Other

Hacking At Random 2009 talks

  • Download Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
Hacking At Random 2009 talks

Download Anonymously! Get Protected Today And Get your 70% discount


Torrent info

Name:Hacking At Random 2009 talks

Infohash: F6408A57FD0B2CC6EFECBBB252755B380BC4F4D7

Total Size: 19.84 GB

Seeds: 0

Leechers: 0

Stream: Watch Full Movie @ Movie4u

Last Updated: 2010-12-01 06:33:53 (Update Now)

Torrent added: 2009-09-18 07:04:05






Torrent Files List


hacking_the_human.mp4 (Size: 19.84 GB) (Files: 87)

 hacking_the_human.mp4

248.52 MB

 348_l3588_Organising_a_Con.mp4

271.05 MB

 347_l4650_Hackerspaces_Everywhere.mp4

351.05 MB

 345_l3580_Sniffing_cable_modems.mp4

277.16 MB

 346_l2321_An_empirical_study_of_division_of_labour_in_free_software_development.mp4

175.30 MB

 343_l3879_MinixWall.mp4

300.32 MB

 341_l1688_HAR_Network_Overview.mp4

127.39 MB

 342_l3082_Closing_Ceremony.mp4

233.03 MB

 340_l3077_My_BREIN_hurts.mp4

232.48 MB

 334_l2743_wikileaks_followup.mp4

207.28 MB

 339_l2347_Realizing_the_RFID_Guardian.mp4

177.36 MB

 331_l3053_Public_transport_SMS_ticket_hacking.mp4

230.66 MB

 330_l2846_Why_did_Germany_pull_the_plug_on_e-voting.mp4

215.00 MB

 329_l2898_Life_or_Death_Cryptology.mp4

218.87 MB

 328_l3406_Statistics_and_the_Law.mp4

257.29 MB

 327_l2000_Anti-Counterfeiting_Trade_Agreement.mp4

151.06 MB

 326_l2589_Locally_Exploiting_Wireless_Sensors.mp4

200.47 MB

 326_l3101_How_to_use_quantum_cryptography_for_secure_identification.mp4

234.46 MB

 325_l3341_Side_channel_analysis_on_embedded_systems.mp4

252.34 MB

 323_l5795_Exploiting_Native_Client.mp4

437.87 MB

 324_l3048_Becoming_government_2_0.mp4

230.24 MB

 322_l3132_Deep_Silicon_Analysis.mp4

236.57 MB

 322_l3383_Lockpicking.mp4

261.86 MB

 319_l3255_Your_Mind_Legal_Status_Rights_and_Securing_Yourself.mp4

252.04 MB

 321_l3156_Unusual_lock_picking.mp4

244.38 MB

 318_l3643_The_power_of_decentralization.mp4

282.37 MB

 315_l2735_Foundry_CAM_hacking.mp4

211.77 MB

 317_l2893_WokTheWob_FOIA_for_open_source.mp4

224.02 MB

 313_l7292_Hacker_Jeopardy.mp4

550.75 MB

 311_l2937_Surveillance_Self-Defense.mp4

221.80 MB

 309_l3447_Airprobe.mp4

260.45 MB

 310_l2678_Cracking_A5_GSM_encryption.mp4

202.73 MB

 308_l3627_OpenBSC.mp4

273.95 MB

 306_l2784_How_we_break_into_domains.mp4

210.32 MB

 305_l3488_Breaking_Hitag2.mp4

263.52 MB

 303_l4613_Wikileaks_Panel.mp4

357.17 MB

 299_l1953_Identity_processes.mp4

147.52 MB

 298_i3578_x509_is_considered_harmful.mp4

270.28 MB

 296_l2894_TEMPEST_for_the_casual_election_hacker.mp4

218.62 MB

 297_l3918_WebAppInSec_101_threats.mp4

295.93 MB

 295_l1593_Government_and_trust_part2.mp4

120.36 MB

 294_l3929_DNS_Security_In_The_Broadest_Sense.mp4

296.78 MB

 295_l1129_Government_and_trust_part1.mp4

85.32 MB

 291_l2535_The_IBM_AS400.mp4

191.47 MB

 292_l2978_Java_Card.mp4

224.96 MB

 293_l3243_All_Your_Packets_Are_Belong_to_Us.mp4

244.93 MB

 290_l2569_Practical_Attacks_Against_Authorship_Attribution_Techniques.mp4

198.95 MB

 288_l3530_When_nerds_dream_big.mp4

273.32 MB

 289_l3178_Why_Tor_is_slow.mp4

245.99 MB

 287_l2416_The_dangers_and_merits__of_carrier_grade_nat.mp4

187.09 MB

 286_l2723_First_woman_on_native_IPv6_and_other_tales.mp4

210.74 MB

 284_l3638_Developing_embedded_devices_using_opensource_tools.mp4

281.68 MB

 282_l7121_Lightning_talks_Friday.mp4

551.27 MB

 283_l2572_Analog_circuit_design.mp4

199.20 MB

 281_l4796_The_Super_Awesome_Cartoon_Quizz_2009.mp4

362.12 MB

 280_l3604_Futureshock_do_not_panic.mp4

272.24 MB

 277_l4005_Panel_discussion_with_Brein_MPAA_and_HAR.mp4

302.39 MB

 279_l3132_Eavesdropping_on_quantum_cryptosystem_by_exploiting_its_detector_vulnerability.mp4

236.61 MB

 274_l2810_Hacking_Mona_Lisa.mp4

212.31 MB

 272_l2973_A_hackers_guide_to_surviving_in_the_corporate_world.mp4

224.56 MB

 273_l3470_Classic_Mistakes.mp4

262.15 MB

 270_l2714_coreboot.mp4

205.09 MB

 271_l3177_View_from_the_orbit.mp4

239.96 MB

 269_l1367_Bits_Of_Freedom.mp4

108.81 MB

 267_l_The_ZeuS_evolution.mp4

244.56 MB

 268_l2208_Runtime_Kernel_Patching_on_Mac_OS_X.mp4

166.76 MB

 265_l2198_Programming_the_cloud.mp4

166.04 MB

 266_l2042_Countering_behavior_based_malware_analysis.mp4

154.23 MB

 262_l1892_Protheses_for_50_instead_of_250000.mp4

142.98 MB

 260_i2827_Securing_networks_from_an_ISP_perspective.mp4

213.34 MB

 261_l1892_(Un)limited_design.mp4

142.98 MB

 259_l2932_Advanced_MySQL_Exploitation.mp4

221.41 MB

 257_part2_Design_and_Build_a_2_MeV_Cyclotron.mp4

53.38 MB

 257_part3_Design_and_Build_a_2_MeV_Cyclotron.mp4

20.24 MB

 257_l_Design_and_Build_a_2_MeV_Cyclotron.mp4

208.90 MB

 254_l_Policy_hacking.mp4

253.16 MB

 255_Flipping_the_Phishing_Con_Game_-_Design_and_Implementation_of_FishPhucker.mp4

203.47 MB

 249_l2758_Rootkits_are_awesome.mp4

208.22 MB

 251_l3610_The_Complex_Ethics_of_Piracy.mp4

272.80 MB

 248_l3320_Teh_Internetz_are_pwned.mp4

250.88 MB

 246_l3218_Anonymous_Vs_Scientology.mp4

242.38 MB

 247_l2931_Electrical_enginering_with_freelibre_open_source_software.mp4

221.40 MB

 197_l3132_quantum_cryptography_an_introduction.mp4

236.61 MB

 244_l3083_Wikileaks.mp4

233.30 MB

 243_l_Opening_ceremony.mp4

50.69 MB

 245_l5329_The_Future_of_Science.mp4

402.45 MB

 252_The_Censoring_Mob.mp4

248.70 MB
 

Announce URL: http://tracker.openbittorrent.com/announce

Torrent description

These are the recordings of the talks and workshops at Hacking At Random 2009. The set is not complete yet, but since there has not been a lot progress recently it is released.
You can also stream these videos from http://www.rehash.nl/

The former address of this torrent was:
http://spekje.snt.utwente.nl/~roel/har.torrent
or:
http://tinyurl.com/har-torrent

For questions, go to #har on ircnet.

related torrents

Torrent name

health leech seeds Size

Fucked At Random

0 1 1.00 GB 0
 


comments (0)

Main Menu