Hi, what do you want to do?
Packt
CompTIA Network+ Certification N10-007: The Total Course - Understanding Ports
This video explains the purposes of well-known ports and ephemeral ports. This clip is from the chapter "Routing" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn more about routing.
Curated Video
World of Computer Networking Your CCNA start - Working of the Reverse Domain Name System (DNS) Query Resolution Process
This video explains the working of the reverse DNS query resolution process.
r/>
This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer...
r/>
This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Crafting Windows Payloads with Msfvenom
This video teaches you about Msfvenom and how to craft Windows payloads using it.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...
TMW Media
Algebra Word Problem Digit Problems
The Algebra Word Problem Tutor series teaches by examples how to set up algebra word problems and solve them. Digit Problems teaches students how to solve word problems that involve how digits in a number relate to one another. Students...
Curated Video
Practical CSS3 Mastery Course - CSS Animation Keyframes - Part 2
In this video, we will continue with CSS animation keyframes.
<
br/>
This clip is from the chapter "Advance Selectors, Effects, and Animation" of the series "Practical CSS3 Mastery Course".in this section, you will learn about...
<
br/>
This clip is from the chapter "Advance Selectors, Effects, and Animation" of the series "Practical CSS3 Mastery Course".in this section, you will learn about...
Curated Video
Beginning Python (Video 31)
Python is the becoming the language of choice for pretty much every arena. It is a very simple yet extremely powerful programming language. It is a scripting language that is widely used for prototyping to get work up and running...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - The Theory Behind Reverse Shell
This video discusses the theory behind the reverse shell session.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 21 - Introduction to PriorityQueue - Basic Methods and Customized Priority
In this session, we will learn about introduction to PriorityQueue - basic methods and customized priority.
r/>
This clip is from the chapter "Collections" of the series "Java Programming for Complete Beginners - Java 16".In...
r/>
This clip is from the chapter "Collections" of the series "Java Programming for Complete Beginners - Java 16".In...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Connection with Reverse Shell
In this video, you'll learn how to connect with reverse shell.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Reverse Proxy and Cloudflare
In this video, we'll cover reverse proxy and Cloudflare.
r/>
This clip is from the chapter "Cloudflare with Free TLS Certificate" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll use Cloudflare's...
r/>
This clip is from the chapter "Cloudflare with Free TLS Certificate" of the series "SSL Complete Guide 2021: HTTP to HTTPS".In this section, we'll use Cloudflare's...
Curated Video
Vim Masterclass - Searching, Finding, and Replacing - Part 1
This is the first video of a two-part video that demonstrates how to search, find, and replace text using the Vim editor.
r/>
This clip is from the chapter "Transforming and Substituting Text" of the series "Vim...
r/>
This clip is from the chapter "Transforming and Substituting Text" of the series "Vim...
Curated Video
Programming Tutorial: Creating a Palindrome Checker in Scratch
In this tutorial video, the instructor demonstrates how to create a palindrome checker using Scratch programming. By combining skills in strings, loops, and conditional statements, viewers learn how to reverse a word or number input by...
Poetry Foundation
Kenji C. Liu reads Rocío Carlos
Kenji C. Liu reads and untitled poem written by Rocío Carlos.
Curated Video
Page Layout with CSS II
In this video, Mark will review the more contemporary page layout techniques such as Flexbox.
Curated Video
World of Computer Networking Your CCNA start - Reverse Domain Name System (DNS) Query Resolution Process
This video introduces you to the reverse DNS query resolution process.
r/>
This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer Networking:...
r/>
This clip is from the chapter "Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS)" of the series "World of Computer Networking:...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Embedding Backdoor in Image Part 2
In this video, you'll continue to embed backdoor in your image.
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Developing an Advanced Backdoor" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
Java Interview Guide : 200+ Interview Questions and Answers - What is an anonymous class?
Polymorphism and instanceof: What is an anonymous class?
r/>
This clip is from the chapter "More Object Oriented Programming Concepts" of the series "Java Interview Guide : 200+ Interview Questions and Answers".In this section,...
r/>
This clip is from the chapter "More Object Oriented Programming Concepts" of the series "Java Interview Guide : 200+ Interview Questions and Answers".In this section,...
Curated Video
VI Characteristics for Diodes: Investigation and Analysis
This is a lecture presentation on VI characteristics, where the presenter demonstrates how to investigate the relationship between current and potential difference for a diode by adapting a circuit. The circuit is set up with a Power...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Adding Keylogger to Your Reverse Shell Part 2
In this video, you'll continue to add keylogger to your reverse shell.
r/>
This clip is from the chapter "Developing a Keylogger" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Developing a Keylogger" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Curated Video
The Complete Java Developer Course: From Beginner to Master - Project - Working with ArrayLists
This video is the second project of this section where you would create an ArrayLists and populate with non-negative numbers. Ask the user to enter the real numbers from the console. The program terminates as soon as the user enters a...
Curated Video
Master Hibernate and JPA with Spring Boot in 100 Steps - Step 35 - ManyToMany Mapping - Adding Annotations on Entities
In this video, we will cover ManyToMany mapping - adding annotations on entities.
r/>
This clip is from the chapter "Establishing Relationships with JPA and Hibernate - OneToMany and ManyToMany" of the series "Master Hibernate...
r/>
This clip is from the chapter "Establishing Relationships with JPA and Hibernate - OneToMany and ManyToMany" of the series "Master Hibernate...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Adding Keylogger to Your Reverse Shell Part 1
This video teaches you another use of the keylogger by adding it to your reverse shell.
r/>
This clip is from the chapter "Developing a Keylogger" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
r/>
This clip is from the chapter "Developing a Keylogger" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In...
TLDR News
Liz Truss: What Happens if She Takes Over Britain?
Liz Truss is one of two candidates in the running to take over from Prime Minister Boris Johnson. The question is, what would she do if she won? What would a Truss Premiership really look like? In this video we dive into her plans,...
IDG TECHtalk
How to use the tac command: 2-Minute Linux Tips
The tac command displays text files “upside-down” – the last lines show up first and the first last. If you ever need to invert a file, you’ll find this quick and easy command ready to make the task easy.