ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

542 results

Improbable Matter
How a Computer Works - from silicon to apps

A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...

42:32
How a Computer Works - from silicon to apps

1,947,471 views

5 years ago

The Muhammadan Way Sufi Realities
Relationships Become Successful When All Members Adhere to the Binary Code

Importance of Wife and Husband carrying out the correct role that God chose for them. The binary code, where the Wife submits to ...

39:45
Relationships Become Successful When All Members Adhere to the Binary Code

7,921 views

2 years ago

DEFCONConference
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...

45:58
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

13,371 views

10 years ago

Carnegie Mellon University Libraries
Episode 3 | Leibniz, Turing, Enigma: Collecting the History of Computing at CMU Libraries

In this third episode of “Coffee with the Curator"—a series featuring distinctive objects from Carnegie Mellon University's collection ...

25:34
Episode 3 | Leibniz, Turing, Enigma: Collecting the History of Computing at CMU Libraries

722 views

4 years ago

All Systems Go!
GNU poke, an extensible editor for structured binary data

https://media.ccc.de/v/ASG2019-127-gnu-poke-an-extensible-editor-for-structured-binary-data GNU poke is a new interactive ...

44:13
GNU poke, an extensible editor for structured binary data

1,950 views

6 years ago

HomoFaciens
Computing

Table of content: 00:05 Introduction 00:25 Binary versus decimal numeral sytem 01:55 Bit and Byte 02:31 NOR SR latch 05:36 ...

42:29
Computing

8,035 views

12 years ago

Hillary Fleenor
NumerSystems

Binary and Hexadecimal.

21:39
NumerSystems

212 views

7 years ago

the best way to count
the best way to count

an introduction to a numbering system that's objectively better than seximal - external links - footnotes, script, other readables: ...

1:12:01
the best way to count

447,692 views

2 years ago

Andrew Adams
Halide Talk

This is a talk about the programming language Halide. See halide-lang.org for more details.

25:52
Halide Talk

52,230 views

11 years ago

DEFCONConference
DEF CON 31 - Revolutionizing ELF binary patching w Shiva   - ElfMaster

Shiva allows developers to write patches in rich C code to naturally express the rewriting of binary code at runtime, in a high level ...

45:48
DEF CON 31 - Revolutionizing ELF binary patching w Shiva - ElfMaster

2,529 views

2 years ago

DEFCONConference
Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference

WebAssembly is the newest way to play video games in your web browser. Both Unity3d and Unreal Engine now support ...

38:17
Jack Baker - Hacking WebAssembly Games with Binary Instrumentation - DEF CON 27 Conference

12,510 views

6 years ago

DEFCONConference
DEF CON 23 - Atlas - Fun with Symboliks

Materials Available ...

42:20
DEF CON 23 - Atlas - Fun with Symboliks

5,351 views

10 years ago

World of OSes
Number Bases

Table of Contents - - - 00:00 Intro 01:10 Factors 01:38 Fractions 03:00 Times Tables 09:25 Multiples 11:07 Doubleing 11:56 ...

24:30
Number Bases

3,987 views

8 years ago

Queso Fuego
16 Bit Real Mode Example with C/Inline Asm

With inline assembly and linker scripts. Showing a basic boot sector/2nd stage/"kernel" flat binary example to print a string.

41:56
16 Bit Real Mode Example with C/Inline Asm

1,713 views

1 year ago

DEFCONConference
DEF CON 24 Conference   Mike   Use Their Machines Against Them   Loading Code with a Copier

We've all worked on 'closed systems' with little to no direct Internet access. And we've all struggled with the limitations those ...

30:27
DEF CON 24 Conference Mike Use Their Machines Against Them Loading Code with a Copier

2,813 views

9 years ago

OpenSecurityTraining2
RE3201 04 SymMem 02 moon

View the full free MOOC at https://ost2.fyi/RE3201. This course will be an advanced reverse engineering class for security ...

24:22
RE3201 04 SymMem 02 moon

486 views

2 years ago

Dr. Lindsay Waldrop
L1.2 - How Computers Work (Intro to R)

First content lecture in an Intro to R unit. It covers the basics of how computers work, with a little help from code.org's video library!

36:03
L1.2 - How Computers Work (Intro to R)

409 views

4 years ago

CSE Learning
Number System Conversion Without Formula ✅ | Binary Decimal Hex

This video explains number system conversions in the easiest way without memorizing any formulas. You will learn how to ...

50:24
Number System Conversion Without Formula ✅ | Binary Decimal Hex

90 views

5 years ago

Alter Conf
Alterconf Toronto 2015 - Y/N?: binary for humans by Haleigh Sheehan

Y/N?: binary for humans Everything we say to computers can be expressed in ones and zeros. On or off. Open or closed. Yes or ...

26:54
Alterconf Toronto 2015 - Y/N?: binary for humans by Haleigh Sheehan

67 views

10 years ago

CodeRefinery
6.4 Workshop outro - CodeRefinery 2023 Sep

The concluding remarks of the workshop. Outro presentation (will be updated in the future): ...

23:27
6.4 Workshop outro - CodeRefinery 2023 Sep

24 views

2 years ago

Dwight Hughes
NTEC 103 Module 1 Lecture Video - Number Systems

The 1st in the IP Subnetting lecture series for the NTEC 103 IP Subnetting course at Clark College. In this lecture Professor Dwight ...

23:03
NTEC 103 Module 1 Lecture Video - Number Systems

1,259 views

9 years ago

LemonQueeze
Custom packet encoding in Godot

Learn how I reduced my packet size in Godot by 95% by using custom packet encoding. My video on how to send binary packets: ...

48:54
Custom packet encoding in Godot

540 views

1 year ago

BioniChaos
Exploring BreastMNIST: AI Tools, Binary Classification & Data Visualization Guide

In this video, I walk you through an in-depth exploration of my website, bionichaos.com, where I showcase a range of interactive ...

23:25
Exploring BreastMNIST: AI Tools, Binary Classification & Data Visualization Guide

80 views

10 months ago

DEFCONConference
Hila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 Conference

During a classic cyber attack, one of the major offensive goals is to execute code remotely on valuable machines. The purpose of ...

37:35
Hila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 Conference

1,251 views

6 years ago

SiliconANGLE theCUBE
Shlomi Ben Haim, JFrog | CUBE Conversation Sept 2017

Shlomi Ben Haim, CEO and Co-Founder, JFrog sat down with John Furrier at theCUBE Studios in Palo Alto #CUBEConversation ...

22:13
Shlomi Ben Haim, JFrog | CUBE Conversation Sept 2017

821 views

8 years ago