Hi, what do you want to do?
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Anatomy of a SQLi attack - unsanitized input and server errors
SQL Injection: Anatomy of a SQLi attack - unsanitized input and server errors
r/>
This clip is from the chapter "SQL Injection" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will...
r/>
This clip is from the chapter "SQL Injection" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will...
IDG TECHtalk
How to use the wget command: 2-Minute Linux Tips
In this Linux tip, learn the wget command. It makes downloading pages from web sites – even recursively – very easy. Keep in mind that this command downloads whatever html code defines the page.
Curated Video
Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - [Exercise] Generating Histogram Data
This video presents an exercise to generate histogram data using aggregation.
r/>
This clip is from the chapter "Using Aggregation" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains...
r/>
This clip is from the chapter "Using Aggregation" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Introduction to Redis Caching
This video provides an introduction to Redis caching.
r/>
This clip is from the chapter "Caching and Content Delivery Networks (CDN)" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you...
r/>
This clip is from the chapter "Caching and Content Delivery Networks (CDN)" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section introduces you...
Curated Video
The Complete React Developer Course (with Hooks and Redux) - Fetching Expenses: Part II
In this video you'll learn how to use async Redux actions to fetch data from Firebase.
r/>
This clip is from the chapter "Firebase with Redux" of the series "The Complete React Developer Course (with Hooks and Redux)".This...
r/>
This clip is from the chapter "Firebase with Redux" of the series "The Complete React Developer Course (with Hooks and Redux)".This...
Curated Video
HTML CSS and JavaScript for Beginners - A Web Design Course - Try to Build a Page
In this video, we'll build a page.
r/>
This clip is from the chapter "Learn HTML Course Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn about HTML here. You will learn about Element,...
r/>
This clip is from the chapter "Learn HTML Course Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn about HTML here. You will learn about Element,...
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Meta Tags & Search Engines
HTML Basics: Meta Tags & Search Engines<br/<br/>>
This clip is from the chapter "HTML Basics" of the series "Modern HTML and CSS from the Beginning (Including Sass)".This Section contains the HTML Basics.
This clip is from the chapter "HTML Basics" of the series "Modern HTML and CSS from the Beginning (Including Sass)".This Section contains the HTML Basics.
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Custom Domain Name
Website Deployment With Netlify (FREE): Custom Domain Name
r/>
This clip is from the chapter "Website Deployment With Netlify (FREE)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section,...
r/>
This clip is from the chapter "Website Deployment With Netlify (FREE)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section,...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - XSS mitigation and prevention
Cross Site Scripting: XSS mitigation and prevention
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most...
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Wrapping up the OWASP top 10 list
One last word: Wrapping up the OWASP top 10 list
r/>
This clip is from the chapter "One last word" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, before wrapping up the author gives a...
r/>
This clip is from the chapter "One last word" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, before wrapping up the author gives a...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - What is XSRF?
Cross Site Request Forgery: What is XSRF?
r/>
This clip is from the chapter "Cross Site Request Forgery" of the series "Web Security: Common Vulnerabilities And Their Mitigation".We will focus on attention another common attack...
r/>
This clip is from the chapter "Cross Site Request Forgery" of the series "Web Security: Common Vulnerabilities And Their Mitigation".We will focus on attention another common attack...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Learn by example - sessions without cookies
Session Management: Learn by example - sessions without cookies
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Symmetric Key Encryption
In this video, we'll learn about symmetric key encryption.
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn about...
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn about...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Signing Data Using Asymmetric Keys
In this video, we'll learn about signing data using asymmetric keys.
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn...
r/>
This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn...
Curated Video
Fetch()ing Data in JavaScript
Often JavaScript apps interact with other sites and services to obtain data, like maps or transit data. In this video, Mark will show you how to use fetch() to retrieve data from other apps.
Curated Video
HTML5 Hyperlinks
HTML5 Hyperlinks are used to move users from one page to another within a site or between sites on the web. In this video, Mark will teach you to make external HTML5 links, internal HTML5 links, and named anchors, which are hyperlinks...
Curated Video
DevOps Complete Course - Maven Goals
This video explains about Maven goals.<br<br/>/>
This clip is from the chapter "Maven" of the series "DevOps Complete Course".This section focuses on Maven from scratch.
This clip is from the chapter "Maven" of the series "DevOps Complete Course".This section focuses on Maven from scratch.
Food Farmer Earth
Counting Copper River Sockeye Salmon at Childs Glacier
As Elliot Johnson of Alaska Department of Fish and Game explains in the video, the Childs Glacier monitoring station is responsible for counting the returning salmon as they complete their ocean migration back to their native spawning...
The Guardian
YouTube kids: how unboxing, gaming and toy reviews took over
Being a YouTuber is now the most popular aspiration for children today, according to a survey. In 2018, the site’s highest earner was a seven-year-old American toy reviewer. But the video platform has been mired in controversy over its...
Curated Video
Italy, Pompeii Odeon
The Odeon was a smaller roofed theatre, theatrum tectum, that sat 1500 spectators built in 80 BC. The theatre follows the plan of other Roman theatres and odeon structures. Where the Large Theatre was used primarily for staging drama,...
Curated Video
Italy, Rome, Roman Forum - Basilica Julia
The Basilica Julia was a structure that once stood in the Roman Forum. It was a large, ornate, public building used for meetings and other official business during the early Roman Empire. Its ruins have been excavated. What is left from...
Curated Video
CompTIA A+ Certification 220-1001: The Total Course - Cloud Computing
In this episode, Mike looks at the benefits of cloud computing (or moving virtual machines out onto the Internet). The cloud VMs enable benefits such as rapid elasticity and on-demand scaling, so you can quickly support any Internet...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - What is XSS?
Cross Site Scripting: What is XSS?
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most common and prevalent...
r/>
This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most common and prevalent...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation
Session Management: Session hijacking using session fixation
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...