本站已收录 番号和无损神作磁力链接/BT种子 

30c3 Conference 2013

种子简介

种子名称: 30c3 Conference 2013
文件类型:
文件数目: 106个文件
文件大小: 34.14 GB
收录时间: 2015-7-31 14:27
已经下载: 3
资源热度: 81
最近下载: 2024-9-14 19:48

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:1406CAD195310579E1ECF1E2F0BD6A8CC0541607&dn=30c3 Conference 2013 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

30c3 Conference 2013.torrent
  • 30c3 keynote with Glenn Greenwald [30c3].mp41.05GB
  • Drones [30c3].mp41002.63MB
  • Thwarting Evil Maid Attacks [30c3].mp4982.21MB
  • The Exploration and Exploitation of an SD Memory Card [30c3].mp4922.53MB
  • X Security - It's worse than it looks [30c3].mp4885.14MB
  • Making machines that make [30c3].mp4849.63MB
  • Lightning Talks, Day 4 [30c3].mp4806.97MB
  • Baseband Exploitation in 2013 [30c3].mp4786.93MB
  • Hillbilly Tracking of Low Earth Orbit [30c3].mp4781.95MB
  • The Year in Crypto [30c3].mp4776.34MB
  • CounterStrike - Lawful Interception [30c3].mp4747.41MB
  • Lightning Talks, Day 3 [30c3].mp4736.18MB
  • Seeing The Secret State_ Six Landscapes [30c3].mp4733.36MB
  • Android DDI [30c3].mp4678.56MB
  • Even More Tamagotchis Were Harmed in the Making of this Presentation [30c3].mp4647.97MB
  • Bug class genocide [30c3].mp4642.8MB
  • Julian Assange_ Sysadmins of the world, unite! [30c3].mp4599.14MB
  • Lightning Talks, Day 2 [30c3].mp4516.91MB
  • An introduction to Firmware Analysis [30c3].mp4455.86MB
  • The Four Wars_ Terror, whistleblowers, drugs, internet [30c3].mp4448.44MB
  • Trezor_ Bitcoin hardware wallet [30c3].mp4381.62MB
  • Infrastructure Review - Presentation of MOC_NOC_VOC_SOC__OC [30c3].mp4361.84MB
  • We only have one earth [30c3].mp4350.68MB
  • Europe, the USA and Identity Ecosystems [30c3].mp4342.91MB
  • EUDataP_ State of the Union [30c3].mp4342.29MB
  • Calafou, postcapitalist ecoindustrial community [30c3].mp4339.22MB
  • Fast Internet-wide Scanning and its Security Applications [30c3].mp4332.99MB
  • Jacob Applebaum_ To Protect And Infect, Part 2 [30c3].mp4331.72MB
  • Magic Lantern - Free Software on Your Camera [30c3].mp4327.51MB
  • Desperately Seeking Susy [30c3].mp4326.04MB
  • Through a PRISM, Darkly - Everything we know about NSA spying [30c3].mp4323.77MB
  • Beyond the Tech_ Building Internet Freedom Tools for Real People [30c3].mp4322.02MB
  • Attacking HomeMatic [30c3].mp4315.3MB
  • Breaking Baryons [30c3].mp4315.25MB
  • Virtually Impossible_ The Reality Of Virtualization Security [30c3].mp4313.1MB
  • Hello World! How to make art after Snowden_ [30c3].mp4312.49MB
  • RFID Treehouse of Horror [30c3].mp4309.68MB
  • Forbidden Fruit [30c3].mp4309.47MB
  • Art of the Exploit_ An Introduction to Critical Engineering [30c3].mp4305.08MB
  • Reverse engineering the Wii U Gamepad [30c3].mp4298.94MB
  • Programming FPGAs with PSHDL - Let's create the Arduino for FPGAs [30c3].mp4298.44MB
  • The Gospel of IRMA [30c3].mp4296.57MB
  • Concepts for global TSCM - getting out of surveillance state mode [30c3].mp4294.99MB
  • Electronic Bank Robberies [30c3].mp4294.98MB
  • Towards an affordable brain-computer-interface [30c3].mp4294.11MB
  • Rock' em Graphic Cards - Introduction to Heterogeneous Parallel Programming [30c3].mp4294.08MB
  • FPGA 101 - Making awesome stuff with FPGAs [30c3].mp4291.38MB
  • Monitoring the Spectrum_ Building Your Own Distributed RF Scanner Array [30c3].mp4281.15MB
  • Revisiting _Trusting Trust_ for binary toolchains [30c3].mp4279.09MB
  • The Tor Network [30c3] (with Jacob Applebaum).mp4278.05MB
  • White-Box Cryptography [30c3].mp4276.12MB
  • Introduction to Processor Design [30c3].mp4274.87MB
  • Toward a Cognitive _Quantified Self_ - Activity Recognition for the Mind [30c3].mp4273.03MB
  • WarGames in memory [30c3].mp4270.89MB
  • THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE [30c3].mp4265.43MB
  • Do You Think That's Funny_ - Art Practice under the Regime of Anti-Terror Legislation [30c3].mp4263.78MB
  • India's Surveillance State [30c3].mp4262.31MB
  • How to Build a Mind - Artificial Intelligence Reloaded [30c3].mp4260.94MB
  • Script Your Car! [30c3].mp4256.99MB
  • No Neutral Ground in a Burning World [30c3].mp4254.04MB
  • Triggering Deep Vulnerabilities Using Symbolic Execution [30c3].mp4242.99MB
  • Basics of Digital Wireless Communication [30c3].mp4236.3MB
  • HbbTV Security [30c3].mp4236.27MB
  • 10 Years of Fun with Embedded Devices [30c3].mp4232.17MB
  • Firmware Fat Camp [30c3].mp4232.08MB
  • Backdoors, Government Hacking and The Next Crypto Wars [30c3].mp4227.73MB
  • Hacking the Czech Parliament via SMS [30c3].mp4223.27MB
  • Disclosure DOs, Disclosure DON'Ts [30c3].mp4220.59MB
  • ID Cards in China_ Your Worst Nightmare [30c3].mp4215.85MB
  • Extracting keys from FPGAs, OTP Tokens and Door Locks [30c3].mp4214.72MB
  • Hardening hardware and choosing a #goodBIOS [30c3].mp4214.22MB
  • Policing the Romantic Crowd [30c3].mp4205.66MB
  • The GNU Name System [30c3].mp4203.84MB
  • World War II Hackers [30c3].mp4202.48MB
  • Mobile network attack evolution [30c3].mp4201.81MB
  • Console Hacking 2013_ WiiU [30c3].mp4195.97MB
  • My journey into FM-RDS [30c3].mp4191.57MB
  • Turing Complete User [30c3].mp4191.49MB
  • Reverse engineering of CHIASMUS from GSTOOL [30c3].mp4189.59MB
  • #SOPA, #NSA, and the New Internet _Lobby_ [30c3].mp4185.52MB
  • Open source experimental incubator build up [30c3].mp4181.92MB
  • Y U NO ISP, taking back the Net [30c3].mp4175.76MB
  • Long Distance Quantum Communication [30c3].mp4174.26MB
  • Coding your body [30c3].mp4173.72MB
  • Nerds in the news [30c3].mp4169.75MB
  • Building a safe NFC ticketing system [30c3].mp4169.31MB
  • Structuring open hardware projects [30c3].mp4168.91MB
  • Perfect Paul - On Freedom of Facial Expression [30c3].mp4166.9MB
  • Hacking as Artistic Practice [30c3].mp4162.72MB
  • Against Metadata [30c3].mp4160.32MB
  • lasers in space - more than just pew pew! [30c3].mp4158.37MB
  • The Pirate Cinema [30c3].mp4158.09MB
  • SCADA StrangeLove 2 [30c3].mp4155.97MB
  • Human Rights and Technology [30c3].mp4148.97MB
  • The ArduGuitar_ An Ardunio Powered Electric Guitar [30c3].mp4148.5MB
  • The good, the bad, and the ugly - Linux Kernel patches [30c3].mp4146.42MB
  • Data Mining for Good [30c3].mp4139.22MB
  • The philosophy of hacking [30c3].mp4135.57MB
  • Plants & Machines_ Food replicating Robots from Open Source Technologies [30c3].mp4131.21MB
  • Technomonopolies [30c3].mp4129.93MB
  • Opening Event [30c3] mit Tim Pritlove.mp463.13MB
  • Anonymity and Privacy in Public Space and on the Internet [30c3].mp458.51MB
  • Google Glass Hacks [30c3].mp454.94MB
  • Security of the IC Backside [30c3].mp453.71MB
  • Chelsea Manning_ 07KINGSTON25 JAMAICA_ MALARIA UPDATE Dispatches from Fort Meade [30c3].mp452.83MB
  • Hardware Attacks, Advanced ARM Exploitation, and Android Hacking [30c3].mp452.06MB