Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
136 results
Discussion of the real-world implementations by Google Cloud Healthcare API and Cerner, highlighting their security measures.
51 views
1 year ago
Almost everyone has had a moment when they have been asked to build something quickly at 3pm on a Friday. Come explore ...
2,140 views
9 years ago
The IDA Pro APIs for interacting with type information are full of opportunities (horrible problems). I will show you how to create ...
1,119 views
10 years ago
Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...
8,359 views
3 years ago
Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.
2,249 views
6 years ago
Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have ...
5,938 views
Join eggs-pert and creator of Yaytso, Ariel Klevecz, as he introduces us to the world of algorithmically personalized 3D eggs.
282 views
4 years ago
Collaborations Workshop 2021 (https://www.software.ac.uk/cw21) Hack Day Demo: HowDescribedIs by Daniel Garijo, Mattew ...
9 views
Collaborations Workshop 2022 (https://www.software.ac.uk/cw22) CFF in the wild by Stephan Druskat, Jez Cope, Hugo Gruson, ...
20 views
MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...
5,529 views
2 years ago
Modern web applications often provide features like PDF generation to enhance user experience, but these functionalities can ...
366 views
2 months ago
Although x509 certificates have been here for a while, they have become more popular for client authentication in zero-trust ...
1,992 views
Collaborations Workshop 2021 (https://www.software.ac.uk/cw21) Hack Day Demo: Escape room by Thibault Lestang, Laura ...
14 views
In this talk, I'll share how I won 4 Twitter contests per day, every day, for 9 months straight. I'll discuss the methods I used, the ...
209,849 views
Transcending Cloud Limitations by Obtaining Inner Piece ZAK BLACHER With the abundance of cloud storage providers ...
973 views
12 years ago
Collaborations Workshop 2022 (https://www.software.ac.uk/cw22) Code Review Cupid by Declan Bays, Sherman Lo, Felicity ...
46 views
OpenAI has confirmed a major data breach — but it wasn't a direct hack. In this video, I break down exactly what happened, how ...
43 views
4 months ago
Content Security Policy (CSP) is a set of rules to help mitigate and prevent attacks such as Cross Site Scripting (XSS) and data ...
10,614 views
View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...
689 views
Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...
199 views
6 months ago