Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
108 results
Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.
6,542 views
3 weeks ago
Thanks to @fragram76, we're discovering the extensions to the Commodore 128 BASIC v7 he created to draw on a 640x200 graphics ...
593 views
2 weeks ago
In this video, we dive into client and server network communication within C++, building our own custom RAT (Remote ...
1,550 views
Learn to compress, hide, and move large amounts of data. This is the foundation of data exfiltration and managing toolkits.
52 views
Lezione L40 (07/01/2025): Tema d'esame "Mastermind" Corso: Informatica (codice 14BHD, corso 9), Politecnico di Torino, Anno ...
904 views
Hackers don't browse; they search. Master grep, find, and locate to extract sensitive information from massive logs and directories.
106 views
How to make an array based queue data structure in C + Raylib visualization at the end! In computer science, a queue is an ...
280 views
12 days ago
00:00 Intro 01:34 The Origins 03:29 The Fundamental Principles 08:54 The Philosophical Dimension 10:06 Richard Gabriel's ...
4,196 views
This video is presented by MS.V.M.Dilpak Assistant Professor in the IT department . This video explains the fundamentals of ...
11 views
4 weeks ago
In this video, you'll learn how hackers gather critical system information in Linux. We cover essential commands used to identify ...
274 views
In this video, I introduce the concept of views, showing their usefulness and syntax in detail. Then, using examples, I ...
64 views
Learn how hackers analyze user accounts and permissions in Linux systems. This video explains user information, groups, login ...
95 views
Stop using the GUI. Master the speed of the Linux terminal to move through directories, manipulate files, and find what you need ...
132 views
Learn how to find anyone online using Sherlock, a powerful OSINT tool for username reconnaissance. In this video, I walk you ...
538 views
5 days ago
Why the Linux Kernel Doesn't Use Modulo (%) | High-Perf Queues In Part 1, we built a queue that was easy to read using the ...
2,859 views
10 days ago
A little support goes a long way! If you'd like to help me keep creating, you can do so at https://ko-fi.com/roccotaco Is your iPhone ...
If you can't network, you can't hack. We dive into IP addresses, ports, and active connections to see exactly what's leaving your ...
This video is presented by MS.V.M.Dilpak Assistant Professor in the IT department . This video explains how DML is used to add, ...
14 views
Lesson L41 (07/01/2025): Exam Topic "Drawing" Course: Computer Science (code 14BHD, course 9), Polytechnic University of ...
788 views
Simulator: https://tryquetra.github.io/setun-online-simulator/?lang=en-us https://gemini.google.com/share/3aca19b16dd7 Original ...
56 views
Streamed 3 weeks ago