ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

79 results

DEFCONConference
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

PULL OVER! No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt ...

41:18
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

688,564 views

6 years ago

DEFCONConference
DEF CON 23 - Atlas - Fun with Symboliks

Materials Available ...

42:20
DEF CON 23 - Atlas - Fun with Symboliks

5,351 views

10 years ago

DEFCONConference
DEF CON 24 - Panel - MR ROBOT Panel

MR. ROBOT is a rare treat - a network television show whose hacker protagonist is a fully realized character with a realistically ...

1:20:42
DEF CON 24 - Panel - MR ROBOT Panel

71,233 views

9 years ago

DEFCONConference
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.

39:03
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

135,175 views

6 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such as HTTPS ...

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,053 views

9 years ago

DEFCONConference
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...

21:39
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

1,386 views

12 years ago

NUS Hackers
FH #279: Notional Machines for Modern Scripting Languages

Introductory CS courses often use scripting languages such as Python. A notional machine is a predictive set of abstractions ...

44:07
FH #279: Notional Machines for Modern Scripting Languages

80 views

5 months ago

DEFCONConference
DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers

TASBot is an augmented Nintendo R.O.B. robot that can play video games without any of the button mashing limitations us ...

41:57
DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers

2,877 views

9 years ago

Alex The Analyst
Automating Crypto Website API Pull Using Python | Data Analyst Project

Take my Full Python Course Here: https://bit.ly/48O581R In this project we look at automating this API pull as well as cleaning up ...

51:14
Automating Crypto Website API Pull Using Python | Data Analyst Project

93,542 views

3 years ago

DEFCONConference
DEF CON 30 - Eugene Lim-  You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties

First defined in 1998, the iCalendar standard remains ubiquitous in enterprise software. However, it did not account for modern ...

33:40
DEF CON 30 - Eugene Lim- You Have 1 New Appwntment - Hacking Proprietary iCalendar Properties

2,651 views

3 years ago

DEFCONConference
DEF CON 24 - Chris Rock - How to Overthrow a Government

Direct from the mind of the guy who bought you the "I will kill you" presentation at DEF CON 23, is another mind bending, ...

42:20
DEF CON 24 - Chris Rock - How to Overthrow a Government

267,516 views

9 years ago

NPTEL IIT Bombay
Tutorial 01: Python Programming From Beginner Perspective

Week 1: Tutorial 01: Python Programming From Beginner Perspective.

38:54
Tutorial 01: Python Programming From Beginner Perspective

3,030 views

4 years ago

DEFCONConference
DEF CON 30 - stacksmashing  - The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking

Apple's Lightning connector was introduced almost 10 years ago - and under the hood it can be used for much more than just ...

20:13
DEF CON 30 - stacksmashing - The Hitchhacker’s Guide to iPhone Lightning and JTAG Hacking

197,991 views

3 years ago

Missing Semester
Lecture 5: Command-line Environment (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/command-line/ Help us caption ...

56:07
Lecture 5: Command-line Environment (2020)

123,562 views

6 years ago

DEFCONConference
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...

44:20
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

5,527 views

9 years ago

DEFCONConference
DEF CON 24 - Fred Bret Mounet - All Your Solar Panels are belong to Me

I got myself a new toy: A solar array… With it, a little device by a top tier manufacturer that manages its performance and reports ...

22:23
DEF CON 24 - Fred Bret Mounet - All Your Solar Panels are belong to Me

5,538 views

9 years ago

DEFCONConference
DEF CON 24 - DC101 - DEF CON 101 Panel

DEF CON has changed for the better since the days at the Alexis Park. It has evolved from a few speaking tracks to an event that ...

1:32:24
DEF CON 24 - DC101 - DEF CON 101 Panel

2,890 views

9 years ago

DEFCONConference
DEF CON 31 - HL7Magic  Medical Data Hacking Made Easy - Katie Inns

In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...

21:36
DEF CON 31 - HL7Magic Medical Data Hacking Made Easy - Katie Inns

2,396 views

2 years ago

Jeremy Howard
Lesson 8 - Practical Deep Learning for Coders 2022

00:00 - Neural net from scratch 04:46 - Parameters in PyTorch 07:42 - Embedding from scratch 12:21 - Embedding interpretation ...

1:36:55
Lesson 8 - Practical Deep Learning for Coders 2022

46,890 views

3 years ago

DEFCONConference
DEF CON 24 Conference - Aaron Luo - Drones Hijacking: Multidimensional attack vectors and countermea

Drone related applications have sprung up in the recent years, and the drone security has also became a hot topic in the security ...

45:39
DEF CON 24 Conference - Aaron Luo - Drones Hijacking: Multidimensional attack vectors and countermea

7,087 views

9 years ago