Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
79 results
PULL OVER! No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt ...
688,564 views
6 years ago
Materials Available ...
5,351 views
10 years ago
MR. ROBOT is a rare treat - a network television show whose hacker protagonist is a fully realized character with a realistically ...
71,233 views
9 years ago
Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.
135,175 views
Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such as HTTPS ...
3,053 views
How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...
1,386 views
12 years ago
Introductory CS courses often use scripting languages such as Python. A notional machine is a predictive set of abstractions ...
80 views
5 months ago
TASBot is an augmented Nintendo R.O.B. robot that can play video games without any of the button mashing limitations us ...
2,877 views
Take my Full Python Course Here: https://bit.ly/48O581R In this project we look at automating this API pull as well as cleaning up ...
93,542 views
3 years ago
First defined in 1998, the iCalendar standard remains ubiquitous in enterprise software. However, it did not account for modern ...
2,651 views
Direct from the mind of the guy who bought you the "I will kill you" presentation at DEF CON 23, is another mind bending, ...
267,516 views
Week 1: Tutorial 01: Python Programming From Beginner Perspective.
3,030 views
4 years ago
Apple's Lightning connector was introduced almost 10 years ago - and under the hood it can be used for much more than just ...
197,991 views
You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/command-line/ Help us caption ...
123,562 views
Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...
5,527 views
I got myself a new toy: A solar array… With it, a little device by a top tier manufacturer that manages its performance and reports ...
5,538 views
DEF CON has changed for the better since the days at the Alexis Park. It has evolved from a few speaking tracks to an event that ...
2,890 views
In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...
2,396 views
2 years ago
00:00 - Neural net from scratch 04:46 - Parameters in PyTorch 07:42 - Embedding from scratch 12:21 - Embedding interpretation ...
46,890 views
Drone related applications have sprung up in the recent years, and the drone security has also became a hot topic in the security ...
7,087 views