BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Pentabarf//Schedule 0.3//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALDESC;VALUE=TEXT:22C3 Schedule Release 2.2
X-WR-CALNAME;VALUE=TEXT:22C3 Schedule
X-WR-TIMEZONE;VALUE=TEXT:Europe/Berlin

BEGIN:VEVENT
METHOD:PUBLISH
UID:776@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T200000
DTEND;TZID=Europe/Berlin:20051230T210000
DURATION:PT1H
SUMMARY:22C3 Closing Event - Famous last words
DESCRIPTION: Please join us as we look back to what happened and look 
 forward to what's next on our agenda.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/776.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Tim Pritlove":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:496@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T180000
DTEND;TZID=Europe/Berlin:20051230T190000
DURATION:PT1H
SUMMARY:22C3 Network Review
DESCRIPTION: An Introduction into the structure and design of the cong
 ress network - featuring a description of hardware setup and focusing 
 on the uplink to the internet.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/496.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sebastian Werner":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Stefan Wahl":inval
 id:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:567@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T130000
DTEND;TZID=Europe/Berlin:20051228T140000
DURATION:PT1H
SUMMARY:3G Investigations - Scanning your GPRS/UMTS IP network for fun
  and profit
DESCRIPTION: We are giving an overview of ip networks used for >=2.5G 
 technologies. Our main focus is on scanning the overlaying ip network\
 , on different Voice-over-IP filter implementations and the possibilit
 ies to circumvent them.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/567.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Achim 'ahzf' Fried
 land":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Daniel 'btk' Kirst
 enpfad":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1083@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T130000
DTEND;TZID=Europe/Berlin:20051228T140000
DURATION:PT1H
SUMMARY:5 Theses on Informational-Cognitive Capitalism
DESCRIPTION: Discussion premised on the intersections of information f
 eudalism\, free software and open sources\, piracy\, cracking\, volunt
 eer and unwaged labour\, class reconfigurations\, and tainted myth.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1083.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="George N. Dafermos
 ":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:563@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T120000
DTEND;TZID=Europe/Berlin:20051229T130000
DURATION:PT1H
SUMMARY:Academic tools and real-life bug finding in Win32
DESCRIPTION: Overview of a few academic program verification/checking 
 tools; their usefulness for practical bug finding (particularly\, in W
 in32 PE binaries); a report on the progress of integer overflow detect
 ion tool implementation (with preliminary results).

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/563.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rafał Wojtczuk":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:499@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T140000
DTEND;TZID=Europe/Berlin:20051230T150000
DURATION:PT1H
SUMMARY:Access to Knowledge - Copyright\, Patents and Politics at the 
 World Intellectual Property Organisation
DESCRIPTION: Your Access to Knowledge is at stake. At the World Intell
 ectual Property Organisation\, where international treaties on copyrig
 ht and patents are decided on\, a revolution is taking place. Big righ
 tsholders have been getting their way until now\, restricting the free
  use of ideas. A Treaty on Access to Knowledge is needed to guarantee 
 your rights\, and the Free Software Foundation Europe is working on it
 .

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/499.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Karsten Gerloff":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1112@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T120000
DTEND;TZID=Europe/Berlin:20051230T130000
DURATION:PT1H
SUMMARY:A discussion about modern disk encryption systems
DESCRIPTION: Jacob Appelbaum will discuss different disk encryption sy
 stems in their current implementation. This will include technical as 
 well as legal issues.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1112.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jacob Appelbaum":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:491@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T180000
DTEND;TZID=Europe/Berlin:20051230T190000
DURATION:PT1H
SUMMARY:Advanced Buffer Overflow Methods [or] Smack the Stack - Cracki
 ng the VA-Patch
DESCRIPTION: A quick review of the standard buffer overflow exploit st
 ructure VA Patch\, What it is and what it does to prevent buffer overf
 lows.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/491.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Izik":invalid:noma
 il

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:591@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T210000
DTEND;TZID=Europe/Berlin:20051227T220000
DURATION:PT1H
SUMMARY:A guided tour to European IT lobbying - An investigation into 
 intransparency
DESCRIPTION: Information overflow is a general problem of today's open
  information infrastructures. Everything can be found on the web but u
 nfortunately not by everyone. Getting informed about the European Unio
 n and its projects is a task which you cannot leave to the Commission'
 s public relations department. You should better start your own invest
 igation.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/591.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="André Rebentisch"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:418@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T140000
DTEND;TZID=Europe/Berlin:20051228T150000
DURATION:PT1H
SUMMARY:AJAX Based Web Applications
DESCRIPTION: Isn't ironic that web applications are now as nice to use
  as GUI applications were before the web was invented? Well\, almost a
 s nice. We review state of the technologies that make this possible\, 
 and discuss the ramifications for the architecture of web applications
 .

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/418.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="(mesch) Steffen Me
 schkat":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1129@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T190000
DTEND;TZID=Europe/Berlin:20051228T200000
DURATION:PT1H
SUMMARY:Alter Wein in einer neuen Flasche: Rootkits unter dem 2.6 Kern
 el - Kernel Module unter dem 2.6er Kernel für gut und böse?
DESCRIPTION: Bisher war weder möglich rootkits noch Abwehrmassnahmen 
 unter dem 2.6er Kernel zu schreiben\, durch unsere Technik ist es nun 
 möglich die System-Calls direkt zu modifizieren. Somit geben wir euch
  die Technik in die Hand Rootkits zu erstellen\, als auch Abwerhmethod
 en zu implementieren. In unserem Vortrag\, erklären wir wie ein Rootk
 it generel funktioniert und wie man mit Hilfe der antisec-technik Root
 kits unter dem 2.6er Kernel erstellen kann. Das ganze wird durch eine 
 live Demo abgerundet.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1129.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="k-mode":invalid:no
 mail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="newroot":invalid:n
 omail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:785@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T190000
DTEND;TZID=Europe/Berlin:20051228T200000
DURATION:PT1H
SUMMARY:Anonymität im Internet - Rechtliche und technische Aspekte
DESCRIPTION: Der Vortrag bietet einen Überblick über die verfügbare
 n Systeme und Implementierungen\, ihre Entwicklungsgeschichte und die 
 technischen Grundlagen. Darüber hinaus schildert er die rechtlichen R
 ahmenbedingungen und Gesetzgebungsbestrebungen. Es folgt ein kurzer Ab
 riss der Erfahrungen als Betreiber eines Node.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/785.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Julius Mittenzwei"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andreas Lehner":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Peter Franck":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:589@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T180000
DTEND;TZID=Europe/Berlin:20051228T190000
DURATION:PT1H
SUMMARY:Anonymous Data Broadcasting by Misuse of Satellite ISPs - An o
 pen-source project to develop a tool for broadband satellite broadcast
 s
DESCRIPTION: The lecture focuses on satellite ISP technology and how t
 o misuse it for anonymously broadcasting to an unlimited number of ano
 nymous users while only one user pays for a standard dial-up connectio
 n of a satellite ISP.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/589.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sven Löschner":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:544@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T210000
DTEND;TZID=Europe/Berlin:20051227T220000
DURATION:PT1H
SUMMARY:Applied Machine Learning - Brief Introduction into Machine Lea
 rning followed by application examples.
DESCRIPTION: Overview of the current state of research in Machine Lear
 ning including the general motivation\, setup of learning problems\, s
 tate-of-the-art learning algorithms and applications like our brain co
 mputer interface.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/544.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Timon Schroeter":i
 nvalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sören Sonnenburg"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Konrad Rieck":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:482@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T180000
DTEND;TZID=Europe/Berlin:20051229T190000
DURATION:PT1H
SUMMARY:Atmel AVR für Dummies - Was ist denn nun eigentlich so ein 'I
 nterrupt'?
DESCRIPTION: Mikrocontroller sind heutzutage als Embedded Devices kaum
  noch wegzudenken. Dieser Workshop soll anhand vom Beispiel fnordlicht
 [1] zeigen\, wie ein Atmel AVR Controller funktioniert und programmier
 t wird.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/482.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="fd0":invalid:nomai
 l

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:772@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T130000
DTEND;TZID=Europe/Berlin:20051229T140000
DURATION:PT1H
SUMMARY:Attacking the IPv6 Protocol Suite
DESCRIPTION: After a short introduction on the differences of IPv4 to 
 IPv6\, the weaknesses in IPv6 will be shown. Highlight of the talk is 
 the presentation of the THC-IPV6 Attack Toolkit\, which includes all I
 Pv6 attacks as well as a low level packet library for easy crafting pa
 ckets.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/772.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="van Hauser":invali
 d:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:606@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T220000
DTEND;TZID=Europe/Berlin:20051228T230000
DURATION:PT1H
SUMMARY:Autodafé: An Act of Software Torture - Presentation of an inn
 ovative buffer overflow uncovering technique called "Fuzzing by weight
 ing attacks with markers"
DESCRIPTION: Automated vulnerability searching tools have led to a dra
 matic increase of the rate at which such flaws are discovered. One par
 ticular searching technique is fault injection – i.e. insertion of r
 andom data into input files\, buffers or protocol packets\, combined w
 ith a systematic monitoring of memory violations. Even if these tools 
 allow to uncover a lot of vulnerabilities\, they are still very primit
 ive; despite their poor efficiency\, they are useful because of the ve
 ry high density of such vulnerabilities in modern software.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/606.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Martin Vuagnoux":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:572@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T120000
DTEND;TZID=Europe/Berlin:20051228T130000
DURATION:PT1H
SUMMARY:A way to fuzzy democracy - Using modern communication to trans
 form the way we make political decisions
DESCRIPTION: As we can see by the German voting results in 2005\, ther
 e is a huge disenchantment with politics in modern democracies. The vo
 ting people feel powerless in a governance where the power should orig
 inally belong to the people. "Democracy" only tends to be the best com
 promise among other types of government\, but it could be different.Th
 ose modern means of communication most of us already use on a daily ba
 sis\, like internet forums\, webs of trust and possibly e-voting syste
 ms\, can be used as a basis for political discussion and decision maki
 ng as long as we are aware of their benefits as well as theirlimitatio
 ns. This talk puts our traditional believes about democracy into quest
 ion by closely looking at its roots in history. A careful deconstructi
 on of that monolithic term will instantly lead to a very different per
 spective on the ideals behind it. It then becomes very easy to see how
  much closer modern technology might take us to the originalidea of de
 mocracy.To sum it up: There are much better strategies of mobilizing a
 nd informing people than consuming TV ads and then voting the lesser e
 vil every 4 years.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/572.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Svenja Schröder":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Christiane Ruetten
 ":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:781@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T170000
DTEND;TZID=Europe/Berlin:20051227T180000
DURATION:PT1H
SUMMARY:Bad TRIPs - What the WTO Treaty did in Hongkong and what that 
 means for us
DESCRIPTION: The TRIPS Treaty is one of the most discussed within the 
 WTO. Its impact on knowledge and so-called intellectual property right
 s is huge\, not only for developing countries. This talk will give the
  listener a short introduction on the main principles of TRIPS\, who s
 tands behind it and what chances a different treaty could bring. As th
 e WTO meeting in Hong Kong is just two weeks in advance of the 22c3\, 
 there will be much news on the progress of the treaty. With Oliver Mol
 denhauer being an NGO representative at the WTO conference we'll have 
 first-hand experience on the debates amongst NGOs and press in Hong Ko
 ng.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/781.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Oliver Moldenhauer
 ":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Julian 'hds' Finn"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:882@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T000000
DTEND;TZID=Europe/Berlin:20051228T010000
DURATION:PT1H
SUMMARY:Biometrics in Science Fiction
DESCRIPTION: Gezeigt und kommentiert werden Ausschnitte und Szenen bio
 metrischer Techniken aus Film und Fernsehen. 

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/882.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Roland Kubica":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Constanze Kurz":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:596@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T180000
DTEND;TZID=Europe/Berlin:20051230T190000
DURATION:PT1H
SUMMARY:Blackberry: call to arms\, some provided - Teach yourself uppe
 r management in 22 days
DESCRIPTION: RIM Blackberry devices and servers are hidden behind a cu
 rtain of FUD and secrecy. The purpose of this talk is to lift the curt
 ain a little and show what can and could be done.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/596.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="FX of Phenoelit":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1108@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T160000
DTEND;TZID=Europe/Berlin:20051228T170000
DURATION:PT1H
SUMMARY:Black Ops Of TCP/IP 2005.5 - New Explorations: Large Graphs\, 
 Larger Threats
DESCRIPTION: I will discuss new experiences and potential directions i
 nvolving scanning massive networks\, such as the entire world's DNS in
 frastructure.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1108.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Dan Kaminsky":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:536@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T160000
DTEND;TZID=Europe/Berlin:20051230T180000
DURATION:PT2H
SUMMARY:Bluetooth Hacking - The State of The Art - A roundup and live 
 demonstrations of all currently known Bluetooth vulnerabilities.
DESCRIPTION: This talk will provide an overview of all currently know 
 Bluetooth exploits\, as well as live demonstrations\, including Bluebu
 gging\, Snarfing\, Dumping\, PIN cracking and Car Whispering.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/536.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marcel Holtmann":i
 nvalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Martin Herfurt":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Adam Laurie":inval
 id:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:545@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T230000
DTEND;TZID=Europe/Berlin:20051230T000000
DURATION:PT1H
SUMMARY:Breaking Down the Web of Trust
DESCRIPTION: Even with tutorials on the WoT and good trust policies th
 e concept of "trust" can still be hard to grasp. Here we'll look at tr
 ust metrics\, ways of using current trust systems better\, and some no
 n-crypto applications of trust.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/545.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Seth Hardy":invali
 d:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:916@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T230000
DTEND;TZID=Europe/Berlin:20051229T110000
DURATION:PT12H
SUMMARY:Capture The Flag
DESCRIPTION: CTF von 23.00 bis 7.00

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/916.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="mc.fly":invalid:no
 mail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Lexi Pimendis":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:483@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T180000
DTEND;TZID=Europe/Berlin:20051227T190000
DURATION:PT1H
SUMMARY:CCC Jahresrückblick - Ein Überblick über die Aktivitäten d
 es Clubs 2005
DESCRIPTION: Die Sprecher des CCC stellen die Aktivitäten des und Ges
 chehnisse im Chaos Computer Club im abgelaufenen Jahr vor. Hierunter f
 allen Berichte und Anekdoten von Veranstaltungen innerhalb des CCC als
  auch Vorträge und Konferenzen\, an denen CCC-Vertreter teilgenommen 
 haben.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/483.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="starbug":invalid:n
 omail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Lars Weiler":inval
 id:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andy Müller-Maguh
 n":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:931@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T160000
DTEND;TZID=Europe/Berlin:20051229T170000
DURATION:PT1H
SUMMARY:Changing Realities - Innovation\, user-creation\, activism and
  entrepreneurship in Second Life
DESCRIPTION: The 3D digital world of Second Life has been completely b
 uilt by its residents. Running on a growing grid of computers\, SL's r
 eal-time collaborative-creation tools and physical simulation allow fo
 r creativity of stunning depth and breadth.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/931.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Cory Ondrejka":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:505@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T120000
DTEND;TZID=Europe/Berlin:20051228T130000
DURATION:PT1H
SUMMARY:Collateral Damage - Consequences of Spam and Virus Filtering f
 or the E-Mail System
DESCRIPTION: This lecture takes a critical look at the impact that con
 temporary spam and virus filter techniques have on the stability\, per
 formance\, and usability of the e-mail system.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/505.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Peter Eisentraut":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1103@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T230000
DTEND;TZID=Europe/Berlin:20051229T000000
DURATION:PT1H
SUMMARY:Community mesh networking - Ubiquitous wireless mesh clouds wi
 th olsrd from olsr.org
DESCRIPTION: Olsr.org's improved algorithm (compared to the initial IN
 RIA OLSR draft) and how it may influence the development of ubiquitous
  free wireless networks.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1103.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Elektra Wagenrad":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1139@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T110000
DTEND;TZID=Europe/Berlin:20051229T120000
DURATION:PT1H
SUMMARY:COMPLETE Hard Disk Encryption with FreeBSD - Learn how to effe
 ctively protect not only your data but also your applications
DESCRIPTION: Most technologies and techniques intended for securing di
 gital data focus on protection while the machine is turned on – most
 ly by defending against remote attacks. An attacker with physical acce
 ss to the machine\, however\, can easily circumvent these defenses by 
 reading out the contents of the storage medium on a different\, fully 
 accessible system or even compromise program code on it in order to le
 ak encrypted information. Especially for mobile users\, that threat is
  real. And for those carrying around sensitive data\, the risk is most
  likely high.This talk will introduce a method of mitigating that part
 icular risk by protecting not only the data through encryption\, but a
 lso the applications and the operating system from being compromised w
 hile the machine is turned off.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1139.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marc Schiesser":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:423@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T220000
DTEND;TZID=Europe/Berlin:20051228T230000
DURATION:PT1H
SUMMARY:Corp vs. Corp - Profiling Modern Espionage
DESCRIPTION: An impressionistic overview of what makes the difference 
 today and in the future (in the digital playground) in the balance of 
 power between economic and military powers. The presentation will also
  cover a description of the business behind espionage worldwide as wel
 l as the asymmetric organizations that are the real master of puppets.
 

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/423.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Fabio Ghioni":inva
 lid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Roberto Preatoni":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:798@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T220000
DTEND;TZID=Europe/Berlin:20051227T230000
DURATION:PT1H
SUMMARY:Covert channels in TCP/IP: attack and defence - Creation and d
 etection of IP steganography for covert channels and device fingerprin
 ting
DESCRIPTION: This talk will show how idiosyncrasies in TCP/IP implemen
 tations can be used to reveal the use of several steganography schemes
 \, and how they can be fixed. The analysis can even be extended to rem
 otely identify the physical machine being used.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/798.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Steven J. Murdoch"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:492@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T140000
DTEND;TZID=Europe/Berlin:20051230T150000
DURATION:PT1H
SUMMARY:Covert Communication in a Dark Network - A major new version o
 f freenet
DESCRIPTION: At Defcon 13\, we presented our ideas for creating scalab
 le networks where only trusted friends speak directly to each other. I
 n this talk\, we will elaborate on this\, discussing further experimen
 ts and results\, as well as our attempts to build such a network for r
 eal.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/492.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ian Clarke":invali
 d:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Oskar Sandberg":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:405@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T120000
DTEND;TZID=Europe/Berlin:20051227T130000
DURATION:PT1H
SUMMARY:Cybercrime Convention - Hacking on its way to become a crimina
 l act?
DESCRIPTION: Within the topic of international regulation attempts in 
 the field of Cybercrime (CoE Convention on Cybercrime & EU Council Fra
 mework Decision on Attacks against Information Systems) a number of Me
 mber States is planning to implement "hacking"-provisions in their nat
 ional criminal law. This development could lead to a criminal sanction
 s not only for hacking acts committed with criminal intent but also fo
 r testing network security.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/405.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marco Gercke":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:864@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T140000
DTEND;TZID=Europe/Berlin:20051228T150000
DURATION:PT1H
SUMMARY:Das Geheimnis - Reloaded
DESCRIPTION: Seit jeher war es das Gegenteil von Information\, ihr dun
 kler Bruder: das Geheimnis. Jetzt ist es wieder mit aller Macht im Kom
 men. Peter Glaser über den Weg in die Geheimnisgesellschaft.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/864.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Peter Glaser":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:490@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T120000
DTEND;TZID=Europe/Berlin:20051229T130000
DURATION:PT1H
SUMMARY:Data Mining für den Weltfrieden
DESCRIPTION: Wir drehen den Spiess um: Wie die Quintessenz die NSA ana
 lysiert hat. Warum die Bedrohung durch schmutzige Bomben eine fiktive 
 ist. Wie zerlegt man systematisch eine Angst und Hysterie schürende I
 nformationspolitik?

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/490.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jule Riede-Buechel
 e":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:504@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T180000
DTEND;TZID=Europe/Berlin:20051227T190000
DURATION:PT1H
SUMMARY:Data Retention - what comes next?
DESCRIPTION: Chances and Risks of Data Retention Legislation are curre
 ntly discussed in an intensive way without talking a closer look what 
 could be the next legislative steps to increase the investigation auth
 orities possibilities. It is well known\, that offenders as well as no
 rmal users acting in networks can easily circumvents the "risks" cause
 d by the complete storage of traffic data by using public access point
 s and encryption technology.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/504.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marco Gercke":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:802@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T170000
DTEND;TZID=Europe/Berlin:20051227T180000
DURATION:PT1H
SUMMARY:Der Hammer: x86-64 und das Um-schiffen des NX Bits
DESCRIPTION: Die X86-64 Architektur bietet neben den bisher bei x86 ve
 rfügbaren Page-protection-bits ein neues Bit\, welches es erlaubt Sei
 ten als nicht ausführbar zu markieren. Dies soll dazu dienen die weit
 hin bekannten Buffer-overflow-exploits zu verhindern oder zu erschwere
 n. Wie sich das trotzdem anstellen lässt zeigt dieser Vortrag.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/802.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sebastian Krahmer"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:415@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T190000
DTEND;TZID=Europe/Berlin:20051227T200000
DURATION:PT1H
SUMMARY:Developing Intelligent Search Engines
DESCRIPTION: The presentation will give a short overview of the archit
 ecture of search engines and how machine learning can help improving s
 earch engines. In addition some projects you can take part in will be 
 briefly introduced.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/415.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Isabel Drost":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1094@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T120000
DTEND;TZID=Europe/Berlin:20051227T130000
DURATION:PT1H
SUMMARY:Die BioP-II-Studie des BSI - Biometrische Feldtests in Europa
DESCRIPTION: Die BioP-II-Studie sollte eigentlich als Entscheidungshil
 fe für den Gesetzgeber die Einsatztauglichkeit der biometrischen Merk
 male von Finger\, Gesicht und Iris in Reisedokumenten testen. Leider w
 urde ihr Erscheinen um mehrere Monate verzögert und die entsprechende
 n Gesetze in der Zwischenzeit verabschiedet. Resigniert stellen die Ma
 cher der Studie fest\, daß sie von der politischen Entscheidung über
 holt und vor vollendete Tatsachen gestellt wurden. Man hätte lieber a
 uf die Ergebisse warten sollen.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1094.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Constanze Kurz":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="starbug":invalid:n
 omail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:550@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T170000
DTEND;TZID=Europe/Berlin:20051227T180000
DURATION:PT1H
SUMMARY:Die Technik im neuen ePass
DESCRIPTION: Der Vortrag wird sich mit der Technik des neuen ePasses b
 eschäftigen.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/550.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="starbug":invalid:n
 omail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:888@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T230000
DTEND;TZID=Europe/Berlin:20051228T000000
DURATION:PT1H
SUMMARY:Digitale Bürgerrechte unter europäischem Beschuss
DESCRIPTION: Die digitale Wissensgesellschaft wird in wesentlichen Pun
 kten von der Europäischen Union bestimmt und häufig haben Richtlinie
 n und andere Maßnahmen der EU direkte Auswirkungen auf unsere digital
 en Bürgerrechte.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/888.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Oliver Passek":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Markus Beckedahl":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:549@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T210000
DTEND;TZID=Europe/Berlin:20051228T220000
DURATION:PT1H
SUMMARY:Digital Identity and the Ghost in the Machine - "Once I Was Lo
 st But Now I've Been Found"
DESCRIPTION: The demarcation line that used to separate your digital i
 dentity from your real world physical identity is rapidly disappearing
 . More seriously\, it is permanently changing the way in which the wor
 ld sees you and you see yourself.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/549.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Max Kilger":invali
 d:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:926@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T180000
DTEND;TZID=Europe/Berlin:20051229T190000
DURATION:PT1H
SUMMARY:Disassembler Internals II: Automated Data Structure Recognitio
 n
DESCRIPTION: Disassembler Internals II is an advanced look at the powe
 r of programmatic disassembly analysis. The talk will focus on data st
 ructure recognition for the purposes of reducing time spent reverse en
 gineering protocols and proprietary file formats.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/926.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Richard Johnson":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:546@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T130000
DTEND;TZID=Europe/Berlin:20051227T150000
DURATION:PT2H
SUMMARY:Elektronische Gesundheitskarte und Gesundheitstelematik - 1984
  reloaded? - Eine unendliche Geschichte - Kapitel: Die Sümpfe der Tra
 urigkeit
DESCRIPTION: Wenige Tage noch\, dann bricht die schöne\, neue Welt de
 r elektronischen Gesundheitskarte an.Alles wird besser -- bloß für w
 en? Damit will sich dieser Vortrag befassen\, und insbesondere mit den
  Konsequenzen für diejenigen\, für die es nicht besser wird.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/546.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="ThoMaus":invalid:n
 omail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:426@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T230000
DTEND;TZID=Europe/Berlin:20051230T000000
DURATION:PT1H
SUMMARY:Entschwörungstheorie - Verschwörungstheoretiker sind hinter 
 mir her!
DESCRIPTION: Anschließend an den letztjährigen Vortrag über die bed
 auerliche Mangel- und Fehlrezeption Robert Anton Wilsons soll die Gese
 llschaft\, in der sich populäre Verschwörungstheorien über 9/11 und
  "USrael" befinden\, vorgestellt werden. Verschwörungstheorien könne
 n ein lustiges Spielzeug sein\, wenn sie nicht geglaubt werden. In der
  bewußtseinserweiternden Tradition von Wilson könnten Hacker für as
 soziativen Mindfuck werben. Warum jedoch werden Verschwörungstheorien
  so selten dekonstruiert und so oft gepusht?

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/426.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Daniel Kulla":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:558@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T230000
DTEND;TZID=Europe/Berlin:20051228T000000
DURATION:PT1H
SUMMARY:Erste Hilfe für Nerds und Geeks - Wie überlebe ich (ohne nen
 nenswerten Schäden) einen Congress?
DESCRIPTION: Wie überlebe ich einen vier Tage langen Chaos Communicat
 ion Congress ohne nennenswerte Schäden davonzutragen? Dieser Vortrag 
 ist speziell für Nerds und Geeks geeignet.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/558.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="SaniFox aka Sven V
 ößing":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:503@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T170000
DTEND;TZID=Europe/Berlin:20051229T180000
DURATION:PT1H
SUMMARY:Esperanto\, die internationale Sprache - Eine gut strukturiert
 e Sprache für Geeks und die EU
DESCRIPTION: Esperanto ist eine leicht erlernbare Sprache\, die durch 
 ihre klare Struktur besticht. Sie soll als Zweitsprache weltweite Vers
 tändigung ermöglichen. Momentan werden Englisch und dessen Mutterspr
 achler bevorzugt. Bei Esperanto sind alle gleich.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/503.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="pallas (Corinna Ha
 bets)":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:407@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T160000
DTEND;TZID=Europe/Berlin:20051229T170000
DURATION:PT1H
SUMMARY:EvoCell - free software for evolving cellular automata - Explo
 ring the huge space of possible cellular automata by evolution
DESCRIPTION: This talk is for everyone who liked to play around with t
 he game of life when he/she was a kid (or older).The goal of this talk
  is to present EvoCell\, a free software project released under the GP
 L. EvoCell can simulate arbitrarily many cellular automata in parallel
  with any neigbourhood\, any number of states (RAM is the limit) and a
 ny transition rules.The really interesting part is that you can evolve
  the transition rules. By using genetic algorithms EvoCell allows you 
 to explore the huge space of possible cellular automata. Strange world
 s of gliders\, replicators\, blinkers and other cellular machines are 
 awaiting you.In the talk I'll try to explain some fundamental principl
 es of artificial life and demonstrate how the can be seen in cellular 
 automata.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/407.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Philipp Tiefenbach
 er":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1134@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T130000
DTEND;TZID=Europe/Berlin:20051229T140000
DURATION:PT1H
SUMMARY:e-Voting: The silent decline of public control - Why German vo
 ting machines do not meet the requirements of democratic elections.
DESCRIPTION: The voting machines widely used in Germany's recent elect
 ions fail to follow both fundamental democratic principles and German 
 legal requirements. Highlights of a recent Irish report on security is
 sues of these machines will be provided.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1134.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ulrich Wiesner":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:602@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T210000
DTEND;TZID=Europe/Berlin:20051227T220000
DURATION:PT1H
SUMMARY:Exploring Protocols and Services on Internet Connected Embedde
 d Devices - Looking for Insecurities
DESCRIPTION: Embedded devices are set to take centre stage in the comi
 ng internet connected revolution where anything and everything will be
  connected to the internet. But are the Devices\, Operating Systems\, 
 Protocols and Services mature enough for what the future holds for the
 m? This session looks at the requirements of an internet connected emb
 edded device and the necessary protocols and services required and ava
 ilable\, then\, it goes into some implications of the currently known 
 vulnerabilities.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/602.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sarbjit Sembhi":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:479@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T130000
DTEND;TZID=Europe/Berlin:20051230T140000
DURATION:PT1H
SUMMARY:Fair Code - Free/Open Source Software and the Digital Divide
DESCRIPTION: What has software to do with development policy? A lot. S
 oftware is not only about code\, it is about  rights\, control\, trans
 parency\, freedom and power.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/479.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Meike Richter":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:556@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T130000
DTEND;TZID=Europe/Berlin:20051227T140000
DURATION:PT1H
SUMMARY:Finding and Preventing Buffer Overflows - An overview of stati
 c and dynamic approaches
DESCRIPTION: A talk that will present academic tools\, which are desig
 ned to find or disarm security problems in C code

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/556.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Martin Johns":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:601@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T220000
DTEND;TZID=Europe/Berlin:20051229T230000
DURATION:PT1H
SUMMARY:Fnord Jahresrückblick - Was wirklich geschah
DESCRIPTION: The underreported stories of the year\, sorted by bizarre
 ness.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/601.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix von Leitner"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Frank Rieger":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:517@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T210000
DTEND;TZID=Europe/Berlin:20051229T220000
DURATION:PT1H
SUMMARY:Free Software and Anarchism - does this compute?
DESCRIPTION: The mode of production in free software development is of
 ten being described as anarchical. Despite this attribution seems not 
 initially intended in any fundamental political sense\, this sense sta
 rts to transfuse the discussions. This invites to a closer look at the
  reference: what it is\, what it's not and what it could be. And once 
 viewed from general anarchist theory and the anarchist theory of techn
 ology\, any political relation seems to vanish. But despite this first
  stance\, a demonstrative value can still be obtained as soon as some 
 critical remarks are acknowledged and some developmental frames would 
 be changed.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/517.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sandro Gaycken":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:537@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T160000
DTEND;TZID=Europe/Berlin:20051229T180000
DURATION:PT2H
SUMMARY:Fuzzing - Breaking software in an automated fashion
DESCRIPTION: Fuzzing is the art of automatic bug finding. This is done
  by providing applications with somewhat broken to really broken input
 . During my talk I'll give an overview of current fuzzers and how to b
 uild your own.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/537.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ilja":invalid:noma
 il

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:520@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T230000
DTEND;TZID=Europe/Berlin:20051229T000000
DURATION:PT1H
SUMMARY:Geometrie ohne Punkte\, Geraden & Ebenen - Buckminster Fullers
  Theorie und Praxis einer Wissenschaft zum Selberbauen
DESCRIPTION: Über die Prinzipien hinter den geodätischen Domen\, ein
 ige weitere Erfindungen und die wissenschaftliche Rezeption Fullers. D
 as Verhältnis von Fuller zur modernen Naturwissenschaft.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/520.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Oona Leganovic":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1109@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T170000
DTEND;TZID=Europe/Berlin:20051230T180000
DURATION:PT1H
SUMMARY:GNU/Linux für Blinde und Sehbehinderte - Erfahrungen aus der 
 Praxis
DESCRIPTION: In diesem Vortrag wird erläutert\, wie Blinde und Sehbeh
 inderte Menschen mit dem Computer generell und speziell mit OpenSource
 -Lösungen arbeiten. Dabei werden sowohl Hard- als auch Softwarelösun
 gen vorgestellt. 

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1109.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sebastian Andres":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Lars Stetten":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:789@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T230000
DTEND;TZID=Europe/Berlin:20051230T010000
DURATION:PT2H
SUMMARY:Hacker Jeopardy - The one and only hacker quizshow
DESCRIPTION: The well known quizshow format\, but of course covering t
 opics not usually seen on television 

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/789.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Stefan 'Sec' Zehl"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ray":invalid:nomai
 l

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:605@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T140000
DTEND;TZID=Europe/Berlin:20051227T150000
DURATION:PT1H
SUMMARY:Hacking CCTV - Watching the watchers\, having fun with cctv ca
 meras\, making yourself invisible
DESCRIPTION: CCTV möchte für mehr öffentliche Sicherheit sorgen\, b
 ringt aber viel mehr Unsicherheit - sehen wir\, was Überwacher sehen\
 , in dem wir uns kurz mit Funkfrequenzen und mit Empfaengern - bzw was
  sich noch alles dafuer verwenden laesst - befassen. Welche sowieso sc
 hon erhältlichen Antennen (zB Wlan) eignen sich dafür? Welche Kamera
 typen gibt es\, und was sind ihre Schwächen?

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/605.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Adrian Dabrowski":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Martin Slunsky":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:466@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T160000
DTEND;TZID=Europe/Berlin:20051227T170000
DURATION:PT1H
SUMMARY:Hacking Data Retention - How bureaucrats fail to fight terror
DESCRIPTION: Data retention is presented as a solution for fighting ch
 ild pornography and terror\, but in reality the measures will fail. Ci
 rcumventing is easy and mistakes are waiting to happen. This presentat
 ion shows the hard evidence to hack data rentention.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/466.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Brenno de Winter":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:489@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T120000
DTEND;TZID=Europe/Berlin:20051227T130000
DURATION:PT1H
SUMMARY:Hacking health - Electronic Patient Records in The Netherlands
 
DESCRIPTION: I have been researching the implementation of electronic 
 patient records (EPR) in NL. The first part of EPRs - a national datab
 ase of medication that each patient is described - will become mandato
 ry in early 2006.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/489.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Karin Spaink":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:603@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T230000
DTEND;TZID=Europe/Berlin:20051228T000000
DURATION:PT1H
SUMMARY:Hacking into TomTom Go - Reverse-Engineering des Embedded-Linu
 x-Navigationssystems
DESCRIPTION: TomTom hat mit dem Go ein schickes und flexibles Embedded
 -Linux-System auf den Markt gebracht\, das nur danach schreit\, auch f
 ür andere Zwecke verwendet zu werden. Leider sind System-Images signi
 ert - und hier soll gezeigt werden\, wie diese Signatur geknackt wurde
 .

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/603.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Christian Daniel":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Thomas Kleffel":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1099@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T230000
DTEND;TZID=Europe/Berlin:20051228T000000
DURATION:PT1H
SUMMARY:Hacking OpenWRT
DESCRIPTION: OpenWrt is a Linux distribution for embedded Wireless LAN
  routers. In this lecture I'm going to introduce OpenWrt and show you 
 how you can use and customize it for your own projects.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1099.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix Fietkau":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:495@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T140000
DTEND;TZID=Europe/Berlin:20051228T150000
DURATION:PT1H
SUMMARY:Hashing Trusted Computing - Der aktuelle Stand
DESCRIPTION: Wir präsentieren ein generisches Angriffs-Framework und 
 zeige exemplarisch neue pratische Angriffe auf digitale Signaturen\, d
 ie Zertifikats-Infrastruktur und die Bootkontrollsequenzen basierend a
 uf neuen Resultaten zur Hashfunktion SHA-1. Diese Ergebnisse komprimti
 eren grundlegend die Sicherheit der TCG Architektur.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/495.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rüdiger Weis":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:867@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T000000
DTEND;TZID=Europe/Berlin:20051229T010000
DURATION:PT1H
SUMMARY:Have you hugged your Mac today? - Ein audiovisuelles Live-Feat
 ure
DESCRIPTION: Live-Performance der Hörspielwerkstatt der Humboldt-Univ
 ersität Berlin in deutscher und englischer Sprache über Apple\, Stev
 e Jobs und Steve Wozniak.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/867.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Kai Kittler":inval
 id:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ina Kwasniewski":i
 nvalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jens-Martin Loebel
 ":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jochen Koubek":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marcus Richter":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Constanze Kurz":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1111@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T230000
DTEND;TZID=Europe/Berlin:20051230T000000
DURATION:PT1H
SUMMARY:Hexenbesen und heiliger Gral - Vorläufige und subjektive Geda
 nken zur inhaltlichen Qualität von Wikipedia-Artikeln
DESCRIPTION: Einige vorläufige und ausgesprochen subjektive Gedanken 
 zur Artikelqualität in der Wikipedia aus der Sicht eines Geisteswisse
 nschaftlers. Dabei interessiert weniger die Frage nach den sogenannten
  „Relevanzkriterien”\, als vielmehr die Frage danach\, inwieweit d
 ie Arbeitsweise in und mit der Wikipedia den Ansprüchen an eine wisse
 nschaftliche Arbeitsweise genügt. Ein Anleitung auch für den\, der s
 ich fragt\, ob man den Informationen eines Wikipedia-Artikels denn üb
 erhaupt trauen kann.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1111.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Henriette Fiebig":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:871@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T220000
DTEND;TZID=Europe/Berlin:20051229T230000
DURATION:PT1H
SUMMARY:Honeymonkeys - Chasing hackers with a bunch of monkeys
DESCRIPTION: As part of their ongoing efforts to secure the use of the
  web for Windows-based systems Microsoft recently launched a new resea
 rch initiative called Honeymonkeys. This talk will introduce the basic
   concepts and ideas behind this initiative and will present the speak
 ers' latest research project to gain more knowledge about implementing
  client-based honeypots.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/871.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Krisztian Piller":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sebastian Wolfgart
 en":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:531@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T130000
DTEND;TZID=Europe/Berlin:20051227T140000
DURATION:PT1H
SUMMARY:Hopalong Casualty - On automated video analysis of human behav
 iour
DESCRIPTION: Automated analysis of surveillance videos has seen a lot 
 of research in recent years. Face recognition and person tracking are 
 widely available\, more sophisticated behaviour analysis is coming. Th
 e aim of the current talk is an overview into the methods used for ana
 lysis\, their current performance and limitations.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/531.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ingo Lütkebohle":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:428@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T190000
DTEND;TZID=Europe/Berlin:20051229T200000
DURATION:PT1H
SUMMARY:Hosting a Hacking Challenge - CTF-style - Background informati
 on on CIPHER\, an international Capture-The-Flag contest
DESCRIPTION: The talk will give a deep view behing the scenes of creat
 ing a CTF-hacking challenge. Starting from a short analysis of require
 ments for such an event\, the organizational work to be done\, to the 
 main topic: designing the actual contest and choosing the software to 
 be hacked.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/428.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Lexi Pimendis":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1084@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T130000
DTEND;TZID=Europe/Berlin:20051228T140000
DURATION:PT1H
SUMMARY:Informationsfreiheitsgesetz
DESCRIPTION: In diesem Vortrag geht es um das Informationsfreiheitsges
 etz des Bundes\, dass am ab 1.1.2006 in Kraft tritt.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1084.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jörg Tauss":inval
 id:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1098@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T140000
DTEND;TZID=Europe/Berlin:20051229T150000
DURATION:PT1H
SUMMARY:Internet Voting in Estonia - First-ever pan-national official 
 occasion.
DESCRIPTION: Tarvi\, the project manager for Estonian e-voting\, is go
 ing to explain how the Internet voting system is built and how the Int
 ernet voting was made possible for the Estonian voters.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1098.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Tarvi Martens":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:561@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T210000
DTEND;TZID=Europe/Berlin:20051229T220000
DURATION:PT1H
SUMMARY:Intrusion Detection Systems - Elevated to the Next Level
DESCRIPTION: Currently there exist many different IDS techniques. Howe
 ver\, none of them is the superior one. Best results can only be deter
 mined by a combination of them. We introduce an approach how to do tha
 t efficiently.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/561.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Matthias Petermann
 ":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Alien8":invalid:no
 mail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:543@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T140000
DTEND;TZID=Europe/Berlin:20051229T150000
DURATION:PT1H
SUMMARY:I See Airplanes! - How to build your own radar system
DESCRIPTION: The lecture describes how to build your own passive radar
  system using relatively low-cost hardware and free software.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/543.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Eric Blossom":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:790@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T130000
DTEND;TZID=Europe/Berlin:20051230T150000
DURATION:PT2H
SUMMARY:Kochen für Nerds
DESCRIPTION: Im Sinne einer humorvollen Kochshow mit parallel getatekt
 en Tips zu Einkauf\, Zubereitung und Hardware zeigen wir\, dass selbst
  gekocht nicht mehr Aufwand ist\, als in der Mikrowelle aufgewärmt.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/790.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Hans Knöll":inval
 id:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Christian Jeitler"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:468@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T170000
DTEND;TZID=Europe/Berlin:20051228T180000
DURATION:PT1H
SUMMARY:Lawful Interception in VoIP networks - Old Laws and New Techno
 logy the German Way
DESCRIPTION: Lawful Interception (aka voice and signalling sniffing) e
 quipment has been deployed and is in use for both traditional PSTN net
 works and internet connections. With the advent of Voice over IP appli
 cations the governments step-by-step adopted laws to extend PSTN inter
 ception to VoIP. The talk gives an introduction to the applying laws\,
  rules of conduct and the basic PSTN setup.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/468.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Hendrik Scholz":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:469@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T220000
DTEND;TZID=Europe/Berlin:20051228T230000
DURATION:PT1H
SUMMARY:Learning cryptography through handcyphers - Shaping a digital 
 future with ancient wisdom
DESCRIPTION: For many people cryptography is something that they consi
 der too complicated. But actually one can understand the principles ve
 ry well if they only try. By looking at old handcyphers used for codin
 g one can begin to understand modern cryptography.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/469.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Brenno de Winter":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:417@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T170000
DTEND;TZID=Europe/Berlin:20051229T180000
DURATION:PT1H
SUMMARY:Learning JavaScript with the Google Maps API
DESCRIPTION: The web application programming interface (API) that allo
 ws to embed google maps in web pages is quite simple\, if you speak ja
 vascript\, yet it employs some of the more sophisticated concepts of t
 he language\, such as custom objects and closures. So if you don't spe
 ak javascript yet\, but want to learn it\, using the google maps APIgi
 ves you a head start.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/417.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="(mesch) Steffen Me
 schkat":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:911@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T160000
DTEND;TZID=Europe/Berlin:20051227T170000
DURATION:PT1H
SUMMARY:Lightning Talks Day 1 - Nine five minutes talks by various spe
 akers
DESCRIPTION: There are also loads of reasons for attending the lightni
 ng talks (there is a 1-hour block of those each day at 22C3\, with 10 
 talks in a row). It’s entertaining. You get to learn about a lot of 
 different subjects in a short time. And even if one particular speaker
  is boring: hey\, it will be over in just 5 minutes and a new topic wi
 ll begin.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/911.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="mc.fly":invalid:no
 mail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:912@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T160000
DTEND;TZID=Europe/Berlin:20051228T170000
DURATION:PT1H
SUMMARY:Lightning Talks Day 2 - Nine five minutes talks by various spe
 akers
DESCRIPTION: There are also loads of reasons for attending the lightni
 ng talks (there is a 1-hour block of those each day at 22C3\, with 10 
 talks in a row). It’s entertaining. You get to learn about a lot of 
 different subjects in a short time. And even if one particular speaker
  is boring: hey\, it will be over in just 5 minutes and a new topic wi
 ll begin.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/912.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="fh":invalid:nomail
 

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:913@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T160000
DTEND;TZID=Europe/Berlin:20051229T170000
DURATION:PT1H
SUMMARY:Lightning Talks Day 3 - Nine five minutes talks by various spe
 akers
DESCRIPTION: There are also loads of reasons for attending the lightni
 ng talks (there is a 1-hour block of those each day at 22C3\, with 10 
 talks in a row). It’s entertaining. You get to learn about a lot of 
 different subjects in a short time. And even if one particular speaker
  is boring: hey\, it will be over in just 5 minutes and a new topic wi
 ll begin.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/913.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="fukami":invalid:no
 mail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:915@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T160000
DTEND;TZID=Europe/Berlin:20051230T170000
DURATION:PT1H
SUMMARY:Lightning Talks Day 4 - Nine five minutes talks by various spe
 akers
DESCRIPTION: There are also loads of reasons for attending the lightni
 ng talks (there is a 1-hour block of those each day at 22C3\, with 10 
 talks in a row). It’s entertaining. You get to learn about a lot of 
 different subjects in a short time. And even if one particular speaker
  is boring: hey\, it will be over in just 5 minutes and a new topic wi
 ll begin.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/915.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="prometoys":invalid
 :nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:598@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T230000
DTEND;TZID=Europe/Berlin:20051229T000000
DURATION:PT1H
SUMMARY:Literarisches Code-Quartett - The good\, the bad\, and the ugl
 y
DESCRIPTION: Die Parallelen bei Software und Büchern gehen von dem kr
 eativen Schaffensprozeß über Konsumverhalten\, Entlohnung bis zu Fra
 gen wie Lizenzen und Verwertungsmodelle. Wir werden das dieses Jahr no
 ch etwas weiter treiben\, indem wir analog zur bekannten Fernsehsendun
 g besonders prägnante Codestücke auf der Bühne mit Publikum kritisi
 eren werden.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/598.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andreas Bogk":inva
 lid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix von Leitner"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Lisa Thalheim":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="FX of Phenoelit":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:569@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T140000
DTEND;TZID=Europe/Berlin:20051229T150000
DURATION:PT1H
SUMMARY:Logical Language Lojban - A Hackers' /Spoken/ Language?!
DESCRIPTION: Lojban is an artificial language for humans. It was desig
 ned to be a more powerful means of communication between humans than "
 legacy" natural languages. Among other attractions\, it is based on pr
 edicate logic and has an unambiguous grammar. It can be learnt within 
 days.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/569.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sven Moritz Hallbe
 rg":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:532@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T220000
DTEND;TZID=Europe/Berlin:20051228T230000
DURATION:PT1H
SUMMARY:Lyrical I - Abschluss des CCC-Poesie-Wettbewerbs
DESCRIPTION: Auf der Abschlußveranstaltung des CCC-Poesie-Wettbewerbs
  "Lyrical I" werden die schönsten und originellsten Beiträge vorgest
 ellt.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/532.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Martin Haase/maha"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jens Ohlig":invali
 d:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Henriette Fiebig":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:765@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T220000
DTEND;TZID=Europe/Berlin:20051227T230000
DURATION:PT1H
SUMMARY:Magnetic Stripe Technology
DESCRIPTION: Find out how magnetic stripe technology works\, how it ca
 n be hacked\, how to build a card reader with parts you can find in yo
 ur 'junk drawer'\, and how this reader design can be used to reverse e
 ngineer proprietary formats.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/765.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Joseph Battaglia":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:508@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T170000
DTEND;TZID=Europe/Berlin:20051227T180000
DURATION:PT1H
SUMMARY:Media System Deployment using Python
DESCRIPTION: Using Python\, a large variety of media-oriented systems 
 can be scripted with very little effort. The talk will explore the ava
 ilable libraries for 2d and 3d graphics\, video and sound and describe
  real-world experiences in deploying these systems.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/508.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ulrich von Zadow":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:574@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T210000
DTEND;TZID=Europe/Berlin:20051229T220000
DURATION:PT1H
SUMMARY:Memory allocator security
DESCRIPTION: This talk will discuss a variety of memory allocators tha
 t are available for C and C++ and how they can be exploited. Afterward
 s I will describe our modification to one of these memory allocators t
 hat makes it more resilient to attacks.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/574.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Yves Younan":inval
 id:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1102@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T140000
DTEND;TZID=Europe/Berlin:20051227T150000
DURATION:PT1H
SUMMARY:Message generation at the info layer - Basic introduction in c
 oding on unvirtual realities.
DESCRIPTION: What have talking to your lover and information warfare i
 n common? After building a simple model on human communication and som
 e introductions we begin to play with message construction learning ab
 out how to program the matrix.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1102.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="ulong":invalid:nom
 ail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:513@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T140000
DTEND;TZID=Europe/Berlin:20051228T150000
DURATION:PT1H
SUMMARY:Military intelligence for terrorists(tm) - A lamer's introduct
 ion to retrieving "sensitive" intelligence information
DESCRIPTION: Since 9/11\, the US government is especially picky about 
 which information is to be published. This lecture shows how you can s
 till get some very interesting and "sensitive" geographical informatio
 n.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/513.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andreas Krennmair"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:529@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T210000
DTEND;TZID=Europe/Berlin:20051228T220000
DURATION:PT1H
SUMMARY:muXTCP - Writing your own flexible Userland TCP/IP Stack - Nin
 ja Style!!!
DESCRIPTION: This talk will discuss design approaches for writing flex
 ible userland tcp/ip stacks for network hacking tools.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/529.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Paul Böhm":invali
 d:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:535@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T190000
DTEND;TZID=Europe/Berlin:20051228T200000
DURATION:PT1H
SUMMARY:Old Skewl Hacking - InfraRed updated - MMIrDA - Major Malfunct
 ion's InfraRed Discovery Application
DESCRIPTION: An updated look at InfraRed hacking\, and the state of th
 e art in owning hotel TV systems.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/535.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Major Malfunction"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:464@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T210000
DTEND;TZID=Europe/Berlin:20051227T220000
DURATION:PT1H
SUMMARY:On working memory and mental imagery - How does the brain lear
 n to think?
DESCRIPTION: A representation of an untrained human brain\, call it B(
 0)\, is encoded in the human genome -- its size can hardly exceed a fe
 w megabytes.  In contrast\, a  representation of a trained brain\, B(t
 )\, after big enough time t (say t=20years) must be very long (terabyt
 es?) – it must include a representation of the brain's individual ex
 perience. How can a "simple" B(0) change into an extremely complex B(t
 ) in the course of learning?

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/464.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Victor Eliashberg"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:585@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T140000
DTEND;TZID=Europe/Berlin:20051229T150000
DURATION:PT1H
SUMMARY:Open Source\, EU funding and Agile Methods - Sprint methodolog
 y in funded OSS projects
DESCRIPTION: There is a growing number of open-source developers organ
 ized and connected to company and money related work. We report our ex
 periences from the first year of the PyPy project which has a 7 compan
 y/university consortium and a 1.3 Million Euro research grant from the
  European Union.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/585.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Holger Krekel":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Beatrice Düring":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:498@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T130000
DTEND;TZID=Europe/Berlin:20051230T140000
DURATION:PT1H
SUMMARY:Paper-Prototyping Workshop - Eine Usability-Methode
DESCRIPTION: Paper Prototyping ist eine schnelle und effiziente Method
 e\, um User Interfaces ohne Programmieraufwand zu modellieren und mit 
 echten Nutzern zu testen. Benötigt werden nur ein paar Blatt Papier\,
  eine Schere und ein Stift.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/498.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Antenne Springborn
 ":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ellen Reitmayr":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:461@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T160000
DTEND;TZID=Europe/Berlin:20051227T170000
DURATION:PT1H
SUMMARY:Peer-to-peer under the hood - An in-depth look at p2p algorith
 mics
DESCRIPTION: About p2p-algorithms for fully distributed\, totally serv
 erless\, fully scalable peer-to-peer systems. Not about specific p2p-s
 oftwares. This will only be a very brief overview of p2p-algorithms.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/461.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="David Göthberg":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:478@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T170000
DTEND;TZID=Europe/Berlin:20051228T180000
DURATION:PT1H
SUMMARY:Personal experiences bringing technology and new media to disa
 ster areas - Experiences from Iraq and post Katrina New Orleans
DESCRIPTION: A discussion about technology\, culture\, the Creative Co
 mmons and the media with regards to disaster areas and warzones.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/478.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jacob Appelbaum":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:390@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T110000
DTEND;TZID=Europe/Berlin:20051227T120000
DURATION:PT1H
SUMMARY:Private Investigations - Opening Show and Keynote Speech
DESCRIPTION: Introductory opening session by Tim Pritlove and keynote 
 speech on the 22C3 topic "Private Investigations" by Joi Ito.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/390.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Tim Pritlove":inva
 lid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Joi Ito":invalid:n
 omail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:408@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T130000
DTEND;TZID=Europe/Berlin:20051229T140000
DURATION:PT1H
SUMMARY:Private investigations in searching - How to find any book (an
 d many other roadkills) on the Information Super-Highway
DESCRIPTION: You will not need to copy any more nothing on your hard d
 isk. Once you learn some sound searching techniques\, you will easily 
 find whatever you want\, whenever you want on the fly.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/408.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Fravia":invalid:no
 mail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:473@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T180000
DTEND;TZID=Europe/Berlin:20051228T190000
DURATION:PT1H
SUMMARY:Privaterra - Report from the field - IT Security and Human Rig
 hts organizations - The needs\, the challenges & recommendations
DESCRIPTION: An overview of the work being done by Privaterra and othe
 r organizations to help identify and mitigate security vulnerabilities
  faced by Human Rights Organizations.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/473.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Robert Guerra":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:586@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T170000
DTEND;TZID=Europe/Berlin:20051228T180000
DURATION:PT1H
SUMMARY:PyPy - the new Python implementation on the block - Language/V
 M R&D\, whole program type inference\, translation to low level backen
 ds\, fun
DESCRIPTION: We present our first self-contained Python virtual machin
 e that uses parts of itself to translate itself to low level languages
  ("the Muenchhausen approach"). The PyPy approach could solve problems
  at language/interpreter-level that formerly required complex framewor
 kish solutions at user-level.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/586.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Armin Rigo":invali
 d:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Carl Friedrich Bol
 z":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Holger Krekel":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1077@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T130000
DTEND;TZID=Europe/Berlin:20051230T140000
DURATION:PT1H
SUMMARY:Quantum Entanglement - An introduction
DESCRIPTION: Entanglement is possibly the most intriguing element of q
 uantum theory. This talk gives a gentle introduction to the phenomenon
  of entanglement and nonlocality. Uses of entanglement in quantum cryp
 tography and quantum computing are also presented.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1077.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Stephanie Wehner":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:568@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T110000
DTEND;TZID=Europe/Berlin:20051228T120000
DURATION:PT1H
SUMMARY:Recent Developments in EU Data Retention proposals - Commissio
 n vs. Council - the lesser of two evils?
DESCRIPTION: Presentation and Discussion of the EU proposals for manda
 tory data retention\, proposed individualy by the EU council and the E
 U comission.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/568.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Klaus Landefeld":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:769@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T190000
DTEND;TZID=Europe/Berlin:20051227T200000
DURATION:PT1H
SUMMARY:RFID - overview of protocols\, librfid implementation and pass
 ive sniffing - ISO14443\, ISO15693\, their GPL librfid implementation 
 and passive sniffing hardware
DESCRIPTION: The presentation will cover an introduction into the two 
 popular RFID Standards\, ISO14443 and ISO15693\, as well as the author
 's Free Software implementation "librfid"

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/769.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Harald Welte":inva
 lid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Milosch Meriac":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:588@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T160000
DTEND;TZID=Europe/Berlin:20051228T170000
DURATION:PT1H
SUMMARY:Robots for fun and research
DESCRIPTION: In this talk\, several examples of cutting-edge research 
 in robotics will be presented\, and their implications for the future 
 of robotics will be discussed.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/588.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Verena Hafner":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:791@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T220000
DTEND;TZID=Europe/Berlin:20051227T230000
DURATION:PT1H
SUMMARY:Rückschau auf die BigBrotherAwards 2005 - Datenkraken beim Kr
 agen packen
DESCRIPTION: "The winner is ..." zumindest "unhappy". Wer einen BigBro
 therAward erhält\, hat es damit schriftlich bekommen\, dass sein Verh
 alten "evil" ist. In vielen Ländern werden BigBrotherAwards\, Datensc
 hutznegativpreise für "Datenkraken"\, vergeben. Vertreterinnen und Ve
 rtreter aus Schweiz und Deutschland präsentieren die Ergebnisse\, Hin
 tergründe und Erfolge des Jahres 2005. Im Schnelldurchgang und mit Fi
 lmbeiträgen werden Preisträger\, Trends und Tendenzen präsentiert.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/791.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="padeluun":invalid:
 nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Thomas Bader":inva
 lid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rena Tangens":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1104@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T180000
DTEND;TZID=Europe/Berlin:20051228T190000
DURATION:PT1H
SUMMARY:Search Engines - Oracles of the Information Society - The Saga
  continues: Search Engines\, Technology\, Politics\, Prostitution\, Co
 rruption\, Privacy and Espionage.
DESCRIPTION: The session will focus on the influence of search engines
  on individuals\, societies\, education and politics.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1104.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Michael Christen":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Frédéric Philipp
  Thiele":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Wolfgang Sander-Be
 uermann":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Hendrik Speck":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:599@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T130000
DTEND;TZID=Europe/Berlin:20051228T140000
DURATION:PT1H
SUMMARY:Seaside: Agile Web Application Development with Squeak
DESCRIPTION: Seaside represents a new generation of web frameworks: It
  makes web development simple and fun. Using advanced features of Sque
 ak\, Seaside is able to provide easy to use abstractions for true agil
 e development.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/599.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Marcus Denker":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:530@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T160000
DTEND;TZID=Europe/Berlin:20051230T170000
DURATION:PT1H
SUMMARY:Secure Code - Why developing Secure Software is like playing M
 arble Madness
DESCRIPTION: This talk will introduce new strategies for dealing with 
 entire bug classes\, and removing bug attractors from development envi
 ronments.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/530.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Paul Böhm":invali
 d:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:600@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T190000
DTEND;TZID=Europe/Berlin:20051230T200000
DURATION:PT1H
SUMMARY:Security Nightmares 2006 - Oder: worüber wir nächstes Jahr l
 achen werden
DESCRIPTION: Security Nightmares - der jährliche Rückblick auf die I
 T-Sicherheit und der Security-Glaskugelblick fürs nächste Jahr.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/600.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ron":invalid:nomai
 l

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Frank Rieger":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1148@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T120000
DTEND;TZID=Europe/Berlin:20051229T130000
DURATION:PT1H
SUMMARY:Sicherheit vs. Überwachung - Videoüberwachung am Beispiel de
 s Congressgebäudes
DESCRIPTION: Fortsetzung der Kameradiskussion zum Congress

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1148.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jens Ohlig":invali
 d:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="padeluun":invalid:
 nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andy Müller-Maguh
 n":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Frank Rosengart":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:593@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T120000
DTEND;TZID=Europe/Berlin:20051228T130000
DURATION:PT1H
SUMMARY:Software Patenting - Adequate means of protection for software
 .
DESCRIPTION: Patent attorneys and a few large corporations advocate pa
 tent law as an appropriate protection tool for software development. M
 ost economists\, software professionals and SMEs disagree. They believ
 e patent law does not serve market needs. This year the European Parli
 ament rejected a 'Directive on the patentability of computer-implement
 ed inventions'. However\, as the European Patent Offices continues to 
 grant them problems remain. Our expert panel with discuss further deve
 lopments.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/593.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Tonnerre Lombard":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="André Rebentisch"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1132@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T170000
DTEND;TZID=Europe/Berlin:20051228T180000
DURATION:PT1H
SUMMARY:Sony BMGs digitaler Hausfriedensbruch - Über die Durchsetzung
  industrieller Interessen um jeden Preis
DESCRIPTION: "Ich glaube\, die meisten Menschen wissen gar nicht was e
 in Rootkit ist\, warum sollen sie sich also darum kümmern?" - Thomas 
 Hesse\, Präsident Global Digital Business-Abteilung bei Sony BMG

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1132.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Markus Beckedahl":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="fukami":invalid:no
 mail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:553@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T180000
DTEND;TZID=Europe/Berlin:20051227T190000
DURATION:PT1H
SUMMARY:Syscall proxying fun and applications - Introduction to syscal
 l proxying and applications for in the wild exploitations
DESCRIPTION: This talk is about how using syscall proxying technique f
 or envolved attacks or other distributed applications. It includes sou
 rce code examples like shellcodes\, tools and a poc rootkit using this
  technique. This talk will be submited first at 0sec\, a private secur
 ity event we organize in switzerland in october.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/553.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="csk":invalid:nomai
 l

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1085@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T210000
DTEND;TZID=Europe/Berlin:20051228T220000
DURATION:PT1H
SUMMARY:Technological art off the trodden tracks - Artists (mis)using 
 technology
DESCRIPTION: A review of today's technological art scene\, with exampl
 es and discussion of their impact on our technology-driven society.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1085.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Régine Débatty":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jussi Ängeslevä"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:828@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T140000
DTEND;TZID=Europe/Berlin:20051230T150000
DURATION:PT1H
SUMMARY:Terminator Genes and GURT - Biological Restrictions Management
  - Five Years after the announcement of a quasi moratorium
DESCRIPTION: Terminator Technology prevents plants from producing repr
 oducible seeds\, acting as a sort of copy protection technology for pl
 ants. In this talk we want to talk about the technological background\
 , explaining the bits of genetic code that can switch reproduction on 
 and off. Also we want to focus on the implication of this technology\,
  the parallels to our struggles as hackers\, and the resistance to its
  introduction.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/828.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Julian 'hds' Finn"
 :invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Oliver Moldenhauer
 ":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:519@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T210000
DTEND;TZID=Europe/Berlin:20051228T220000
DURATION:PT1H
SUMMARY:The Cell Processor - Computing of Tomorrow or Yesterday
DESCRIPTION: The x86 architecture has been the de facto standard for m
 any years. Attempts to take the turn\, like Intel tried with the VLIW 
 Itanium Architetcture were desastrous. But the x86 architecture is not
  able to fulfil the demands of today's market. Several additions have 
 been proposed (MMX\,3dNow\,SSE1-3)\, but the Cell approach takes them 
 to the next level.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/519.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Torsten Hoefler":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1295@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T180000
DTEND;TZID=Europe/Berlin:20051229T190000
DURATION:PT1H
SUMMARY:The Future Challenges for a Hacker
DESCRIPTION: In the near future\, hackers are facing new challenges th
 at can't easily be compared to the ones in the recent years. Operating
  systems have been hardened and the task of taking advantage of bugs a
 nd flaws is getting more complicated every day.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1295.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="van Hauser":invali
 d:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Dan Kaminsky":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:788@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T120000
DTEND;TZID=Europe/Berlin:20051230T130000
DURATION:PT1H
SUMMARY:The Future of Virtualization - The "anyOS" paradigm and its im
 plications through virtualization
DESCRIPTION: Modern virtualization technics are changing the point of 
  view used to build software and its infrastructure.Explaining the tec
 hniques used in cutting edge virtualization software\, this talk gives
  an introspection how virtualization is solving design issues in heter
 ogenos computing environments.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/788.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix Erkinger":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1101@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T140000
DTEND;TZID=Europe/Berlin:20051227T150000
DURATION:PT1H
SUMMARY:The grey commons - Strategic considerations in the copyfight.
DESCRIPTION: Piratbyran.org in Sweden has since 2003

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1101.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Palle Torsson":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rasmus Fleischer":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1147@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T190000
DTEND;TZID=Europe/Berlin:20051228T200000
DURATION:PT1H
SUMMARY:The Realtime Podcast - Everything you need to know about Podca
 sting
DESCRIPTION: This lecture is more of a live podcast recording session 
 than a traditional talk. So you will be more of an audience in a radio
  studio while Tim is producing the podcast. In the podcast which is pr
 oduced in realtime\, Tim will lay out the various aspects of podcastin
 g including history\, background technology and future directions.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1147.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Tim Pritlove":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:575@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T170000
DTEND;TZID=Europe/Berlin:20051230T180000
DURATION:PT1H
SUMMARY:The Realtime thing - What the heck is realtime - and what to d
 o with it
DESCRIPTION: An overview on realtime software design\, with explanatio
 ns of commonly used terms and methods.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/575.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix Erkinger":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Erwin Erkinger":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:562@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T120000
DTEND;TZID=Europe/Berlin:20051229T130000
DURATION:PT1H
SUMMARY:The Right Track - A new approach to copyright in the digital w
 orld
DESCRIPTION: A discussion of the Intellectual Contributions model and 
 the Rights Office system as an alternative for regulating copyright in
  a digital environment.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/562.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Nicholas Bentley":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:336@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T210000
DTEND;TZID=Europe/Berlin:20051229T220000
DURATION:PT1H
SUMMARY:The truth about Nanotechnology - A concise introduction to wha
 t NT is\, what it can't do yet and what we should be aware of
DESCRIPTION: Nanotechnology marks the merger of different technologies
  in structures smaller than 100 nm. While it could yield some powerful
  applications for sustainability\, medicine and electronics\, some haz
 ards begin to appear that have to be addressed urgently

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/336.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Niels Boeing":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:424@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T170000
DTEND;TZID=Europe/Berlin:20051230T180000
DURATION:PT1H
SUMMARY:The very early Computer Game History - How the games have beco
 me the first digital mass product
DESCRIPTION: Andreas Lange will show the very early computer games bef
 ore they became a commercial product. If you ever want to know\, what 
 was really the first game this session will be the right one for you.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/424.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andreas Lange":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:429@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T130000
DTEND;TZID=Europe/Berlin:20051229T140000
DURATION:PT1H
SUMMARY:The Web according to W3C - How to turn your idea into a standa
 rd
DESCRIPTION: W3C brings together experts\, companies and users to defi
 ne the fundamental formats and protocols of the Web. The challenge is 
 to create a coherent system (the "Semantic Web") without forgettingeve
 rybody's short-term needs.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/429.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Bert Bos":invalid:
 nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:768@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T170000
DTEND;TZID=Europe/Berlin:20051229T180000
DURATION:PT1H
SUMMARY:Towards the first Free Software GSM Phone - Reverse Engineerin
 g the Motorola EZX (A768\,A780\,E680) series of Linux-based GSM phones
 
DESCRIPTION: This presentation describes the progress of hacking and e
 xtending the Motorola series of Linux based Smartphones\, with the ult
 imate goal to replace all proprietary applications with 100% free soft
 ware.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/768.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Harald Welte":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:521@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T110000
DTEND;TZID=Europe/Berlin:20051229T120000
DURATION:PT1H
SUMMARY:Transparenz der Verantwortung in Behörden
DESCRIPTION: Wir brauchen eine neue\, gesellschaftlich breit überzeug
 ende Lösung für das Problem mit dem Datenschutz. So wie es jetzt lä
 uft geht die Aushöhlung der Persönlichkeitsrechte durch schrittweise
  Einschränkung des Datenschutzes immer weiter. Statt dem gläsernen B
 ürger brauchen wir die gläserne Verwaltung.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/521.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Philipp Sonntag":i
 nvalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:571@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T120000
DTEND;TZID=Europe/Berlin:20051227T130000
DURATION:PT1H
SUMMARY:Understanding buffer overflow exploitation - The fascinating i
 nterplay of CPU\, stack\, C-compiler and shellcode in a nutshell
DESCRIPTION: Everything started with Aleph One's paper "Smashing the S
 tack for Fun and Profit". These techniques are still the basis for mod
 ern exploitation of buffer\, heap and format string  vulnerabilities. 
 We will give a swift overview about C functions\, stack usage\, assemb
 ler\, gcc\, gdb and how these few tools can be used to understand and 
 write shell-code to turn simple buffer overflows into backdoors that o
 pen whole systems to potential attackers. Sure you want to know how to
  defend against that. We also will tell you about that!

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/571.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Christiane Ruetten
 ":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:782@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T120000
DTEND;TZID=Europe/Berlin:20051230T130000
DURATION:PT1H
SUMMARY:Urheberrecht - Fakten\, Mythen\, Geschichte(n) und mögliche Z
 ukünfte
DESCRIPTION: Viel wird erzählt\, viel ist auch falsch\, anderes wird 
 verschwiegen Jenny-Louise Becker (Autorin des Buches "Sounds Right!" u
 nd Julian Finn (Attac\, Entropia (CCC Karlsruhe)) führen den Zuhörer
  auf eine Reise von den Anfängen des Urheberrechtes bis hin zur heuti
 gen Zeit\, räumen mit den Mythen auf und bieten Visionen an\, wohin e
 s gehen könnte. Natürlich nicht ohne die Gefahren und Abgründe zu e
 rwähnen\, die sich auftun oder noch auftun könnten.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/782.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jenny-Louise Becke
 r":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Julian 'hds' Finn"
 :invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:511@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T160000
DTEND;TZID=Europe/Berlin:20051227T170000
DURATION:PT1H
SUMMARY:Videoüberwachung an deutschen Hochschulen - oder: "Über mein
 e Maßnahmen gebe ich keine Auskunft"
DESCRIPTION: Nach den BigBrotherAwards 2004\, bei denen die Universit
 t Paderborn einen Preis für ihre Videoüberwachung abgeräumt hat\, 
 liefen einige tolle Aktionen an der Universität. Davon motiviert hat 
 der FoeBuD e.V. zusammen mit dem fzs (freier zusammenschluss studentIn
 nenschaften) ein Projekt ins Leben gerufen\, bei dem untersucht werden
  sollte\, wie weit Videoüberwachung an deutschen Hochschulen verbreit
 et ist.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/511.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Olode":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:577@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T120000
DTEND;TZID=Europe/Berlin:20051228T130000
DURATION:PT1H
SUMMARY:VoIP 2005 - Regulierte Revolution - Ansätze für die Regulier
 ung von VoIP und NGN im vergangenen Jahr
DESCRIPTION: Der Vortrag gibt einen Überblick über die Aktivitäten 
 der amerikanischen undeuropäischen Regulierungsbehörden - insbesonde
 re der Bundesnetzagentur (vormals RegTP) im Bereich Voice over IP (VoI
 P) und Next Generation Networks (NGN).

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/577.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Jörg Müller-Kind
 t":invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:565@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T220000
DTEND;TZID=Europe/Berlin:20051227T230000
DURATION:PT1H
SUMMARY:VoIPhreaking - Introduction to SIP Hacking
DESCRIPTION: Within the last year VoIP devices and applications floode
 d the market. SIP (Session Initiation Protocol) became the industry st
 andard although it's still under constant development. VoIP networks c
 onverge with thePSTN and thus offer ways and means for new (and old) a
 ttacks. The talk gives a brief introduction on how various components 
 in the VoIP universe interact. The main part deals with implementation
  problems within SIP in both end user as well as ISP site devices and 
 applications.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/565.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Hendrik Scholz":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:801@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T180000
DTEND;TZID=Europe/Berlin:20051228T190000
DURATION:PT1H
SUMMARY:Vulnerability markets - What is the economic value of a zero-d
 ay exploit?
DESCRIPTION: What is the market value of a zero-day exploit?

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/801.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rainer Böhme":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:933@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T130000
DTEND;TZID=Europe/Berlin:20051227T140000
DURATION:PT1H
SUMMARY:W3C on Mobile\, CSS\, Multimodal and more - A look at the upco
 ming standards by W3C
DESCRIPTION: W3C is developing several new Web technologies and module
 s for existing technologies\, many of which have to do with the requir
 ements of new\, mobile devices. This talk will look at a few of them.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/933.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Bert Bos":invalid:
 nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:427@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T180000
DTEND;TZID=Europe/Berlin:20051230T190000
DURATION:PT1H
SUMMARY:Wargames - Hacker Spielen - Männliche Identitätskonstruktion
  und spielerische Herangehensweisen an Computer
DESCRIPTION: In diesem Vortrag unternehme ich den Versuch\, einige Asp
 ekte der Konstruktion von Geschlechteridentitäten anhand der Figur de
 s Hackers zu beleuchten. Der Hacker als Identitätskonstruktion intere
 ssiert mich in Bezug auf den technikzentrierten Kontext\, in dem er sp
 ielerisch agiert.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/427.de.html

LOCATION:Saal 4


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Francis Hunger":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:580@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T190000
DTEND;TZID=Europe/Berlin:20051229T200000
DURATION:PT1H
SUMMARY:WarTracking - Satellite Tracking\, harvesting and security
DESCRIPTION: An spiced up introduction into the world of satellite tel
 ecommunications. We'll begin at reception setup. Explain theory behind
  the technical part of satellite telecommunications and finally presen
 t the variety of signals flowing down from orbit to the reciever. Seve
 ral hack-valued topics will be covered. Such as "Be your own satellite
  broadcaster"\, fascinating data traffic\, "Who else is listening?" an
 d self made recieving/transmitting gear.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/580.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Thomas B. Rücker 
 - dm8tbr":invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Miguel Elias":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:516@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051228T160000
DTEND;TZID=Europe/Berlin:20051228T170000
DURATION:PT1H
SUMMARY:Was ist technisches Wissen? - Philosophische Grundlagen techni
 scher Wissenschaften
DESCRIPTION: Unter dem steigenden Interesse der Technikphilosophen und
  der Diversifizierung der philosophischen Wissenschaftstheorie erschei
 nen erste Untersuchungen über technisches Wissen. Der Vortrag zeigt a
 n\, auf welchen Pfaden und mit welchen Fragen die Wissenschaftsphiloso
 phie an die Technik derzeit heran tritt. Davon ausgehend soll auch das
  gegenwärtige philosophische Bild vom technischen Wissen gezeigt werd
 en.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/516.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Sandro Gaycken":in
 valid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:920@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T190000
DTEND;TZID=Europe/Berlin:20051227T200000
DURATION:PT1H
SUMMARY:We lost the war - Welcome to the world of tomorrow
DESCRIPTION: Come to terms with the imminent loss of privacy and civil
  rights without going lethargic. We will analyse current events\, how 
 we think they will affect the issues we care about and how we can be m
 ost effective given the new circumstances. Or possibly how to simply s
 urvive the times ahead.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/920.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Rop Gonggrijp":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Frank Rieger":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:1078@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T160000
DTEND;TZID=Europe/Berlin:20051230T170000
DURATION:PT1H
SUMMARY:WiFi Long Shots - Wireless connections of 20km and more
DESCRIPTION: What you need to know to successfully design and build a 
 wifi long shot. RF Calculation. Knowledge about the Fresnel Zone. Pola
 risation of electromagnetic waves. Tricks to avoid interference. Timeo
 ut problems of 802.11abg and how to deal with them.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/1078.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Elektra Wagenrad":
 invalid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:800@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051227T180000
DTEND;TZID=Europe/Berlin:20051227T190000
DURATION:PT1H
SUMMARY:Writing better code (in Dylan) - Fast development of object-or
 iented functional programs
DESCRIPTION: An overview of the highly dynamic\, object-oriented\, fun
 ctional programming language Dylan will be given. As an example a web-
 based network management tool will be demonstrated.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/800.de.html

LOCATION:Saal 3


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Hannes Mehnert":in
 valid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Andreas Bogk":inva
 lid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:470@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051230T120000
DTEND;TZID=Europe/Berlin:20051230T130000
DURATION:PT1H
SUMMARY:WSIS - The Review - Hacking a Dictatorship
DESCRIPTION: Der zweite World Summit on the Information Society (WSIS)
  findet im November in Tunis statt. Die beiden beherrschenden Themen I
 nternet Governance und Financing Mechanism sind nicht besonders spanne
 nd. Allerdings wird der WSIS2 in Tunesien stattfinden\, einem Land mit
  einer Diktatur\, wo Menschenrechte mit Füssen getreten werden und di
 e gesamte ICT-Infrastruktur überwacht und zensiert wird.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/470.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Robert Guerra":inv
 alid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Markus Beckedahl":
 invalid:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Ralf Bendrath":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:559@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T180000
DTEND;TZID=Europe/Berlin:20051229T200000
DURATION:PT2H
SUMMARY:"Xbox" and "Xbox 360" Hacking - 17 Mistakes Microsoft Made in 
 the Xbox Security System & Xbox 360 Hacking
DESCRIPTION: A lot about Xbox hacking has been published earlier. This
  talk summarizes all this\, explains some very cool new hacks and anal
 yzes the 15 mistakes Microsoft made in the Xbox security system. It al
 so gives an introduction on the Xbox 360.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/559.de.html

LOCATION:Saal 1


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Felix Domke":inval
 id:nomail

ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Michael Steil":inv
 alid:nomail

END:VEVENT

BEGIN:VEVENT
METHOD:PUBLISH
UID:778@22C3@pentabarf.org
DTSTART;TZID=Europe/Berlin:20051229T220000
DTEND;TZID=Europe/Berlin:20051229T230000
DURATION:PT1H
SUMMARY:Zauberhafte Naturwissenschaften
DESCRIPTION: Zur Anregung\, sich mit Naturwissenschaften zu beschäfti
 gen und „einfache\, selbstverständliche“ Sachverhalte wieder frag
 würdig und problemhaltig zu machen.

CLASS:PUBLIC
STATUS:CONFIRMED
CATEGORY:Lecture
URL:http://events.ccc.de/congress/2005/fahrplan/events/778.de.html

LOCATION:Saal 2


ATTENDEE;ROLE=REQ-PARTICIPANT;CUTYPE=INDIVIDUAL;CN="Wolfgang Hahn":inv
 alid:nomail

END:VEVENT


END:VCALENDAR
