ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

36 results

EmpowerTechPathway
Crypto Explained Like You're Building the Internet

Cybersecurity Career Changers + Security+ Students: If cryptography feels confusing, this video will make it click. In this lesson, I ...

7:58
Crypto Explained Like You're Building the Internet

0 views

7 hours ago

David Bombal
Hashing cannot be reversed but encryption can. Prove me wrong!

Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use ...

50:43
Hashing cannot be reversed but encryption can. Prove me wrong!

11,161 views

10 hours ago

CyberLearn Visual
Broken Access Control OWASP 2025 Explained: #1 Web App Risk (IDOR, SSRF, Privilege Escalation)

Broken Access Control: OWASP Top 10 2025 #1 Web Application Security Risk In this video, we break down **Broken Access ...

7:11
Broken Access Control OWASP 2025 Explained: #1 Web App Risk (IDOR, SSRF, Privilege Escalation)

2 views

17 hours ago

BillyGoatTales
Chain Abstraction Explained in Simple Terms (LIVE Deep Dive + Q&A) 📱

At Simple Terms Podcast, we break down complex topics into Simple Terms — so you can actually understand what's happening ...

1:15:20
Chain Abstraction Explained in Simple Terms (LIVE Deep Dive + Q&A) 📱

232 views

Streamed 1 day ago

Investment Banker
$30M STOLEN - The Step Finance Solana Hack Explained

million in SOL vanished from Step Finance treasury wallets in seconds. This wasn't a standard smart contract exploit—it was a ...

8:14
$30M STOLEN - The Step Finance Solana Hack Explained

28 views

18 hours ago

Ayreshin Ideas
Voynich Manuscript: The Book No One Can Read! 😮Voynich Manuscript explained | Fact Videos

Voynich Manuscript: The Book No One Can Read! Voynich Manuscript explained | Fact Videos @AyreshinIdeas The Voynich ...

2:15
Voynich Manuscript: The Book No One Can Read! 😮Voynich Manuscript explained | Fact Videos

0 views

16 hours ago

Akhil Sharma
The TOR network - Explained in Detail (System Design for Beginners – Episode 40)

Algoroq — The CTO Accelerator™ Program Join my 3-month cohort — master real production-grade system design and ...

17:00
The TOR network - Explained in Detail (System Design for Beginners – Episode 40)

43 views

11 hours ago

CyberTeaches
U6L8 (3.2.3)  Secure Communication/Access and Effective Controls

In this lesson, we explain secure communication, access methods, and effective controls used to protect data as it moves across ...

3:19
U6L8 (3.2.3) Secure Communication/Access and Effective Controls

0 views

22 hours ago

Dark Focus
The Fake Blockchain That Tricked The World (OneCoin)

She promised a financial revolution. She built a $4 billion empire. Then she vanished into thin air. Ruja Ignatova, the ...

10:15
The Fake Blockchain That Tricked The World (OneCoin)

9 views

1 day ago

Theory & Void
Einstein vs quantum mechanics: the debate that changed physics

In this video, we explore the profound implications of the theory of relativity and its connection to quantum mechanics explained.

3:32
Einstein vs quantum mechanics: the debate that changed physics

9 views

21 hours ago

Next Era Computing
The Quantum Timeline (WHEN DOES THIS HAPPEN?)

Quantum Computing is promised to solve climate change, cure cancer, and break the internet—but where is it? If you look around, ...

8:19
The Quantum Timeline (WHEN DOES THIS HAPPEN?)

0 views

2 hours ago

noallianceb
Will Quantum Computers Destroy the Internet? From Feynman to Shor & Grover

Quantum computers aren't just future technology — they have the potential to change internet security forever. 00:00 Quantum ...

14:31
Will Quantum Computers Destroy the Internet? From Feynman to Shor & Grover

4 views

11 hours ago

Swant Entertainment.
Price Gir Gayi = Project Dead? | The Crypto Myth Busters Ep-2 | Price Vs Value #crypto #web3

Is video me hum samajhte hain ki price aur value me kya difference hota hai. Sirf chart dekh ke decision lena kyun dangerous hai ...

8:40
Price Gir Gayi = Project Dead? | The Crypto Myth Busters Ep-2 | Price Vs Value #crypto #web3

217 views

12 hours ago

Edu9 Career Guidance
Q-Day Is Coming! 🔐 The End of Passwords? Is Your Digital Security at Risk in 2026

Q-Day Is Coming! The End of Passwords? Is Your Digital Security at Risk in 2026 Q-Day is approaching faster than expected, ...

12:04
Q-Day Is Coming! 🔐 The End of Passwords? Is Your Digital Security at Risk in 2026

727 views

19 hours ago

COMPUTER SCIENCE WITH BHASKAR SIR
Fetch Decode Execute Cycle | Instruction Cycle | Computer Architecture | Bangla

FOR PRIVATE TUITION INQUIRIES, CONTACT: 6290325856 Fetch Decode Execute Cycle Bangla explained in a simple, clear, ...

19:23
Fetch Decode Execute Cycle | Instruction Cycle | Computer Architecture | Bangla

0 views

12 hours ago

onlyTech R&D
What Is Homomorphic Encryption? Full, Partial, and Somewhat Explained

Homomorphic Encryption allows computation directly on encrypted data—but not all schemes are the same. In this video, you'll ...

5:19
What Is Homomorphic Encryption? Full, Partial, and Somewhat Explained

0 views

17 hours ago

Global Command
WhatsApp Privacy Scandal Explained | US Government Investigation

WhatsApp claims your messages are protected by end-to-end encryption — meaning no one, not even WhatsApp itself, can read ...

7:18
WhatsApp Privacy Scandal Explained | US Government Investigation

1 view

12 hours ago

cyberpunk
Ransomware — The Digital Kidnapping

Ransomware Explained | What Is Ransomware & How to Protect Your Data Ransomware is a serious cybersecurity threat where ...

3:43
Ransomware — The Digital Kidnapping

0 views

23 hours ago

Tech SwirlPool
AES ShiftRows Step-by-Step 🔥 | Encryption Explained Simply

Confused about AES ShiftRows? Don't worry — this video explains it in the SIMPLEST way possible ** **AES ShiftRows** is ...

2:52
AES ShiftRows Step-by-Step 🔥 | Encryption Explained Simply

5 views

21 hours ago

Mysterious Immature
SHA-1 is Dead: Is Your Data Still Safe?

SHA-1 is no longer secure, cryptography explained, SHA-1 vs SHA-256, hash collision attack, cybersecurity 2024, secure hashing ...

6:20
SHA-1 is Dead: Is Your Data Still Safe?

0 views

8 hours ago