ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

254 results

Lawrence Systems
Is Fortinet That Bad?

https://lawrence.video/fortinet Forum Post https://forums.lawrencesystems.com/t/is-fortinet-that-bad/23830 In this video, I dive into ...

7:55
Is Fortinet That Bad?

51,915 views

1 year ago

Vu Hung Nguyen (Hưng)
11 The Defender s Mindset with Background Music

Software Security & Defensive Programming: Bulletproof Your Code! Overview: Dive deep into software security, exploring why ...

7:30
11 The Defender s Mindset with Background Music

1 view

3 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

488,611 views

9 months ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

This talk will focus on the most prevalent attacks faced globally and how secure coding practices can help safeguard against them ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

173,672 views

3 months ago

The Debug Zone
How to Generate Your Own Key with Python Fernet for Secure Encryption

In this video, we'll explore the powerful capabilities of Python's Fernet module for secure encryption. You'll learn how to generate ...

4:36
How to Generate Your Own Key with Python Fernet for Secure Encryption

62 views

1 year ago

OWASP Israel
AppSecIL 2017 OWT - Opening of Secure Development Training

OWT Security Training Day for Developers at OWASP AppSec Israel 2017 Conference https://appsecil.org/

19:44
AppSecIL 2017 OWT - Opening of Secure Development Training

124 views

8 years ago

Ethereum Foundation
Learn How to Secure Your Code As You Write It by Manuel Garcia

Visit the https://archive.devcon.org/ to gain access to the entire library of Devcon talks with the ease of filtering, playlists, ...

19:40
Learn How to Secure Your Code As You Write It by Manuel Garcia

257 views

6 years ago

BlueSecc
How to find sql injection vulnerabilities and how to exploit

Unlock the secrets of SQL Injection! In this video, we'll take you through a comprehensive guide on how to find and exploit SQL ...

14:54
How to find sql injection vulnerabilities and how to exploit

1,138 views

1 year ago

OWASP Foundation
Project Summit: Mobile Security Session by Jason Haddix

Project Summit: Mobile Security Session by Jason Haddix Live at Projects Summit 2013 ...

17:24
Project Summit: Mobile Security Session by Jason Haddix

0 views

Streamed 12 years ago

The Linux Foundation
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF Open source software (OSS) is the foundation for ...

8:43
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

96 views

1 year ago

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

CSIAC
The CSIAC Podcast - 5 Best Practices for Software Security

https://www.csiac.org/podcast/5-best-practices-for-software-security/ As Software becomes more complex, it is critical to ...

10:53
The CSIAC Podcast - 5 Best Practices for Software Security

331 views

5 years ago

Mental Outlaw
How Secure Is Your Password Manager?

In this video I discuss security considerations when storing passwords yourself in an offline password manager like Keepass.

10:57
How Secure Is Your Password Manager?

209,569 views

2 years ago

Luke Smith
Never say "If" writing a Bash script! (Exit codes & logical operators)

A good rule of thumb is to never use "if" statements when writing shell or bash scripts. 90% of the time, you can get what you want ...

14:50
Never say "If" writing a Bash script! (Exit codes & logical operators)

244,749 views

5 years ago

VirtualCIde
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

This is my presentation at the CSEDU 2020 conference, today (2020-05-03) about the Virtual-C IDE and teaching secure C ...

11:50
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

1,273 views

5 years ago

The Debug Zone
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

In this video, we delve into the intricacies of Spring Security's `hasPermission` method when working with collections of objects.

4:53
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

10 views

1 year ago

Vu Hung Nguyen (Hưng)
10 Hacking s Oldest Trick

Discover various compile-time defenses, including secure coding practices. • Explore run-time defenses like address space layout ...

7:03
10 Hacking s Oldest Trick

5 views

3 months ago

TalkTensors: AI Podcast Covering ML Papers
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

... functional code, they often overlook critical secure coding practices, inadvertently introducing vulnerabilities like injection flaws, ...

19:39
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

2 views

11 months ago

CTO Bhaiya
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

... tools code quality improvement AI-powered development Cursor tutorial AI-assisted coding secure coding practices software ...

11:12
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

442 views

3 months ago

Damien Burks
Accelerate Your DevSecOps Journey: 5 Key Skills in 5 Minutes

Are you stuck in your DevSecOps Journey? Do you have trouble figuring out which skills are needed for you to start or transition ...

4:51
Accelerate Your DevSecOps Journey: 5 Key Skills in 5 Minutes

769 views

2 years ago

TECH WITH STALKER
CYBERSECURITY ROADMAP🛣💻

Secure Coding Best Practices 12. Hacking IoT Devices and Security Measures 13. Wireless Network Security Best Practices 14.

11:46
CYBERSECURITY ROADMAP🛣💻

280 views

2 years ago

Drupal Association
MAKERS & BUILDERS - Security by design: protecting Drupal websites without breaking a sweat!

DrupalCon Lille 2023 Have you ever got lost on which security measures you should use in your website? Maybe not, maybe you ...

18:44
MAKERS & BUILDERS - Security by design: protecting Drupal websites without breaking a sweat!

171 views

2 years ago

CNCF [Cloud Native Computing Foundation]
Keynote: How Developers Help Scale Kubernetes Security - Connor Gorman, Red Hat

Don't miss out! Join us at our upcoming hybrid event: KubeCon + CloudNativeCon North America 2022 from October 24-28 in ...

4:27
Keynote: How Developers Help Scale Kubernetes Security - Connor Gorman, Red Hat

167 views

3 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

48,237 views

1 year ago