ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

226 results

IGCSE Central
IGCSE Computer Science 0478| Lossy Compression vs Lossless Compression

This video series is designed to help you revise each topic of the igcse 0478 syllabus more easily. We'll go through exam-style ...

5:13
IGCSE Computer Science 0478| Lossy Compression vs Lossless Compression

96 views

6 months ago

ITFreeTraining
Computer Memory - CompTIA A+ 220-1101 – 2.9

Let's have a look at computer memory. Download PowerPoint: https://itfreetraining.com/handouts/ap11/2c10.pptx What is ...

22:14
Computer Memory - CompTIA A+ 220-1101 – 2.9

1,061 views

11 months ago

Codeically
Training AI On Old Nintendo Sprites

Ever wondered if AI could recreate those classic NES pixel art styles? In this tutorial, I show you how to extract CHR data from ...

5:18
Training AI On Old Nintendo Sprites

2,132 views

5 months ago

IGCSE Central
IGCSE Computer Science 0478 | The Fetch decode execute cycle, cache, cores, and clock speed

This video will guide IGCSE Computer Science 0478 students through computing revision, focusing on key topics from chapters 1 ...

10:45
IGCSE Computer Science 0478 | The Fetch decode execute cycle, cache, cores, and clock speed

98 views

6 months ago

CompuTechWorld
System Software vs Application Software | Easily Explained

Confused about the difference between system software and application software? In this video, we break it down in the simplest ...

6:43
System Software vs Application Software | Easily Explained

42 views

9 months ago

CompuTechWorld
Computer Hardware Explained – Easy & Fast!

In this video, you'll learn: • What is computer hardware? • The main components of hardware (input, output, storage, processing) ...

7:29
Computer Hardware Explained – Easy & Fast!

294 views

9 months ago

Dr. Pavel Vlašánek
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

Curious how software cracks actually work? In this video, I walk you through a beginner‑friendly reverse‑engineering challenge ...

12:19
Can You Crack This Program? (Beginner Reverse Engineering Tutorial)

14,795 views

6 months ago

P2Enjoy SAS - Official Channel
KYW.guru Algorithm Explained: Shamir Secret Sharing & Keeper’s Extension Tutorial

Welcome to our in-depth tutorial on the KYW.guru algorithm! In this video, we reveal the inner workings of an advanced secret ...

4:40
KYW.guru Algorithm Explained: Shamir Secret Sharing & Keeper’s Extension Tutorial

47 views

9 months ago

Dr. Pavel Vlašánek
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

Ready for a tougher reverse-engineering challenge packed with tricks and anti-debug defenses? In this episode, we take on a ...

10:01
Can You Crack This Password? (Advanced Reverse Engineering Tutorial)

1,066 views

5 months ago

CompuTechWorld
Computer Languages Explained in the Simplest way | Machine, Assembly & High-Level Languages

"Have you ever wondered how computers understand us? In this video, we explain Computer Languages in the simplest way.

4:59
Computer Languages Explained in the Simplest way | Machine, Assembly & High-Level Languages

23 views

5 months ago

Meink WinLab
How to Install Multiple Windows Versions on One PC

In this video, I will guide you step by step on how to install multiple versions of Windows on a single PC. This method allows you to ...

4:03
How to Install Multiple Windows Versions on One PC

4,341 views

1 month ago

NYC Open Data Week
Dirty Data Part 1: Finding and Cleaning Anomalies

NYC Open Data Week 2025 (March 24) This is a virtual presentation illustrating how to undertake a data cleansing effort It is Part I ...

42:56
Dirty Data Part 1: Finding and Cleaning Anomalies

77 views

9 months ago

EmacsConf and Emacs hangouts and 2 more
EmacsConf 2025 Q&A: Zettelkasten for regular Emacs hackers - Christian Tietze (he)

This is the Q&A for the talk at https://youtu.be/wE8vCWyr1Eo . 00:49 Q: What do you use for the fancy animations? 03:30 Q: Are ...

1:17:08
EmacsConf 2025 Q&A: Zettelkasten for regular Emacs hackers - Christian Tietze (he)

267 views

1 month ago

EmacsConf and Emacs hangouts
EmacsConf 2025: Emacs and private AI: a great match - Aaron Grothe (he/him)

https://emacsconf.org/2025/talks/private-ai 00:00 Introduction 00:48 Overview of talk 01:08 Why private AI? 03:16 What do I need ...

41:53
EmacsConf 2025: Emacs and private AI: a great match - Aaron Grothe (he/him)

464 views

1 month ago

CompuTechWorld
You Won’t Believe This AI Tool Is FREE – Gen Tube Full Demo

Looking for a free AI image generator that's fast, easy, and powerful? Meet Gen Tube – one of the fastest and most user-friendly AI ...

9:41
You Won’t Believe This AI Tool Is FREE – Gen Tube Full Demo

26 views

6 months ago

Aalto Scientific Computing
Shell crash course v2

The shell, command line, or terminal is a text-based way of interacting with a computer. It's not old-fashined: copying and pasting ...

19:50
Shell crash course v2

1,085 views

10 months ago

Meink WinLab
VMware Workstation Pro 2025: Free Download & Setup Guide

In this video, I'll show you how to download, install, and set up VMware Workstation Pro 2025 for free on your Windows PC. You'll ...

6:35
VMware Workstation Pro 2025: Free Download & Setup Guide

550 views

2 months ago

CyberHack Watch
How Hackers Stole 40 Million Cards : Target 2013 Data Breach Explained!

Hey everyone, welcome to my first cybersecurity YouTube video! In this video, we break down the Target 2013 data breach, ...

5:09
How Hackers Stole 40 Million Cards : Target 2013 Data Breach Explained!

26 views

6 months ago

How I Met Your Coder
How to Make a CS Degree Pay Off in 2025 (Fast)

You spent years studying computer science, surviving caffeine-fueled nights, exams, and professors who thought fun meant ...

3:47
How to Make a CS Degree Pay Off in 2025 (Fast)

236 views

5 months ago

Lars Juhl Jensen
Quantum computing in biology: How it works, its possible applications, and the hype

Quantum computing is very much at the cutting edge of computer science, with the potential to revolutionize many disciplines ...

5:40
Quantum computing in biology: How it works, its possible applications, and the hype

971 views

8 months ago

Home Of Python
Python vs C++: Which Language Should You Choose for Modern Development?

Python is presented as an accessible language, emphasizing its easy syntax and rapid development capabilities, alongside its ...

5:05
Python vs C++: Which Language Should You Choose for Modern Development?

35 views

10 months ago

Washington SBCTC
Staying Safe: Cybersecurity Tips for Educators and Staff

Staying safe from AI-powered scams and cyber threats is crucial for educators and staff. Recognizing suspicious emails, using ...

9:04
Staying Safe: Cybersecurity Tips for Educators and Staff

30 views

7 months ago

MG Tech Hacks
4 Essential Network Commands Every IT Professional Must Know | Full Tutorial | Ping | Tracert  | DNS

4 Essential Network Tools Every IT Professional Must Know | Complete Tutorial Are you ready to level up your network ...

10:45
4 Essential Network Commands Every IT Professional Must Know | Full Tutorial | Ping | Tracert | DNS

19 views

4 months ago

Dr. Pavel Vlašánek
How a 3-Byte Crack Broke Prince of Persia 2's Copy Protection

Remember when games made you find a symbol on page 20 of the manual? Prince of Persia 2 had one of those classic ...

7:04
How a 3-Byte Crack Broke Prince of Persia 2's Copy Protection

2,236 views

3 months ago

Programming threads
Why Arrays are Fast?

Struggling to understand how arrays work under the hood? In this video, we explore how arrays are stored in memory and why ...

4:57
Why Arrays are Fast?

328 views

11 months ago