Curated Video
Deep Learning - Crash Course 2023 - Installing Jupyter Notebook
In this video, you will learn how to install Jupyter Notebook on your system. This clip is from the chapter "Python Crash Course on Basics" of the series "Deep Learning - Crash Course 2023".In this section, we will work on our foundation...
Curated Video
Deep Learning - Crash Course 2023 - Update Rule in Programs
In this video, you will learn about the parameter Update Rule that we will be using in our programs. This clip is from the chapter "Perceptron" of the series "Deep Learning - Crash Course 2023".In this section, you will learn about...
Curated Video
Deep Learning - Crash Course 2023 - Python Control statements - While and For
In this video, we will look at the different loops in Python called While and For. This clip is from the chapter "Python Crash Course on Basics" of the series "Deep Learning - Crash Course 2023".In this section, we will work on our...
Curated Video
Deep Learning - Crash Course 2023 - Control Statements Python if…else
In this video, we will explain the control statements in Python like if…else statements. This clip is from the chapter "Python Crash Course on Basics" of the series "Deep Learning - Crash Course 2023".In this section, we will work on our...
Curated Video
Linux Network Administration - chronyd - newer Version of NTP
This video explains the chronyd daemon, the latest daemon that is used nowadays to replace the NTP daemon.
Curated Video
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention
This video explains how to prevent insecure design when developing software.
Curated Video
Linux PAM Security Administration - PAM Aware Services and Stacks
This video explains PAM-aware services and stacks and how to verify if a service or a program is linked with PAM.
Curated Video
Linux PAM Security Administration - PAM Configuration File - Modules
This video explains the third or the last column of the PAM configuration files, which is the modules column.
Curated Video
Linux PAM Security Administration - The PAM File Configuration - Module Interface
This video explains the first column of the PAM file configuration, which is the module interface or type.
Curated Video
Linux PAM Security Administration - PAM File Configuration Format
This video explains the format of every PAM file configuration.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Switch Statement
This video explains the Switch statement.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User Model and Validator
In this video, we will explore how to create a user model and use a validator to ensure that the user data meets certain requirements.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - toJSON
In this video, you will learn how to use the toJSON method in Mongoose to manipulate the user object before sending it as a JSON response.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Mongoose and MongoDB
In this video, we will show you how to use Mongoose, a popular Node.js library, to build and manage a MongoDB database.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Express Server and Nodemon
n this video, we will show you how to use Express.js to build a powerful and scalable server for your web applications.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Linux and macOS Permissions
While macOS and Linux lack NTFS's fine control of resources, they do still have permissions, and a good tech should understand how they work. Additionally, there are specific tools used to control permissions. This clip is from the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - What Is an Operating System
This video explains what an operating system is. This clip is from the chapter "The Visible Computer" of the series "CompTIA A+ Certification Core 2 (220-1102)".This section explains the common safety procedures and hardware concerns as...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 4: AI Work Will Need to Be Modified
In this video, we will look at the limitation that AI-generated content will often need to be modified or edited by humans. This clip is from the chapter "When (And When Not) to Use AI" of the series "ChatGPT and DALL-E: Sell Your...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Subdomain Takeover – Part 1
This is the first of the two-part video that demonstrates the subdomain takeover by attacking the subdomain. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking Expert Full-Stack...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Firewall
Like all operating systems, Windows comes with a built-in software firewall. Unlike the firewall on your router, this firewall only protects a single system. It's important for techs – and the users they support – to understand how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Interpreted Languages
Every operating system contains interpreters that can read higher-level programming languages. This video covers three popular interpreters: Visual Basic, Python, and JavaScript. This clip is from the chapter "Working with the...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Advanced Linux Commands
The CompTIA exam covers a few more advanced Linux commands. These commands enable some unique navigation. This clip is from the chapter "Working with the Command-Line Interface" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Applications
This video covers these requirements, as well as some tips for using and troubleshooting applications. This clip is from the chapter "Maintaining and Optimizing Operating Systems" of the series "CompTIA A+ Certification Core 2...
Curated Video
ASP.NET 6.0 - Build Hands-On Web Projects - The Startup Class - How to Configure Services
This video discusses the Startup class in an ASP.NET Core 3.1 project. After going through this video, you will have knowledge about the two main methods in this class, in particular, the ConfigureServices() method, which is used to...