30c3 Conference 2013
|
2015-7-31 14:27
|
2025-1-26 11:20
|
99
|
34.14 GB
|
106
|
- 30c3 keynote with Glenn Greenwald [30c3].mp41.05GB
- Drones [30c3].mp41002.63MB
- Thwarting Evil Maid Attacks [30c3].mp4982.21MB
- The Exploration and Exploitation of an SD Memory Card [30c3].mp4922.53MB
- X Security - It's worse than it looks [30c3].mp4885.14MB
- Making machines that make [30c3].mp4849.63MB
- Lightning Talks, Day 4 [30c3].mp4806.97MB
- Baseband Exploitation in 2013 [30c3].mp4786.93MB
- Hillbilly Tracking of Low Earth Orbit [30c3].mp4781.95MB
- The Year in Crypto [30c3].mp4776.34MB
- CounterStrike - Lawful Interception [30c3].mp4747.41MB
- Lightning Talks, Day 3 [30c3].mp4736.18MB
- Seeing The Secret State_ Six Landscapes [30c3].mp4733.36MB
- Android DDI [30c3].mp4678.56MB
- Even More Tamagotchis Were Harmed in the Making of this Presentation [30c3].mp4647.97MB
- Bug class genocide [30c3].mp4642.8MB
- Julian Assange_ Sysadmins of the world, unite! [30c3].mp4599.14MB
- Lightning Talks, Day 2 [30c3].mp4516.91MB
- An introduction to Firmware Analysis [30c3].mp4455.86MB
- The Four Wars_ Terror, whistleblowers, drugs, internet [30c3].mp4448.44MB
- Trezor_ Bitcoin hardware wallet [30c3].mp4381.62MB
- Infrastructure Review - Presentation of MOC_NOC_VOC_SOC__OC [30c3].mp4361.84MB
- We only have one earth [30c3].mp4350.68MB
- Europe, the USA and Identity Ecosystems [30c3].mp4342.91MB
- EUDataP_ State of the Union [30c3].mp4342.29MB
- Calafou, postcapitalist ecoindustrial community [30c3].mp4339.22MB
- Fast Internet-wide Scanning and its Security Applications [30c3].mp4332.99MB
- Jacob Applebaum_ To Protect And Infect, Part 2 [30c3].mp4331.72MB
- Magic Lantern - Free Software on Your Camera [30c3].mp4327.51MB
- Desperately Seeking Susy [30c3].mp4326.04MB
- Through a PRISM, Darkly - Everything we know about NSA spying [30c3].mp4323.77MB
- Beyond the Tech_ Building Internet Freedom Tools for Real People [30c3].mp4322.02MB
- Attacking HomeMatic [30c3].mp4315.3MB
- Breaking Baryons [30c3].mp4315.25MB
- Virtually Impossible_ The Reality Of Virtualization Security [30c3].mp4313.1MB
- Hello World! How to make art after Snowden_ [30c3].mp4312.49MB
- RFID Treehouse of Horror [30c3].mp4309.68MB
- Forbidden Fruit [30c3].mp4309.47MB
- Art of the Exploit_ An Introduction to Critical Engineering [30c3].mp4305.08MB
- Reverse engineering the Wii U Gamepad [30c3].mp4298.94MB
- Programming FPGAs with PSHDL - Let's create the Arduino for FPGAs [30c3].mp4298.44MB
- The Gospel of IRMA [30c3].mp4296.57MB
- Concepts for global TSCM - getting out of surveillance state mode [30c3].mp4294.99MB
- Electronic Bank Robberies [30c3].mp4294.98MB
- Towards an affordable brain-computer-interface [30c3].mp4294.11MB
- Rock' em Graphic Cards - Introduction to Heterogeneous Parallel Programming [30c3].mp4294.08MB
- FPGA 101 - Making awesome stuff with FPGAs [30c3].mp4291.38MB
- Monitoring the Spectrum_ Building Your Own Distributed RF Scanner Array [30c3].mp4281.15MB
- Revisiting _Trusting Trust_ for binary toolchains [30c3].mp4279.09MB
- The Tor Network [30c3] (with Jacob Applebaum).mp4278.05MB
- White-Box Cryptography [30c3].mp4276.12MB
- Introduction to Processor Design [30c3].mp4274.87MB
- Toward a Cognitive _Quantified Self_ - Activity Recognition for the Mind [30c3].mp4273.03MB
- WarGames in memory [30c3].mp4270.89MB
- THE DATABASE NATION, a.k.a THE STATE OF SURVEILLANCE [30c3].mp4265.43MB
- Do You Think That's Funny_ - Art Practice under the Regime of Anti-Terror Legislation [30c3].mp4263.78MB
- India's Surveillance State [30c3].mp4262.31MB
- How to Build a Mind - Artificial Intelligence Reloaded [30c3].mp4260.94MB
- Script Your Car! [30c3].mp4256.99MB
- No Neutral Ground in a Burning World [30c3].mp4254.04MB
- Triggering Deep Vulnerabilities Using Symbolic Execution [30c3].mp4242.99MB
- Basics of Digital Wireless Communication [30c3].mp4236.3MB
- HbbTV Security [30c3].mp4236.27MB
- 10 Years of Fun with Embedded Devices [30c3].mp4232.17MB
- Firmware Fat Camp [30c3].mp4232.08MB
- Backdoors, Government Hacking and The Next Crypto Wars [30c3].mp4227.73MB
- Hacking the Czech Parliament via SMS [30c3].mp4223.27MB
- Disclosure DOs, Disclosure DON'Ts [30c3].mp4220.59MB
- ID Cards in China_ Your Worst Nightmare [30c3].mp4215.85MB
- Extracting keys from FPGAs, OTP Tokens and Door Locks [30c3].mp4214.72MB
- Hardening hardware and choosing a #goodBIOS [30c3].mp4214.22MB
- Policing the Romantic Crowd [30c3].mp4205.66MB
- The GNU Name System [30c3].mp4203.84MB
- World War II Hackers [30c3].mp4202.48MB
- Mobile network attack evolution [30c3].mp4201.81MB
- Console Hacking 2013_ WiiU [30c3].mp4195.97MB
- My journey into FM-RDS [30c3].mp4191.57MB
- Turing Complete User [30c3].mp4191.49MB
- Reverse engineering of CHIASMUS from GSTOOL [30c3].mp4189.59MB
- #SOPA, #NSA, and the New Internet _Lobby_ [30c3].mp4185.52MB
- Open source experimental incubator build up [30c3].mp4181.92MB
- Y U NO ISP, taking back the Net [30c3].mp4175.76MB
- Long Distance Quantum Communication [30c3].mp4174.26MB
- Coding your body [30c3].mp4173.72MB
- Nerds in the news [30c3].mp4169.75MB
- Building a safe NFC ticketing system [30c3].mp4169.31MB
- Structuring open hardware projects [30c3].mp4168.91MB
- Perfect Paul - On Freedom of Facial Expression [30c3].mp4166.9MB
- Hacking as Artistic Practice [30c3].mp4162.72MB
- Against Metadata [30c3].mp4160.32MB
- lasers in space - more than just pew pew! [30c3].mp4158.37MB
- The Pirate Cinema [30c3].mp4158.09MB
- SCADA StrangeLove 2 [30c3].mp4155.97MB
- Human Rights and Technology [30c3].mp4148.97MB
- The ArduGuitar_ An Ardunio Powered Electric Guitar [30c3].mp4148.5MB
- The good, the bad, and the ugly - Linux Kernel patches [30c3].mp4146.42MB
- Data Mining for Good [30c3].mp4139.22MB
- The philosophy of hacking [30c3].mp4135.57MB
- Plants & Machines_ Food replicating Robots from Open Source Technologies [30c3].mp4131.21MB
- Technomonopolies [30c3].mp4129.93MB
- Opening Event [30c3] mit Tim Pritlove.mp463.13MB
- Anonymity and Privacy in Public Space and on the Internet [30c3].mp458.51MB
- Google Glass Hacks [30c3].mp454.94MB
- Security of the IC Backside [30c3].mp453.71MB
- Chelsea Manning_ 07KINGSTON25 JAMAICA_ MALARIA UPDATE Dispatches from Fort Meade [30c3].mp452.83MB
- Hardware Attacks, Advanced ARM Exploitation, and Android Hacking [30c3].mp452.06MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统