PLAY PODCASTS
Chaos Computer Club - archive feed

Chaos Computer Club - archive feed

14,359 episodes — Page 260 of 288

Blitzableiter - Schutz vor Flash Angriffen (linuxtag11)

May 12, 201150 min

The end of the Internet as we know today (Exploring IPv6) (linuxtag11)

May 12, 201148 min

Server absichern, aber richtig! (linuxtag11)

May 12, 201145 min

IPv6 - Ungefährlich ? (linuxtag11)

May 12, 201159 min

12 Years of FLOSS License Compliance: A Historical Perspective (linuxtag11)

May 12, 201154 min

SELinux Sandboxing (linuxtag11)

May 12, 201135 min

Enterprise Cloud-Lösung - OpenStack in der Praxis (linuxtag11)

May 11, 201127 min

Open Source hält, was die Cloud verspricht (linuxtag11)

May 11, 201134 min

Podiumsdiskussion: Was Unternehmensaufkäufe für Open Source bedeuten (linuxtag11)

May 11, 20111h 0m

Management von Private Clouds mit Open-Source Software (linuxtag11)

May 11, 201127 min

Why LibreOffice is the Office suite of the future (linuxtag11)

May 11, 201144 min

The Calligra Suite, an Overview (linuxtag11)

May 11, 201132 min

Lab Manager Light: Self Service Virtualisierung als private Cloud (linuxtag11)

May 11, 201121 min

Cloud-Anwendungen mit Java (linuxtag11)

May 11, 20111h 1m

Migrating VMs from Xen to KVM seamlessly (linuxtag11)

May 10, 201131 min

Lightweight virtualization: LXC vs. OpenVZ (linuxtag11)

May 10, 201153 min

Virtualisierung mit KVM (Kernel-based Virtual Machine) (linuxtag11)

May 10, 201152 min

Taking Linux into the Clouds (linuxtag11)

May 10, 201150 min

Camp 2011 Trailer (camp2011)

Jan 1, 20112 min

Hackers and Computer Science (27c3)

Dec 30, 201034 min

Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth (27c3)

Dec 30, 20101h 4m

Lightning Talks - Day 4 (27c3)

Dec 30, 20102h 1m

News Key Recovery Attacks on RC4/WEP (27c3)

Dec 30, 201042 min

OpenLeaks (27c3)

Dec 30, 20101h 1m

Closing Event (27c3)

Dec 30, 201027 min

Security Nightmares (27c3)

Dec 30, 20101h 24m

International Cyber Jurisdiction (27c3)

Dec 30, 201059 min

Ich sehe nicht, dass wir nicht zustimmen werden (27c3)

Dec 30, 20101h 3m

How the Internet sees you (27c3)

Dec 30, 201058 min

Cybernetics for the Masses (27c3)

Dec 30, 201039 min

Data Analysis in Terabit Ethernet Traffic (27c3)

Dec 30, 201050 min

Having fun with RTP (27c3)

Dec 30, 201036 min

Three jobs that journalists will do in 2050 (27c3)

Dec 30, 20101h 0m

A framework for automated architecture-independent gadget search (27c3)

Dec 30, 201036 min

OMG WTF PDF (27c3)

Dec 30, 201057 min

IMMI, from concept to reality (27c3)

Dec 29, 201056 min

Cognitive Psychology for Hackers (27c3)

Dec 29, 20101h 5m

Running your own GSM stack on a phone (27c3)

Dec 29, 20101h 1m

Console Hacking 2010 (27c3)

Dec 29, 201044 min

Fnord-Jahresrückblick 2010 (27c3)

Dec 29, 20101h 23m

Reverse Engineering a real-world RFID payment system (27c3)

Dec 29, 201058 min

DIY synthesizers and sound generators (27c3)

Dec 29, 201024 min

A Critical Overview of 10 years of Privacy Enhancing Technologies (27c3)

Dec 29, 201054 min

Android geolocation using GSM network (27c3)

Dec 29, 20101h 3m

Analyzing a modern cryptographic RFID system (27c3)

Dec 29, 201058 min

FrozenCache (27c3)

Dec 29, 201055 min

Hacker Jeopardy (english translation) (27c3)

Dec 29, 20102h 14m

Ignorance and Peace Narratives in Cyberspace (27c3)

Dec 29, 201030 min

Safety on the Open Sea (27c3)

Dec 29, 201059 min

CCC-Jahresrückblick 2010 (27c3)

Dec 29, 20101h 40m