种子简介
种子名称:
30c3 Conference 2013
文件类型:
文件数目:
106个文件
文件大小:
34.14 GB
收录时间:
2015-7-31 14:27
已经下载:
3次
资源热度:
96
最近下载:
2024-12-27 00:42
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:1406CAD195310579E1ECF1E2F0BD6A8CC0541607&dn=30c3 Conference 2013
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
30c3 Conference 2013.torrent
30c3 keynote with Glenn Greenwald [30c3].mp41.05GB
Drones [30c3].mp41002.63MB
Thwarting Evil Maid Attacks [30c3].mp4982.21MB
The Exploration and Exploitation of an SD Memory Card [30c3].mp4922.53MB
X Security - It's worse than it looks [30c3].mp4885.14MB
Making machines that make [30c3].mp4849.63MB
Lightning Talks, Day 4 [30c3].mp4806.97MB
Baseband Exploitation in 2013 [30c3].mp4786.93MB
Hillbilly Tracking of Low Earth Orbit [30c3].mp4781.95MB
The Year in Crypto [30c3].mp4776.34MB
CounterStrike - Lawful Interception [30c3].mp4747.41MB
Lightning Talks, Day 3 [30c3].mp4736.18MB
Seeing The Secret State_ Six Landscapes [30c3].mp4733.36MB
Android DDI [30c3].mp4678.56MB
Even More Tamagotchis Were Harmed in the Making of this Presentation [30c3].mp4647.97MB
Bug class genocide [30c3].mp4642.8MB
Julian Assange_ Sysadmins of the world, unite! [30c3].mp4599.14MB
Lightning Talks, Day 2 [30c3].mp4516.91MB
An introduction to Firmware Analysis [30c3].mp4455.86MB
The Four Wars_ Terror, whistleblowers, drugs, internet [30c3].mp4448.44MB
Trezor_ Bitcoin hardware wallet [30c3].mp4381.62MB
Infrastructure Review - Presentation of MOC_NOC_VOC_SOC__OC [30c3].mp4361.84MB
We only have one earth [30c3].mp4350.68MB
Europe, the USA and Identity Ecosystems [30c3].mp4342.91MB
EUDataP_ State of the Union [30c3].mp4342.29MB
Calafou, postcapitalist ecoindustrial community [30c3].mp4339.22MB
Fast Internet-wide Scanning and its Security Applications [30c3].mp4332.99MB
Jacob Applebaum_ To Protect And Infect, Part 2 [30c3].mp4331.72MB
Magic Lantern - Free Software on Your Camera [30c3].mp4327.51MB
Desperately Seeking Susy [30c3].mp4326.04MB
Through a PRISM, Darkly - Everything we know about NSA spying [30c3].mp4323.77MB
Beyond the Tech_ Building Internet Freedom Tools for Real People [30c3].mp4322.02MB
Attacking HomeMatic [30c3].mp4315.3MB
Breaking Baryons [30c3].mp4315.25MB
Virtually Impossible_ The Reality Of Virtualization Security [30c3].mp4313.1MB
Hello World! How to make art after Snowden_ [30c3].mp4312.49MB
RFID Treehouse of Horror [30c3].mp4309.68MB
Forbidden Fruit [30c3].mp4309.47MB
Art of the Exploit_ An Introduction to Critical Engineering [30c3].mp4305.08MB
Reverse engineering the Wii U Gamepad [30c3].mp4298.94MB
Programming FPGAs with PSHDL - Let's create the Arduino for FPGAs [30c3].mp4298.44MB
The Gospel of IRMA [30c3].mp4296.57MB
Concepts for global TSCM - getting out of surveillance state mode [30c3].mp4294.99MB
Electronic Bank Robberies [30c3].mp4294.98MB
Towards an affordable brain-computer-interface [30c3].mp4294.11MB
Rock' em Graphic Cards - Introduction to Heterogeneous Parallel Programming [30c3].mp4294.08MB
FPGA 101 - Making awesome stuff with FPGAs [30c3].mp4291.38MB
Monitoring the Spectrum_ Building Your Own Distributed RF Scanner Array [30c3].mp4281.15MB
Revisiting _Trusting Trust_ for binary toolchains [30c3].mp4279.09MB
The Tor Network [30c3] (with Jacob Applebaum).mp4278.05MB
White-Box Cryptography [30c3].mp4276.12MB
Introduction to Processor Design [30c3].mp4274.87MB
Toward a Cognitive _Quantified Self_ - Activity Recognition for the Mind [30c3].mp4273.03MB
WarGames in memory [30c3].mp4270.89MB
THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE [30c3].mp4265.43MB
Do You Think That's Funny_ - Art Practice under the Regime of Anti-Terror Legislation [30c3].mp4263.78MB
India's Surveillance State [30c3].mp4262.31MB
How to Build a Mind - Artificial Intelligence Reloaded [30c3].mp4260.94MB
Script Your Car! [30c3].mp4256.99MB
No Neutral Ground in a Burning World [30c3].mp4254.04MB
Triggering Deep Vulnerabilities Using Symbolic Execution [30c3].mp4242.99MB
Basics of Digital Wireless Communication [30c3].mp4236.3MB
HbbTV Security [30c3].mp4236.27MB
10 Years of Fun with Embedded Devices [30c3].mp4232.17MB
Firmware Fat Camp [30c3].mp4232.08MB
Backdoors, Government Hacking and The Next Crypto Wars [30c3].mp4227.73MB
Hacking the Czech Parliament via SMS [30c3].mp4223.27MB
Disclosure DOs, Disclosure DON'Ts [30c3].mp4220.59MB
ID Cards in China_ Your Worst Nightmare [30c3].mp4215.85MB
Extracting keys from FPGAs, OTP Tokens and Door Locks [30c3].mp4214.72MB
Hardening hardware and choosing a #goodBIOS [30c3].mp4214.22MB
Policing the Romantic Crowd [30c3].mp4205.66MB
The GNU Name System [30c3].mp4203.84MB
World War II Hackers [30c3].mp4202.48MB
Mobile network attack evolution [30c3].mp4201.81MB
Console Hacking 2013_ WiiU [30c3].mp4195.97MB
My journey into FM-RDS [30c3].mp4191.57MB
Turing Complete User [30c3].mp4191.49MB
Reverse engineering of CHIASMUS from GSTOOL [30c3].mp4189.59MB
#SOPA, #NSA, and the New Internet _Lobby_ [30c3].mp4185.52MB
Open source experimental incubator build up [30c3].mp4181.92MB
Y U NO ISP, taking back the Net [30c3].mp4175.76MB
Long Distance Quantum Communication [30c3].mp4174.26MB
Coding your body [30c3].mp4173.72MB
Nerds in the news [30c3].mp4169.75MB
Building a safe NFC ticketing system [30c3].mp4169.31MB
Structuring open hardware projects [30c3].mp4168.91MB
Perfect Paul - On Freedom of Facial Expression [30c3].mp4166.9MB
Hacking as Artistic Practice [30c3].mp4162.72MB
Against Metadata [30c3].mp4160.32MB
lasers in space - more than just pew pew! [30c3].mp4158.37MB
The Pirate Cinema [30c3].mp4158.09MB
SCADA StrangeLove 2 [30c3].mp4155.97MB
Human Rights and Technology [30c3].mp4148.97MB
The ArduGuitar_ An Ardunio Powered Electric Guitar [30c3].mp4148.5MB
The good, the bad, and the ugly - Linux Kernel patches [30c3].mp4146.42MB
Data Mining for Good [30c3].mp4139.22MB
The philosophy of hacking [30c3].mp4135.57MB
Plants & Machines_ Food replicating Robots from Open Source Technologies [30c3].mp4131.21MB
Technomonopolies [30c3].mp4129.93MB
Opening Event [30c3] mit Tim Pritlove.mp463.13MB
Anonymity and Privacy in Public Space and on the Internet [30c3].mp458.51MB
Google Glass Hacks [30c3].mp454.94MB
Security of the IC Backside [30c3].mp453.71MB
Chelsea Manning_ 07KINGSTON25 JAMAICA_ MALARIA UPDATE Dispatches from Fort Meade [30c3].mp452.83MB
Hardware Attacks, Advanced ARM Exploitation, and Android Hacking [30c3].mp452.06MB