ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

264 results

Lawrence Systems
Is Fortinet That Bad?

https://lawrence.video/fortinet Forum Post https://forums.lawrencesystems.com/t/is-fortinet-that-bad/23830 In this video, I dive into ...

7:55
Is Fortinet That Bad?

51,942 views

1 year ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

This talk will focus on the most prevalent attacks faced globally and how secure coding practices can help safeguard against them ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

489,207 views

9 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

174,334 views

3 months ago

Vu Hung Nguyen (Hưng)
11 The Defender s Mindset with Background Music

Software Security & Defensive Programming: Bulletproof Your Code! Overview: Dive deep into software security, exploring why ...

7:30
11 The Defender s Mindset with Background Music

1 view

3 months ago

The Debug Zone
How to Generate Your Own Key with Python Fernet for Secure Encryption

In this video, we'll explore the powerful capabilities of Python's Fernet module for secure encryption. You'll learn how to generate ...

4:36
How to Generate Your Own Key with Python Fernet for Secure Encryption

62 views

1 year ago

OWASP Israel
AppSecIL 2017 OWT - Opening of Secure Development Training

OWT Security Training Day for Developers at OWASP AppSec Israel 2017 Conference https://appsecil.org/

19:44
AppSecIL 2017 OWT - Opening of Secure Development Training

124 views

8 years ago

BlueSecc
How to find sql injection vulnerabilities and how to exploit

Unlock the secrets of SQL Injection! In this video, we'll take you through a comprehensive guide on how to find and exploit SQL ...

14:54
How to find sql injection vulnerabilities and how to exploit

1,139 views

1 year ago

Ethereum Foundation
Learn How to Secure Your Code As You Write It by Manuel Garcia

Visit the https://archive.devcon.org/ to gain access to the entire library of Devcon talks with the ease of filtering, playlists, ...

19:40
Learn How to Secure Your Code As You Write It by Manuel Garcia

257 views

6 years ago

OWASP Foundation
Project Summit: Mobile Security Session by Jason Haddix

Project Summit: Mobile Security Session by Jason Haddix Live at Projects Summit 2013 ...

17:24
Project Summit: Mobile Security Session by Jason Haddix

0 views

Streamed 12 years ago

The Linux Foundation
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF Open source software (OSS) is the foundation for ...

8:43
Keynote: OpenSSF Security Baseline - Dana Wang, Chief Architect, OpenSSF

96 views

1 year ago

Chrome for Developers
From security as opt-in to security by default | Session

Spectre impacted the security landscape of the web significantly. In this Session, we talk about some of the security headers best ...

15:30
From security as opt-in to security by default | Session

2,524 views

4 years ago

CSIAC
The CSIAC Podcast - 5 Best Practices for Software Security

https://www.csiac.org/podcast/5-best-practices-for-software-security/ As Software becomes more complex, it is critical to ...

10:53
The CSIAC Podcast - 5 Best Practices for Software Security

331 views

5 years ago

CTO Bhaiya
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

... tools code quality improvement AI-powered development Cursor tutorial AI-assisted coding secure coding practices software ...

11:12
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

457 views

3 months ago

VirtualCIde
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

This is my presentation at the CSEDU 2020 conference, today (2020-05-03) about the Virtual-C IDE and teaching secure C ...

11:50
A New Programming Environment for Teaching Secure C Programming and Assessment (CSEDU 2020)

1,274 views

5 years ago

Mental Outlaw
How Secure Is Your Password Manager?

In this video I discuss security considerations when storing passwords yourself in an offline password manager like Keepass.

10:57
How Secure Is Your Password Manager?

209,602 views

2 years ago

Luke Smith
Never say "If" writing a Bash script! (Exit codes & logical operators)

A good rule of thumb is to never use "if" statements when writing shell or bash scripts. 90% of the time, you can get what you want ...

14:50
Never say "If" writing a Bash script! (Exit codes & logical operators)

244,804 views

5 years ago

Vu Hung Nguyen (Hưng)
10 Hacking s Oldest Trick

Discover various compile-time defenses, including secure coding practices. • Explore run-time defenses like address space layout ...

7:03
10 Hacking s Oldest Trick

5 views

3 months ago

The Debug Zone
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

In this video, we delve into the intricacies of Spring Security's `hasPermission` method when working with collections of objects.

4:53
Spring Security hasPermission for CollectionObject: Solutions and Best Practices

10 views

1 year ago

TalkTensors: AI Podcast Covering ML Papers
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

... functional code, they often overlook critical secure coding practices, inadvertently introducing vulnerabilities like injection flaws, ...

19:39
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

2 views

11 months ago