Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
127 results
Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.
6,540 views
3 weeks ago
Thanks to @fragram76, we're discovering the extensions to the Commodore 128 BASIC v7 he created to draw on a 640x200 graphics ...
593 views
2 weeks ago
In this video, we dive into client and server network communication within C++, building our own custom RAT (Remote ...
1,549 views
Video on Truthtable Contradiction by Mrs. Supriya N. Deshmukh from Computer Dept.
22 views
Learn to compress, hide, and move large amounts of data. This is the foundation of data exfiltration and managing toolkits.
52 views
Lezione L40 (07/01/2025): Tema d'esame "Mastermind" Corso: Informatica (codice 14BHD, corso 9), Politecnico di Torino, Anno ...
904 views
00:00 Intro 01:34 The Origins 03:29 The Fundamental Principles 08:54 The Philosophical Dimension 10:06 Richard Gabriel's ...
4,195 views
How to make an array based queue data structure in C + Raylib visualization at the end! In computer science, a queue is an ...
278 views
12 days ago
Learn how to find anyone online using Sherlock, a powerful OSINT tool for username reconnaissance. In this video, I walk you ...
528 views
5 days ago
Hackers don't browse; they search. Master grep, find, and locate to extract sensitive information from massive logs and directories.
106 views
Video on Huffman Algorithm by Mrs.Supriya N.Deshmukh from Computer Dept.
6 views
This video is presented by MS.V.M.Dilpak Assistant Professor in the IT department . This video explains the fundamentals of ...
11 views
4 weeks ago
Video on Prim's Algorithm by Mrs. Supriya N. Deshmukh from Computer Dept.
8 views
In this video, you'll learn how hackers gather critical system information in Linux. We cover essential commands used to identify ...
274 views
Can you really run AI locally on a NAS — and does it actually make sense? In this video, I take a deep dive into the Zettlab AI NAS ...
518 views
In this video, I introduce the concept of views, showing their usefulness and syntax in detail. Then, using examples, I ...
64 views
Video on Mathematical Induction by Mrs. Supriya N. Deshmukh from Computer Dept.
12 views
Why the Linux Kernel Doesn't Use Modulo (%) | High-Perf Queues In Part 1, we built a queue that was easy to read using the ...
2,859 views
10 days ago
Video on Graph Coloring & Chromatic Numbers by Mrs.Supriya N.Deshmukh from Computer Dept.
4 views
Stop using the GUI. Master the speed of the Linux terminal to move through directories, manipulate files, and find what you need ...
132 views
Learn how hackers analyze user accounts and permissions in Linux systems. This video explains user information, groups, login ...
95 views
Lesson L41 (07/01/2025): Exam Topic "Drawing" Course: Computer Science (code 14BHD, course 9), Polytechnic University of ...
788 views
If you can't network, you can't hack. We dive into IP addresses, ports, and active connections to see exactly what's leaving your ...
105 views
A little support goes a long way! If you'd like to help me keep creating, you can do so at https://ko-fi.com/roccotaco Is your iPhone ...
Video on Composition of a function by Mrs.Supriya N.Deshmukh from Computer Dept.