Hi, what do you want to do?
Curated Video
ChatGPT Voice-Powered Chatbot Build with React and FastAPI - Python and Node Version Installation Checks
In this video, we will ensure that you have the correct Python and Node versions installed for your project, and we will walk you through installation checks.
<
br/>
This clip is from the chapter "Environment Setup - Frontend and...
<
br/>
This clip is from the chapter "Environment Setup - Frontend and...
Curated Video
Real-World DevOps Project From Start to Finish - Running the 'docker prune' Command Periodically Through Crontab
In this video, we will discover how to automate the execution of the 'docker prune' command by setting up a cron job. By scheduling this command to run at specific intervals, we ensure that Docker resources are regularly cleaned up,...
Curated Video
Real-World DevOps Project From Start to Finish - Linux File Permissions
This video demonstrates how to interpret and modify file permissions, manage ownership and groups, and understand special permission bits. We will have a solid understanding of Linux file permissions and be able to effectively manage...
Curated Video
Power BI Masterclass 8 - Python, Finance, and Advanced DAX - Setting Up Our Python Environment for Power BI
In this video, we will dive into setting up our Python environment tailored explicitly for Power BI. We will explore the necessary steps to seamlessly integrate Python with Power BI, installing Python, configuring the required...
The Guardian
Britons in the Kurdish Resistance
As of March, 2018, more than 20 Britons had fought with the Kurdish resistance against Isis and eight had died. The Kurdish resistance invited their parents to Syria. Three fathers accepted the invitation, hoping to learn more about...
Curated Video
Design Effective Wordlists
Learn how to effectively create wordlists that will aid you in cracking passwords
Curated Video
Hacking with Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
Decode and Decompile Android Apps
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
Linux Fundamentals - Sorting Files Using the ls Command
This video demonstrates sort files using the ls command.
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar and gzip utilities....
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar and gzip utilities....
Curated Video
Linux Fundamentals - Sorting Contents of Files Using the Sort Utility
This video demonstrates how to sort contents of files using the sort utility.
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar...
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar...
Curated Video
Linux Fundamentals - Introduction to the Find Command
This video provides an introduction to the find command.
<
br/>
This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will also learn to execute the...
<
br/>
This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will also learn to execute the...
Curated Video
Linux Fundamentals - Arguments for Options
This video focuses on arguments for options.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux...
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux...
Curated Video
Linux Fundamentals - Command Options
This video focuses on command options.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Adding Comments in HTML
This video shows how to add comments in HTML.
<
br/>
This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web pages...
<
br/>
This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web pages...
Curated Video
Linux Fundamentals - Listing Files and Directories
This video explains how to list files and directories.
<
br/>
This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files and...
<
br/>
This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files and...
Curated Video
Linux Fundamentals - Command Arguments
This video focuses on command arguments.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
Curated Video
Linux Fundamentals - Changing Permissions
This video demonstrates the process of changing permissions.
<
br/>
This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After...
<
br/>
This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - (Exercise) Kinesis Firehose, Part 3
This video is the third part of the three-part video that explains how to build a system to populate an S3 data lake from the Amazon EC2 server data using Kinesis Firehose.
<
br/>
This clip is from the chapter "Domain 1: Collection"...
<
br/>
This clip is from the chapter "Domain 1: Collection"...
Curated Video
Finding the Perimeter of Squares and Rectangles
In this video lesson, students will learn how to find the perimeter of a square or rectangle by adding the side lengths. The teacher explains the concept clearly and provides examples to illustrate the process.
Virtually Passed
parallel axis theorem proof
A formal proof of the parallel axis theorem. It's really useful for finding moments of inertia of composite objects and also objects which aren't rotating around the center of mass.
APMonitor
Data Science 🐍 Install and Overview
Welcome to the course on data science with Python. This course steps through basic data science and machine learning skills to analyze data and create actionable information. It address major steps of the...
Virtually Passed
Second Moment of Area Example 4 (I beam)
Here I calculate the second moment of area (moment of inertia) for an I beam. The easiest way to do this is to find the moment of inertia of each of the rectangles about the I beams centroid (note you'll have to use the parallel axis...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...