavior_based_malware_ana..> 12-May-2012 02:51           161722088
267_l_The_ZeuS_evolution.mp4                       12-May-2012 02:54           256435065
268_l2208_Runtime_Kernel_Patching_on_Mac_OS_X.mp4  12-May-2012 02:57           174855694
269_l1367_Bits_Of_Freedom.mp4                      12-May-2012 02:50           114100101
270_l2714_coreboot.mp4                             12-May-2012 02:56           215048370
271_l3177_View_from_the_orbit.mp4                  12-May-2012 02:57           251611741
272_l2973_A_hackers_guide_to_surviving_in_the_c..> 12-May-2012 02:59           235467434
273_l3470_Classic_Mistakes.mp4                     12-May-2012 02:50           274884995
274_l2810_Hacking_Mona_Lisa.mp4                    12-May-2012 02:50           222620404
277_l4005_Panel_discussion_with_Brein_MPAA_and_..> 12-May-2012 02:50           317081635
279_l3132_Eavesdropping_on_quantum_cryptosystem..> 12-May-2012 02:52           248106548
280_l3604_Futureshock_do_not_panic.mp4             12-May-2012 02:53           285467065
281_l4796_The_Super_Awesome_Cartoon_Quizz_2009.mp4 12-May-2012 02:59           379713934
282_l7121_Lightning_talks_Friday.mp4               12-May-2012 02:54           578045368
283_l2572_Analog_circuit_design.mp4                12-May-2012 02:57           208872017
284_l3638_Developing_embedded_devices_using_ope..> 12-May-2012 02:50           295365286
286_l2723_First_woman_on_native_IPv6_and_other_..> 12-May-2012 02:55           220972331
287_l2416_The_dangers_and_merits__of_carrier_gr..> 12-May-2012 02:50           196182999
288_l3530_When_nerds_dream_big.mp4                 12-May-2012 02:52           286600058
289_l3178_Why_Tor_is_slow.mp4                      12-May-2012 02:53           257934543
290_l2569_Practical_Attacks_Against_Authorship_..> 12-May-2012 02:57           208611603
291_l2535_The_IBM_AS400.mp4                        12-May-2012 02:52           200772971
292_l2978_Java_Card.mp4                            12-May-2012 02:55           235884893
293_l3243_All_Your_Packets_Are_Belong_to_Us.mp4    12-May-2012 02:59           256826438
294_l3929_DNS_Security_In_The_Broadest_Sense.mp4   12-May-2012 02:50           311197650
295_l1129_Government_and_trust_part1.mp4           12-May-2012 02:50            89468491
295_l1593_Government_and_trust_part2.mp4           12-May-2012 02:59           126202725
296_l2894_TEMPEST_for_the_casual_election_hacke..> 12-May-2012 02:58           229242823
297_l3918_WebAppInSec_101_threats.mp4              12-May-2012 02:59           310307189
298_i3578_x509_is_considered_harmful.mp4           12-May-2012 02:54           283409792
299_l1953_Identity_processes.mp4                   12-May-2012 02:57           154689462
303_l4613_Wikileaks_Panel.mp4                      12-May-2012 02:59           374518093
305_l3488_Breaking_Hitag2.mp4                      12-May-2012 02:57           276324324
306_l2784_How_we_break_into_domains.mp4            12-May-2012 02:56           220534299
308_l3627_OpenBSC.mp4                              12-May-2012 02:57           287252759
309_l3447_Airprobe.mp4                             12-May-2012 02:54           273104111
310_l2678_Cracking_A5_GSM_encryption.mp4           12-May-2012 02:54           212582767
311_l2937_Surveillance_Self-Defense.mp4            12-May-2012 02:55           232569058
313_l7292_Hacker_Jeopardy.mp4                      12-May-2012 02:51           577507214
315_l2735_Foundry_CAM_hacking.mp4                  12-May-2012 02:56           222057486
317_l2893_WokTheWob_FOIA_for_open_source.mp4       12-May-2012 02:52           234898199
318_l3643_The_power_of_decentralization.mp4        12-May-2012 02:59           296086456
319_l3255_Your_Mind_Legal_Status_Rights_and_Sec..> 12-May-2012 02:55           264278750
321_l3156_Unusual_lock_picking.mp4                 12-May-2012 02:52           256256127
322_l3132_Deep_Silicon_Analysis.mp4                12-May-2012 02:59           248063942
322_l3383_Lockpicking.mp4                          12-May-2012 02:51           274577396
323_l5795_Exploiting_Native_Client.mp4             12-May-2012 02:52           459139184
324_l3048_Becoming_government_2_0.mp4              12-May-2012 02:51           241419646
325_l3341_Side_channel_analysis_on_embedded_sys..> 12-May-2012 02:55           264594156
326_l2589_Locally_Exploiting_Wireless_Sensors.mp4  12-May-2012 02:58           210209043
326_l3101_How_to_use_quantum_cryptography_for_s..> 12-May-2012 02:59           245854222
327_l2000_Anti-Counterfeiting_Trade_Agreement.mp4  12-May-2012 02:53           158403020
328_l3406_Statistics_and_the_Law.mp4               12-May-2012 02:53           269789821
329_l2898_Life_or_Death_Cryptology.mp4             12-May-2012 02:50           229501308
330_l2846_Why_did_Germany_pull_the_plug_on_e-vo..> 12-May-2012 02:55           225446758
331_l3053_Public_transport_SMS_ticket_hacking.mp4  12-May-2012 02:54           241867296
334_l2743_wikileaks_followup.mp4                   12-May-2012 02:50           217348916
339_l2347_Realizing_the_RFID_Guardian.mp4          12-May-2012 02:54           185978123
340_l3077_My_BREIN_hurts.mp4                       12-May-2012 02:52           243772521
341_l1688_HAR_Network_Overview.mp4                 12-May-2012 02:50           133574859
342_l3082_Closing_Ceremony.mp4                     12-May-2012 02:53           244345994
343_l3879_MinixWall.mp4                            12-May-2012 02:56           314906791
345_l3580_Sniffing_cable_modems.mp4                12-May-2012 02:54           290625395
346_l2321_An_empirical_study_of_division_of_lab..> 12-May-2012 02:52           183814974
347_l4650_Hackerspaces_Everywhere.mp4              12-May-2012 02:54           368105518
348_l3588_Organising_a_Con.mp4                     12-May-2012 02:51           284216726
hacking_the_human.mp4                              12-May-2012 02:54           260590333