ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

278 results

Tom Olzak
Secure Coding Practices

In this video, we're going to treat secure coding like an engineering workflow—not a pile of tips. We'll start by identifying common ...

15:58
Secure Coding Practices

11 views

5 days ago

Vu Hung Nguyen (Hưng)
11 The Defender s Mindset with Background Music

Software Security & Defensive Programming: Bulletproof Your Code! Overview: Dive deep into software security, exploring why ...

7:30
11 The Defender s Mindset with Background Music

1 view

4 months ago

The Debug Zone
How to Protect Against CSRF on Static Sites: Essential Security Tips

... #staticsitevulnerabilities, #cybersecuritytips, #securecoding, #webdevelopmentsecurity, #onlinesecuritymeasures, ...

2:33
How to Protect Against CSRF on Static Sites: Essential Security Tips

15 views

8 months ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

493,633 views

9 months ago

BSidesLV
Hacking Secure Coding Into Education

Hacking Secure Coding Into Education” - Shares experience teaching secure coding to students. - Introduces open GitHub repo ...

25:16
Hacking Secure Coding Into Education

15 views

2 months ago

Vu Hung Nguyen (Hưng)
10 Hacking s Oldest Trick

Discover various compile-time defenses, including secure coding practices. • Explore run-time defenses like address space layout ...

7:03
10 Hacking s Oldest Trick

5 views

4 months ago

BSides Belfast
Application Security in the Age of Vibe Coding  - Ciaran Conliffe

You'll learn what actions you can take to make sure that your developers can continue to produce secure code while still taking ...

34:43
Application Security in the Age of Vibe Coding - Ciaran Conliffe

41 views

1 month ago

DevConf
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

This talk will focus on the most prevalent attacks faced globally and how secure coding practices can help safeguard against them ...

15:14
Locking Down PII: Why a Strong Frontend is Your First Defense - DevConf.CZ 2025

11 views

7 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

184,388 views

3 months ago

The Debug Zone
Secure User Script Execution: Best Practices for Safe Scripting Solutions

In today's digital landscape, ensuring the security of user scripts is more crucial than ever. As developers and organizations ...

1:30
Secure User Script Execution: Best Practices for Safe Scripting Solutions

0 views

2 months ago

The Debug Zone
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

In today's digital landscape, ensuring the security of web applications is more crucial than ever. One effective way to enhance ...

2:19
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

40 views

11 months ago

Duncan Rogoff | AI Automation
63 insane ClawdBot use cases you need to do immediately!

ClawdBot is a 24/7 AI agent employee and it is the most powerful technology I've ever used. Here's how to get the most out of it ...

14:19
63 insane ClawdBot use cases you need to do immediately!

43,980 views

13 days ago

The Debug Zone
Understanding Security Risks of Perl's /e Modifier: Best Practices and Solutions

In this video, we delve into the security implications of using Perl's /e modifier, a powerful feature that can introduce vulnerabilities ...

1:29
Understanding Security Risks of Perl's /e Modifier: Best Practices and Solutions

12 views

7 months ago

Bulgarian Java User Group
Secure Programming in Java, Christian Heitzmann

Developers and users of Java software are generally immune to many security problems that are still problematic in other ...

50:14
Secure Programming in Java, Christian Heitzmann

169 views

8 months ago

Gnar Coding
Full Stack SQL Injection Lab: Break It, Then Secure It

Check out this video that explains the anatomy of a SQL injection attack using a full stack web app! Learn how to setup a full home ...

41:56
Full Stack SQL Injection Lab: Break It, Then Secure It

1,501 views

7 months ago

The Debug Zone
Is std::random_device Cryptographically Secure? Exploring the Truth Behind C++ Randomness

... #cryptography, #programmingtutorials, #softwaredevelopment, #c++bestpractices, #randomnumberalgorithms, #securecoding, ...

1:32
Is std::random_device Cryptographically Secure? Exploring the Truth Behind C++ Randomness

9 views

7 months ago

Alex Followell | AI Automation
Clawdbot: Complete Beginner Guide! (2026)

Get the Prompts + Templates: https://www.skool.com/the-ai-edge/about Ready to transform your business with AI? Let's talk: ...

23:12
Clawdbot: Complete Beginner Guide! (2026)

29,701 views

2 weeks ago

CTO Bhaiya
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

... tools code quality improvement AI-powered development Cursor tutorial AI-assisted coding secure coding practices software ...

11:12
L-12 | Code Review and Rules with Cursor AI | ✅ #cursor #aicoding

522 views

3 months ago

Southern California Linux Expo
Automated secure mobile code reviews using Danger

Ensuring secure coding practices protects user information and maintains application integrity. However, consistently enforcing ...

45:34
Automated secure mobile code reviews using Danger

15 views

8 months ago

Shield Forge InfoSec
Broken Access Control Explained | OWASP Top 10 Bug Bounty Hunting Guide

... payouts Bug-hunting tips: Finding access control flaws in web apps & APIs Secure coding practices to protect against BAC ...

7:12
Broken Access Control Explained | OWASP Top 10 Bug Bounty Hunting Guide

92 views

5 months ago