ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

299 results

The Debug Zone
How to Protect Against CSRF on Static Sites: Essential Security Tips

... #staticsitevulnerabilities, #cybersecuritytips, #securecoding, #webdevelopmentsecurity, #onlinesecuritymeasures, ...

2:33
How to Protect Against CSRF on Static Sites: Essential Security Tips

15 views

7 months ago

BSidesLV
Hacking Secure Coding Into Education

Hacking Secure Coding Into Education” - Shares experience teaching secure coding to students. - Introduces open GitHub repo ...

25:16
Hacking Secure Coding Into Education

15 views

1 month ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

488,762 views

9 months ago

BSides Belfast
Application Security in the Age of Vibe Coding  - Ciaran Conliffe

You'll learn what actions you can take to make sure that your developers can continue to produce secure code while still taking ...

34:43
Application Security in the Age of Vibe Coding - Ciaran Conliffe

38 views

1 month ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

173,807 views

3 months ago

Vu Hung Nguyen (Hưng)
11 The Defender s Mindset with Background Music

Software Security & Defensive Programming: Bulletproof Your Code! Overview: Dive deep into software security, exploring why ...

7:30
11 The Defender s Mindset with Background Music

1 view

3 months ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

This talk will focus on the most prevalent attacks faced globally and how secure coding practices can help safeguard against them ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

The Debug Zone
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

In today's digital landscape, ensuring the security of web applications is more crucial than ever. One effective way to enhance ...

2:19
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

37 views

11 months ago

Bulgarian Java User Group
Secure Programming in Java, Christian Heitzmann

Developers and users of Java software are generally immune to many security problems that are still problematic in other ...

50:14
Secure Programming in Java, Christian Heitzmann

165 views

8 months ago

The Debug Zone
Secure User Script Execution: Best Practices for Safe Scripting Solutions

In today's digital landscape, ensuring the security of user scripts is more crucial than ever. As developers and organizations ...

1:30
Secure User Script Execution: Best Practices for Safe Scripting Solutions

0 views

2 months ago

Gnar Coding
Full Stack SQL Injection Lab: Break It, Then Secure It

Check out this video that explains the anatomy of a SQL injection attack using a full stack web app! Learn how to setup a full home ...

41:56
Full Stack SQL Injection Lab: Break It, Then Secure It

1,481 views

7 months ago

Southern California Linux Expo
Automated secure mobile code reviews using Danger

Ensuring secure coding practices protects user information and maintains application integrity. However, consistently enforcing ...

45:34
Automated secure mobile code reviews using Danger

15 views

8 months ago

CTO Bhaiya
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

... tools code quality improvement AI-powered development Cursor tutorial AI-assisted coding secure coding practices software ...

11:12
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

442 views

3 months ago

Vu Hung Nguyen (Hưng)
10 Hacking s Oldest Trick

Discover various compile-time defenses, including secure coding practices. • Explore run-time defenses like address space layout ...

7:03
10 Hacking s Oldest Trick

5 views

3 months ago

The Debug Zone
Understanding Security Risks of Perl's /e Modifier: Best Practices and Solutions

In this video, we delve into the security implications of using Perl's /e modifier, a powerful feature that can introduce vulnerabilities ...

1:29
Understanding Security Risks of Perl's /e Modifier: Best Practices and Solutions

12 views

7 months ago

BSidesSLC
BSidesSLC 2025 - Buffer Overflows Demystified – Chaitanya Rahalkar on Exploits & Patching

... for bypassing common mitigations -Strategies for secure coding and effective patch development Whether you're a red teamer, ...

24:28
BSidesSLC 2025 - Buffer Overflows Demystified – Chaitanya Rahalkar on Exploits & Patching

100 views

7 months ago

WordPress
WordPress Security Beyond Plugins

... explores fundamental security practices including server hardening, database protection, authentication systems, secure coding ...

29:31
WordPress Security Beyond Plugins

11 views

1 month ago

The Debug Zone
Is std::random_device Cryptographically Secure? Exploring the Truth Behind C++ Randomness

... #cryptography, #programmingtutorials, #softwaredevelopment, #c++bestpractices, #randomnumberalgorithms, #securecoding, ...

1:32
Is std::random_device Cryptographically Secure? Exploring the Truth Behind C++ Randomness

9 views

7 months ago

TalkTensors: AI Podcast Covering ML Papers
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

... functional code, they often overlook critical secure coding practices, inadvertently introducing vulnerabilities like injection flaws, ...

19:39
Unraveling the Double-Edged Sword: LLMs and Code Security Risks

2 views

11 months ago

DEFCONConference
DEF CON 33 - State of Open Source in the Federal Government - Jordan Kasper

Jordan Kasper started programming in 1993 and has developed systems on platforms ranging from IBM mainframes to TI ...

37:02
DEF CON 33 - State of Open Source in the Federal Government - Jordan Kasper

396 views

3 months ago

Alex Followell | AI Automation
Clawdbot: Complete Beginner Guide! (2026)

Get the Prompts + Templates: https://www.skool.com/the-ai-edge/about Ready to transform your business with AI? Let's talk: ...

23:12
Clawdbot: Complete Beginner Guide! (2026)

19,220 views

5 days ago

OWASP London
Trust and Traceability: Developer Observability in the AI-Powered SDLC -- Matias Madou

APOLOGIES FOR SOME SOUND ISSUES IN THIS VIDEO "Trust and Traceability: Developer Observability in the AI-Powered ...

35:20
Trust and Traceability: Developer Observability in the AI-Powered SDLC -- Matias Madou

97 views

3 months ago

Shield Forge InfoSec
Broken Access Control Explained | OWASP Top 10 Bug Bounty Hunting Guide

... payouts Bug-hunting tips: Finding access control flaws in web apps & APIs Secure coding practices to protect against BAC ...

7:12
Broken Access Control Explained | OWASP Top 10 Bug Bounty Hunting Guide

91 views

5 months ago

The Diana Initiative
Diana Initiative 2025-Tanya Janca- Security Champion Worst Practices

About Tanya Janca: Tanya Janca, aka SheHacksPurple, is the best-selling author of 'Alice and Bob Learn Secure Coding', 'Alice ...

40:48
Diana Initiative 2025-Tanya Janca- Security Champion Worst Practices

50 views

4 months ago

The Debug Zone
How to Add Security Headers in C# ASP.NET to Prevent Injection Attacks

Related to: #c#, #asp.net, #securityheaders, #injectionattacks, #websecurity, #preventinjection, #securecoding, #httpheaders, ...

2:05
How to Add Security Headers in C# ASP.NET to Prevent Injection Attacks

5 views

6 months ago