00 - How it's Made - Microprocessors, Circuit Boards, Compact Discs, Computers and more.avi | 287.27 MiB |
00 - In The Realm Of The Hackers (Electron).avi | 350.61 MiB |
00 - Sonic Outlaws (1995).avi | 635.25 MiB |
01 - Thinking Machines - The Creation of the Computer.avi | 351.31 MiB |
02 - Triumph of The Nerds - The Rise of Accidental Empires - Part 1 (1996).avi | 499.96 MiB |
03 - How Internet Traffic works (Warriors of the Net).avi | 81.47 MiB |
04 - Tactical Exploitation-WP.pdf | 193.5 KiB |
04 - Tactical Exploitation.m4v | 66.06 MiB |
04 - Tactical Exploitation.pdf | 143.39 KiB |
05 - Dangerous Minds - The Art of Guerrilla Data Mining-wp.pdf | 229.67 KiB |
05 - Dangerous Minds - The Art of Guerrilla Data Mining.m4v | 139.72 MiB |
05 - Dangerous Minds - The Art of Guerrilla Data Mining.pdf | 1.99 MiB |
06 - Boomstick Fu - The Fundamentals of Physical Security.m4v | 92.03 MiB |
06 - Boomstick Fu - The Fundamentals of Physical Security.pdf | 306.06 KiB |
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.m4v | 94.78 MiB |
07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.pdf | 1.42 MiB |
08 - Pen Testing WIFI.m4v | 33.63 MiB |
08 - Pen Testing WIFI.pdf | 1.37 MiB |
09 - How To Be A Wifi Ninja.m4v | 85.57 MiB |
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.m4v | 147.58 MiB |
10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.pdf | 212.85 KiB |
11 - WiFish Finder Who Will Bite the Bait.m4v | 74.37 MiB |
11 - WiFish Finder Who Will Bite the Bait.pdf | 586.39 KiB |
12 - Attacks Against 2wire Residential Gateway Routers.m4v | 55.71 MiB |
12 - Attacks Against 2wire Residential Gateway Routers.pdf | 2.4 MiB |
13 - Hacking Iraq.m4v | 81.71 MiB |
14 - Picking Electronic Locks-wp.pdf | 94.7 KiB |
14 - Picking Electronic Locks.m4v | 39.19 MiB |
14 - Picking Electronic Locks.pdf | 741.89 KiB |
15 - Hacking with the iPod Touch, iPhone, or iPad.m4v | 150.24 MiB |
15 - Hacking with the iPod Touch, iPhone, or iPad.pdf | 1.81 MiB |
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.m4v | 178.28 MiB |
16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.pdf | 168.35 KiB |
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage-wp.pdf | 69.02 KiB |
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.m4v | 154.74 MiB |
17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.pdf | 6.02 MiB |
18 - Hacking the Smart Grid.m4v | 64.69 MiB |
18 - Hacking the Smart Grid.pdf | 136.36 KiB |
18 - Hacking the Smart Grid WP.pdf | 31.09 KiB |
19 - Hacking the Smart Parking Meter.m4v | 181.6 MiB |
19 - Hacking the Smart Parking Meter.pdf | 409.56 KiB |
20 - The Science of Social Engineering.m4v | 34.87 MiB |
20 - The Science of Social Engineering.pdf | 83.54 KiB |
21 - Satellite Imagery Analysis.m4v | 80.08 MiB |
21 - Satellite Imagery Analysis.pdf | 7.13 MiB |
22 - Thinking Outside the Console Box.m4v | 62.16 MiB |
22 - Thinking Outside the Console Box.pdf | 5.14 MiB |
23 - RFID Mythbusting.m4v | 131.98 MiB |
24 - High Security - Locks Lies and Liability.m4v | 203.23 MiB |
24 - High Security - Locks Lies and Liability.pdf | 1.34 MiB |
concen.org.txt | 0 Bytes |
README.txt | 10.88 KiB |
theblackpacket.jpg | 104.36 KiB |
Torrent downloaded from Demonoid.com.txt | 47 Bytes |