Hi, what do you want to do?
Curated Video
Automatically Download New Apps, Music & Books on an iPhone
Howcast -Learn how to automatically download new apps, music and books on an iPhone in this Howcast video.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Browsing in Incognito Mode - The Shocking Truth!
In this video, we will understand what going "incognito" is and how we can browse incognito on the Internet.
Curated Video
Data Science Model Deployments and Cloud Computing on GCP - Special Mention - React
This video explains React; a JavaScript library developed by Facebook. While it has framework-like features, it is not fully featured and, therefore, is considered a library. There are still some architectural decisions that are left...
Curated Video
Linux Crash Course for Beginners - 2023 - System Updates and Repositories
In this video, you will learn about the commands used for system updates and repositories, that is, rpm and yum.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 03 - Installing Java – Linux
In this video, you will learn how to install Java for Linux systems.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 02 - Installing Java - Mac
In this video, you will learn how to install Java for macOS.
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 01 - Installing Java - Windows
In this video, you will learn how to install Java for Windows.
Curated Video
Linux Network Administration - Downloading Files and Apps
This video explains how to download files and applications in Linux using the wget command.
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Broadband Connections
In this episode, Mike explores common always-on broadband connections to the Internet. Starting with DSL, the episode looks also at fiber, cable, satellite, and 80 2.11 Wi-Fi.
<
br/>
This clip is from the chapter "Book Chapter 21 -...
<
br/>
This clip is from the chapter "Book Chapter 21 -...
Curated Video
Getting Started with HashiCorp Nomad - Demo - Installing Nomad on macOS
In this demonstration, we will look at installing Nomad on macOS. We will download the program from nomadproject.io and choose to install the package manager for macOS or the binary download for macOS.
<
br/>
This clip is from the...
<
br/>
This clip is from the...
Curated Video
A Practical Approach to Timeseries Forecasting Using Python - Packages Required to Execute Codes Error-Free
This video helps you with the installation of the packages.
<
br/>
This clip is from the chapter "Basics of Data Manipulation in Time Series" of the series "A Practical Approach to Timeseries Forecasting Using Python".This section...
<
br/>
This clip is from the chapter "Basics of Data Manipulation in Time Series" of the series "A Practical Approach to Timeseries Forecasting Using Python".This section...
Curated Video
MAC OS: Navigating Finder
Learner will familiarize themselves with the "Finder" and understand how to search for key files or applications
Curated Video
LAB 1: How to Compare Hashes
I will show you how you can download a file and make sure its the original file by comparing the hashes
Curated Video
Wireshark D1 V3 - Setup Wireshark
DAY ONE - We will introduce Wireshark and setup our environment - Video 3: Setup Wireshark
Curated Video
Describe network protocols : Review of Network Programming
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP.
In this video, will learn about the basics of Network programming...
In this video, will learn about the basics of Network programming...
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Apache Spark 3 for Data Engineering and Analytics with Python - MacOS - Python Installation
We will install Python in this session (macOS).
r/>
This clip is from the chapter "Introduction to Spark and Installation" of the series "Apache Spark 3 for Data Engineering and Analytics with Python".This section will give you...
r/>
This clip is from the chapter "Introduction to Spark and Installation" of the series "Apache Spark 3 for Data Engineering and Analytics with Python".This section will give you...
Curated Video
Complete Python Scripting for Automation - Python setup on Windows
Introduction: Python setup on Windows<br/<br/>>
This clip is from the chapter "Introduction" of the series "Complete Python Scripting for Automation".The author introduces the course and talks about Python setup on Windows and Linux.
This clip is from the chapter "Introduction" of the series "Complete Python Scripting for Automation".The author introduces the course and talks about Python setup on Windows and Linux.
Packt
List computer networking media : Broadband Connections
From the section: The Internet. Here, we explore our internet options. In this episode, Mike explores common always-on broadband connections to the Internet. Starting with DSL, the episode looks also at fiber, cable, satellite, and 80...
Curated Video
Learn and Master C Programming - Downloading Visual Studio 2015
The author shows you how to download visual studio 2015 even after the release of Visual Studio 2017.
r/>
This clip is from the chapter "Installing & Configuring Visual Studio" of the series "Learn and Master C Programming For...
r/>
This clip is from the chapter "Installing & Configuring Visual Studio" of the series "Learn and Master C Programming For...
Curated Video
Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network
This video explores Trojan creation and infect machines. • Download and install Zirikatu framework in Kali Linux • Create a Trojan file using Zirikatu and transfer it to victim machine • Penetrate victim using the payload
Packt
Linux - Download Kafka and Setup PATH
This video demonstrates how to download Kafka and setup PATH on a Linux system.
<
br/>
This clip is from the chapter "Starting Kafka" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
<
br/>
This clip is from the chapter "Starting Kafka" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
IDG TECHtalk
How to set up a Microsoft Azure backup process
Setting up a backup process in Azure is one way to quickly recover from a ransomware attack. Leave a comment below and suggest a topic for a future episode of Windows Security Tips.