Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
138 results
Discussion of the real-world implementations by Google Cloud Healthcare API and Cerner, highlighting their security measures.
51 views
1 year ago
Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.
2,250 views
6 years ago
The IDA Pro APIs for interacting with type information are full of opportunities (horrible problems). I will show you how to create ...
1,119 views
10 years ago
Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have ...
5,952 views
3 years ago
Almost everyone has had a moment when they have been asked to build something quickly at 3pm on a Friday. Come explore ...
2,140 views
9 years ago
Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...
8,363 views
Although x509 certificates have been here for a while, they have become more popular for client authentication in zero-trust ...
1,992 views
2 years ago
MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...
5,533 views
Transcending Cloud Limitations by Obtaining Inner Piece ZAK BLACHER With the abundance of cloud storage providers ...
973 views
12 years ago
Join eggs-pert and creator of Yaytso, Ariel Klevecz, as he introduces us to the world of algorithmically personalized 3D eggs.
282 views
4 years ago
Collaborations Workshop 2021 (https://www.software.ac.uk/cw21) Hack Day Demo: HowDescribedIs by Daniel Garijo, Mattew ...
9 views
Modern web applications often provide features like PDF generation to enhance user experience, but these functionalities can ...
366 views
2 months ago
344 views
Using "blind" injection with http status codes to determine a "password" from an sqlite web interface. Check out pwn.college, its a ...
335 views
Collaborations Workshop 2022 (https://www.software.ac.uk/cw22) CFF in the wild by Stephan Druskat, Jez Cope, Hugo Gruson, ...
20 views
In this talk, I'll share how I won 4 Twitter contests per day, every day, for 9 months straight. I'll discuss the methods I used, the ...
209,850 views
OpenAI has confirmed a major data breach — but it wasn't a direct hack. In this video, I break down exactly what happened, how ...
43 views
4 months ago
Let's explore some recent debugging, testing and CSS improvements in DevTools (Chrome 110 - 112)!
20,866 views
Content Security Policy (CSP) is a set of rules to help mitigate and prevent attacks such as Cross Site Scripting (XSS) and data ...
10,614 views
View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...
689 views