ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

261 results

Lawrence Systems
Is Fortinet That Bad?

https://lawrence.video/fortinet Forum Post https://forums.lawrencesystems.com/t/is-fortinet-that-bad/23830 In this video, I dive into ...

7:55
Is Fortinet That Bad?

51,920 views

1 year ago

Vu Hung Nguyen (Hưng)
11 The Defender s Mindset with Background Music

Software Security & Defensive Programming: Bulletproof Your Code! Overview: Dive deep into software security, exploring why ...

7:30
11 The Defender s Mindset with Background Music

1 view

3 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

488,753 views

9 months ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

This talk will focus on the most prevalent attacks faced globally and how secure coding practices can help safeguard against them ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

173,807 views

3 months ago

The Debug Zone
How to Generate Your Own Key with Python Fernet for Secure Encryption

In this video, we'll explore the powerful capabilities of Python's Fernet module for secure encryption. You'll learn how to generate ...

4:36
How to Generate Your Own Key with Python Fernet for Secure Encryption

62 views

1 year ago

OWASP Israel
AppSecIL 2017 OWT - Opening of Secure Development Training

OWT Security Training Day for Developers at OWASP AppSec Israel 2017 Conference https://appsecil.org/

19:44
AppSecIL 2017 OWT - Opening of Secure Development Training

124 views

8 years ago

Ethereum Foundation
Learn How to Secure Your Code As You Write It by Manuel Garcia

Visit the https://archive.devcon.org/ to gain access to the entire library of Devcon talks with the ease of filtering, playlists, ...

19:40
Learn How to Secure Your Code As You Write It by Manuel Garcia

257 views

6 years ago

OWASP Foundation
Project Summit: Mobile Security Session by Jason Haddix

Project Summit: Mobile Security Session by Jason Haddix Live at Projects Summit 2013 ...

17:24
Project Summit: Mobile Security Session by Jason Haddix

0 views

Streamed 12 years ago

The Linux Foundation
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF Open source software (OSS) is the foundation for ...

8:43
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

96 views

1 year ago

BlueSecc
How to find sql injection vulnerabilities and how to exploit

Unlock the secrets of SQL Injection! In this video, we'll take you through a comprehensive guide on how to find and exploit SQL ...

14:54
How to find sql injection vulnerabilities and how to exploit

1,138 views

1 year ago

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

CSIAC
The CSIAC Podcast - 5 Best Practices for Software Security

https://www.csiac.org/podcast/5-best-practices-for-software-security/ As Software becomes more complex, it is critical to ...

10:53
The CSIAC Podcast - 5 Best Practices for Software Security

331 views

5 years ago

VirtualCIde
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

This is my presentation at the CSEDU 2020 conference, today (2020-05-03) about the Virtual-C IDE and teaching secure C ...

11:50
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

1,273 views

5 years ago

CTO Bhaiya
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

... tools code quality improvement AI-powered development Cursor tutorial AI-assisted coding secure coding practices software ...

11:12
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

442 views

3 months ago

Mental Outlaw
How Secure Is Your Password Manager?

In this video I discuss security considerations when storing passwords yourself in an offline password manager like Keepass.

10:57
How Secure Is Your Password Manager?

209,576 views

2 years ago

Vu Hung Nguyen (Hưng)
10 Hacking s Oldest Trick

Discover various compile-time defenses, including secure coding practices. • Explore run-time defenses like address space layout ...

7:03
10 Hacking s Oldest Trick

5 views

3 months ago

The Debug Zone
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

In this video, we delve into the intricacies of Spring Security's `hasPermission` method when working with collections of objects.

4:53
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

10 views

1 year ago

TalkTensors: AI Podcast Covering ML Papers
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

... functional code, they often overlook critical secure coding practices, inadvertently introducing vulnerabilities like injection flaws, ...

19:39
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

2 views

11 months ago

Damien Burks
Accelerate Your DevSecOps Journey: 5 Key Skills in 5 Minutes

Are you stuck in your DevSecOps Journey? Do you have trouble figuring out which skills are needed for you to start or transition ...

4:51
Accelerate Your DevSecOps Journey: 5 Key Skills in 5 Minutes

769 views

2 years ago