{"guid":"import-e6b3200a23ed44995e","title":"Zero Tool Hacking","subtitle":null,"slug":"19C3-448-zero-tool-hacking","link":"http://www.ccc.de/congress/2002/fahrplan/event/448.en.html","description":"or: Options and Uses of Utils you have never heard before\n","original_language":"eng","persons":[],"tags":["19c3"],"view_count":190,"promoted":false,"date":"2002-01-01T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-05T13:15:12.313+01:00","length":3302,"duration":3302,"thumb_url":"https://static.media.ccc.de/media/congress/2002/19C3-448-zero-tool-hacking.jpg","poster_url":"https://static.media.ccc.de/media/congress/2002/19C3-448-zero-tool-hacking_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2002/import-e6b3200a23ed44995e-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2002/import-e6b3200a23ed44995e-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/19C3-448-zero-tool-hacking","url":"https://api.media.ccc.de/public/events/import-e6b3200a23ed44995e","conference_title":"19C3: Out Of Order","conference_url":"https://api.media.ccc.de/public/conferences/19c3","related":[{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":8},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":9},{"event_id":714,"event_guid":"import-72f36f6e2f89c8ba36","weight":4},{"event_id":720,"event_guid":"import-a479932fbfd0650ddf","weight":4},{"event_id":737,"event_guid":"import-26327c95883d3939d5","weight":5},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":8},{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":8},{"event_id":749,"event_guid":"import-849c60e1dfce00f547","weight":6},{"event_id":752,"event_guid":"import-ebd04c7e96a2a62450","weight":6},{"event_id":756,"event_guid":"import-61262399b0beda7cb0","weight":7},{"event_id":758,"event_guid":"import-540cd24572d4e80cfc","weight":4},{"event_id":761,"event_guid":"import-9407d03f44908c0cf5","weight":5},{"event_id":763,"event_guid":"import-4099fe221ad402ce1d","weight":4},{"event_id":764,"event_guid":"import-ec30852f5b7122171e","weight":6},{"event_id":768,"event_guid":"import-340bde5c179b953db1","weight":4},{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":4},{"event_id":797,"event_guid":"import-99180de8618aece534","weight":4}],"recordings":[{"size":null,"length":3300,"mime_type":"video/mp4","language":"eng","filename":"19C3-448-zero-tool-hacking.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:09.742+01:00","recording_url":"https://cdn.media.ccc.de/congress/2002/mp4/19C3-448-zero-tool-hacking.mp4","url":"https://api.media.ccc.de/public/recordings/3887","event_url":"https://api.media.ccc.de/public/events/import-e6b3200a23ed44995e","conference_url":"https://api.media.ccc.de/public/conferences/19c3"},{"size":null,"length":3302,"mime_type":"audio/mpeg","language":"eng","filename":"19C3-448-zero-tool-hacking.mp3","state":"downloaded","folder":"lectures","high_quality":true,"width":null,"height":null,"updated_at":"2014-06-29T00:22:29.547+02:00","recording_url":"https://cdn.media.ccc.de/congress/2002/lectures/19C3-448-zero-tool-hacking.mp3","url":"https://api.media.ccc.de/public/recordings/3936","event_url":"https://api.media.ccc.de/public/events/import-e6b3200a23ed44995e","conference_url":"https://api.media.ccc.de/public/conferences/19c3"}]}