ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

108 results

The Coding Gopher
99% of Developers Don't Get ASTs

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

10:41
99% of Developers Don't Get ASTs

6,540 views

3 weeks ago

Mille e Una Avventura
640x200 graphics with Wedge80 / Commodore 128

Thanks to @fragram76, we're discovering the extensions to the Commodore 128 BASIC v7 he created to draw on a 640x200 graphics ...

27:31
640x200 graphics with Wedge80 / Commodore 128

593 views

2 weeks ago

Erarnitox
Building a C2 Framework in Modern C++23 (The Architecture of Malware)

In this video, we dive into client and server network communication within C++, building our own custom RAT (Remote ...

1:10:08
Building a C2 Framework in Modern C++23 (The Architecture of Malware)

1,549 views

3 weeks ago

Fulvio Corno
Info-2025-L40: Tema d'esame "Mastermind"

Lezione L40 (07/01/2025): Tema d'esame "Mastermind" Corso: Informatica (codice 14BHD, corso 9), Politecnico di Torino, Anno ...

1:27:42
Info-2025-L40: Tema d'esame "Mastermind"

904 views

3 weeks ago

Brian0day
Linux For Hackers #9 - File Compression and Archiving

Learn to compress, hide, and move large amounts of data. This is the foundation of data exfiltration and managing toolkits.

8:27
Linux For Hackers #9 - File Compression and Archiving

52 views

2 weeks ago

Brian0day
Linux For Hackers #8 - Search & Locating Files

Hackers don't browse; they search. Master grep, find, and locate to extract sensitive information from massive logs and directories.

10:04
Linux For Hackers #8 - Search & Locating Files

106 views

2 weeks ago

Codotaku
How to make an array based queue data structure in C

How to make an array based queue data structure in C + Raylib visualization at the end! In computer science, a queue is an ...

24:49
How to make an array based queue data structure in C

278 views

12 days ago

YouTux Channel
The Unix Philosophy : explained

00:00 Intro 01:34 The Origins 03:29 The Fundamental Principles 08:54 The Philosophical Dimension 10:06 Richard Gabriel's ...

18:44
The Unix Philosophy : explained

4,195 views

3 weeks ago

AISSMS INSTITUTE OF INFORMATION TECHNOLOGYY - IOIT
Basics of Database

This video is presented by MS.V.M.Dilpak Assistant Professor in the IT department . This video explains the fundamentals of ...

6:56
Basics of Database

11 views

4 weeks ago

Brian0day
Linux For Hackers #1 - Commands That Reveal Everything

In this video, you'll learn how hackers gather critical system information in Linux. We cover essential commands used to identify ...

5:30
Linux For Hackers #1 - Commands That Reveal Everything

274 views

3 weeks ago

Brian0day
Find Anyone's Social Media Accounts with ONE Command

Learn how to find anyone online using Sherlock, a powerful OSINT tool for username reconnaissance. In this video, I walk you ...

3:07
Find Anyone's Social Media Accounts with ONE Command

529 views

5 days ago

Brian0day
Linux For Hackers #3 - Creating Users & Groups

Learn how hackers analyze user accounts and permissions in Linux systems. This video explains user information, groups, login ...

15:02
Linux For Hackers #3 - Creating Users & Groups

95 views

3 weeks ago

Brian0day
Linux For Hackers #2 - Managing Files & Directories

Stop using the GUI. Master the speed of the Linux terminal to move through directories, manipulate files, and find what you need ...

20:23
Linux For Hackers #2 - Managing Files & Directories

132 views

3 weeks ago

Aula Informática
SQL - MariaDB: Vistas

In this video, I introduce the concept of views, showing their usefulness and syntax in detail. Then, using examples, I ...

20:54
SQL - MariaDB: Vistas

64 views

2 weeks ago

Codotaku
Why the Linux Kernel Doesn't Use Modulo (%) | High-Perf Queues

Why the Linux Kernel Doesn't Use Modulo (%) | High-Perf Queues In Part 1, we built a queue that was easy to read using the ...

37:56
Why the Linux Kernel Doesn't Use Modulo (%) | High-Perf Queues

2,859 views

10 days ago

Rocco Taco Mining
7 Signs Your iPhone Is Hacked in 2026 – Check These NOW Before It's Too Late!

A little support goes a long way! If you'd like to help me keep creating, you can do so at https://ko-fi.com/roccotaco Is your iPhone ...

9:07
7 Signs Your iPhone Is Hacked in 2026 – Check These NOW Before It's Too Late!

106 views

2 weeks ago

Brian0day
Linux For Hackers #5 - Networking Commands

If you can't network, you can't hack. We dive into IP addresses, ports, and active connections to see exactly what's leaving your ...

8:00
Linux For Hackers #5 - Networking Commands

105 views

3 weeks ago

Fulvio Corno
Info-2025-L41: Exam topic "Drawing"

Lesson L41 (07/01/2025): Exam Topic "Drawing" Course: Computer Science (code 14BHD, course 9), Polytechnic University of ...

48:17
Info-2025-L41: Exam topic "Drawing"

788 views

3 weeks ago

AISSMS INSTITUTE OF INFORMATION TECHNOLOGYY - IOIT
DML Command

This video is presented by MS.V.M.Dilpak Assistant Professor in the IT department . This video explains how DML is used to add, ...

6:55
DML Command

14 views

4 weeks ago

Tech With Emilio
Day In The Life Of a Network Admin!! [Network Engineer 101]

Ever wondered what a Network Engineer actually does all day? In this video, I take you inside a real “Day in the Life of a Network ...

11:55
Day In The Life Of a Network Admin!! [Network Engineer 101]

2,340 views

3 weeks ago