Curated Video
Bug Bounty Program Certification 8.3: Find Bug and Hack Database of a Website Using Windows Tools
This video focuses on database attack using Windows tool. • Explore Havij tool • Download and installation of Havij in Windows • Understand Web database penetration using Havij tool in windows
The Wall Street Journal
New Zealand Prime Minister Jacinda Ardern on Covid-19 and the Economy
New Zealand's Prime Minister discusses the country's "zero Covid-19" strategy, vaccine mandates and other lessons from fighting the pandemic.
Guinness World Records
Inside the Batcave: The World of Cosplay and Superhero Philanthropy
This video features a passionate cosplayer who holds the Guinness World Record for the cosplay suit with the most functional gadgets. He showcases his impressive collection of Batman-themed gadgets and explains how cosplay has allowed...
Let's Tute
Improving Your Handwriting: Tips for Neat and Presentable Writing
In this video, the speaker provides helpful tips for improving handwriting, emphasizing its importance in exams and paper presentations. The tips cover aspects such as posture, grip, spacing, slant, and tool selection.
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 39)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web applications in a...
Curated Video
Bug Bounty Program Certification 5.3: Perform Denial of Service Attack on Server
This video will help you understand DOS attack process • Use LOIC tool to perform DOS attack • Attack on other systems in network • Monitor DOS attack using Wireshark
ATHS Engineering
IED Screwdriver Case Model Tutorial (Onshape)
Today, we will use a variety of Onshape tools to create a screwdriver case.
IDG TECHtalk
How to keep attackers from using Active Directory against you
Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Service Categories
In this video, we will cover service categories. This clip is from the chapter "Azure Services - An Overview" of the series "AZ-104: Microsoft Azure Administrator Full Course".In this section, we will cover a quick overview of Azure...
Curated Video
Changing Text Case in Microsoft Excel
In this tutorial, the speaker demonstrates how to easily change text from uppercase to lowercase, title case, or sentence case in Microsoft Excel using simple formulas. By following the step-by-step instructions, users can efficiently...
Curated Video
Advanced Swift 2 Application Development (Video 4)
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
Packt
Bubble Sort Visualization
This video focuses on bubble sort visualization. This clip is from the chapter "Algorithm: Sorting Elementary" of the series "Data Structures and Algorithms: The Complete Masterclass".This section introduces you to sorting elementary.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Installing a Wireless Network
This video demonstrates how to install a wireless network and explains at the interference, layout, and quality of signal. This clip is from the chapter "Wireless Networking" of the series "CompTIA Network+ Certification N10-007: The...
Curated Video
Creative Text Highlighting in Microsoft PowerPoint
Learn how to highlight text in Microsoft PowerPoint without a dedicated tool by using simple shapes and colors. This video tutorial demonstrates how to create highlighting effects by drawing rectangles, customizing colors, and arranging...
All In One Social Media
🍁 Fall Social Media Content Ideas: What You Should Start Creating ASAP!
Fall is here and it is time to make sure your social media content calendar is filled with relevant (goal-driven) content focused on engaging your audience while having some fun. This video will give you tons of ideas to get your fall...
Curated Video
Learning Scala Web Development (Video 11)
The Scala programming language has gained a lot of traction in the last couple of years because of its functional orientation and conciseness. The industry has a strong interest in using Scala in modern production systems, and as such,...
XKA Digital
Leadership means responsibility
John O'Brien served ten years as a British Army officer where operational experience shaped his approach to inspiring leadership and purpose driven delivery. He co-leads Destria Partners, a UK based, globally ethical purpose agency,...
Packt
Introduction to computer hardware and software : RAM Features
From the section: RAM. Here, we learn about RAM technology. DRAM varies in other ways, such as single-sided or double-sided DRAM. Different motherboards may or may not be able to take advantage of these features.
All In One Social Media
Streamyard Free vs Paid // Which one do you need?
Streamyard has multiple options available for users including a free, standard, & pro. In this video, I will break down streamyard free vs paid plans.
friEdTech
How to Make a Copy Link for a Google File
Sometimes you want your participants or students to have a copy of the Google file you're working with right in front of them . . . think Hyperdoc or even a slideshow with clickable links. These are the steps to create that special link...
The Wall Street Journal
Google's Venture Into Healthcare
Google's David Feinberg outlines the Silicon Valley giant's progress in tackling health initiatives -- from its partnerships with Ascension, the Mayo Clinic and The World Health Organization to the development of health-tech solutions.
IDG TECHtalk
How to use Microsoft’s Sysmon and Azure Sentinel logging tools
Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.
NASA
NASA in Silicon Valley: Bill Thigpen Talks About How NASA Uses Supercomputers
A conversation with Bill Thigpen, Branch Chief of Advanced Computing at NASA’s Ames Research Center in Silicon Valley.