Curated Video
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Curated Video
Bug Bounty Program Certification 5.4: Perform Buffer Overflow Attack on Server
This video will help you perform buffer overflow attack. • Setup lab for buffer overflow in Windows10 • Use BadBlue exploit using metasploit • Get meterpreter session using exploitation
Curated Video
Bash Shell Scripting- Automate Server Inventory using Shell Script
This video shows how to Automate Server Inventory using Shell Script. This clip is from the chapter "Real-Time Practice (Low level to High level)" of the series "Complete Bash Shell Scripting".This section covers various Bash shell...
Programming Electronics Academy
Lesson 6 | Arduino Toolchain Overview | Arduino Crash Course
Lesson 6 | Arduino Toolchain Overview | Arduino Crash Course
Programming Electronics Academy
EPS 5: Spinphony with Nick Polito
how Nick was able to create a musical bicycle using Arduino and ‘Ableton Live’ (5:20), and how he and his teammates were able to put the project together in three weeks, despite their limited coding experience (11:05).
Programming Electronics Academy
Episode #08: Intermission: The Process I use for Creating Tutorials
This weeks Episode is what I am calling an intermission, which is basically me taking a break from hardcore Arduino tutorial making, and present a less technical topic. In this intermission video, I walk through the process I use to...
IDG TECHtalk
New 27-inch iMac with M1 Pro chip rumors, plus M1 MacBook memory leak bugs
Rumors and leaks suggest that Apple's 27-inch iMac is next in line for an M1 Pro upgrade, as the company continues its two-year transition to Apple silicon. Earlier this year, Apple updated its 24-inch iMac with an M1 chip. Recently...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Maintenance and Availability
In this video, we will look at maintenance and availability. This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating VM...
Curated Video
Learning LESS (Video 6)
CSS is great; it's a staple of the web and it helps us to produce beautiful websites, but some parts of it are archaic, and it's often time-consuming to get right. LESS changes that. LESS includes built-in features that allow you to...
Curated Video
Ensemble Machine Learning Techniques 3.4: Random Forest
This video aims to teach the viewer about a versatile and powerful algorithm called Random Forest. • We discuss what is Random Forest • We see the difference between Bagging Trees and Random Forest • We look at the advantages and...
Curated Video
Python for Network Forensics 1.2: Learning Dshell
In this video, we will learn how to inspect network traffic at the packet level using Dshell. • Learn to set up a Python virtual environment • Learn to import packet capture • Use Dshell decoders to fuller analyze automate network traffic
Curated Video
Java 11 Programming for Beginners 4.3: Working with Strings, Characters, and Regular Expressions
Strings and regular expressions are key to everyday Java programming. This video gives an overview of how to use them. • Three slides to explain string and regular expression • Use regex in code to split a word • Use string functions to...
Curated Video
Mastering Tableau 2018.1, Second Edition 11.3: Design Tricks for Great Dashboards
Some tricks to create great dashboards. • Steps to create a great design • Creating a great design in Tableau
Curated Video
Mastering Tableau 2018.1, Second Edition 6.2: Working with Sets
In this video, we’ll work with sets. • The difference between groups and sets • Understand different types of sets • Implement different types of sets
Curated Video
Mastering Tableau 2018.1, Second Edition 5.9: Working with Sorting and Nested Sorting
In this video, we’ll see sorts over data. • Understand the importance of sort • Apply sort over the data
Curated Video
Mastering Tableau 2018.1, Second Edition 4.3: Combining Your Data with Union
In this video, we’ll see how we can combine data with the help of Union. • Understand Union • Combine tables using Union
Curated Video
Mastering Tableau 2018.1, Second Edition 2.3: Saving Data Sources and Workbooks, Live, or Extracts
In this video, we’ll see how to save data sources and workbooks. • Understand the different types of workbooks and data sources • The difference between Extract connection and Live connection
Curated Video
Mastering Tableau 2018.1, Second Edition 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Learning D3.JS 5.0 3.5: Creating Clip Paths
In this video, we will learn how to create clip paths. • Write a text path and • Write the and the • Connect everything and view the result
Curated Video
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Curated Video
Dr. Guillermo Martinez Ortiz - Keynote Speech, INET Conference @ King's
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 3 - Dinner Keynote. Dr. Guillermo Martinez Ortiz speaks on the recent economic crisis.
Programming Electronics Academy
We Use Arduino Version .. : Arduino Course 2.2
A walk through of the Arduino IDE version used in the course, and recommendations for getting the most recent version.
Programming Electronics Academy
Ep. 17: Arduino Lie Detectors with Dante Roumega
This week Michael has a chance to chat with Dante Roumega who designed and built his very own Arduino Lie Detector. Dante explains how he came up with such a unique concept (4:25), how his initial product actually made people cry (7:00),...
NASA
NASA | Climate in a Box
Climate modeling requires massive computational power. Until recently, that power required room sized machines with daunting technical and logistic requirements. But new advances in computer design, including hardware and software,...