Hi, what do you want to do?
Vlogbrothers
You Cannot Trust Yourself (Hank's End of the Year Worries)
This video had a whole section in it where I complained about how annoyed I get when I see other people who don't consider their impact get really surprised when people get mad at them and how nice it must be to just be blissfully...
Vlogbrothers
We're Thinking About Facebook Wrong
Usually I'm up in the description being like, "here are a bunch of things I wasn't really able to fit in the video" but actually...turns out, if you let me go for 20 minutes, I get most of it out. OK, I guess the one insight I had...
Vlogbrothers
We Have Destroyed Copyright Law
The internet destroyed copyright law and we have not re-built. Instead of laws and courts we now have claims and disputes. YouTube in particular has placed itself in the middle of extra-legal arbitrations over what is and is not fair...
Vlogbrothers
Your Attention
In which John discusses what's wrong with the Internet, whether it's new, and the power (and value) of our attention.
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Browsing the Internet Safely
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Design Effective Wordlists
Learn how to effectively create wordlists that will aid you in cracking passwords
Curated Video
Hack Using Google ONLY
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Acquire Malicious Apps1
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
Google Dorks Live Examples
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Curated Video
LAB 2: Google Hacking
I will show you the basics of Google hacking without any prior technical knowledge
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
LAB 9: What the Internet Knows About You
We will show you what Google knows about you in order to personalize your ads
Curated Video
Virtual Private Networks (VPN)
A virtual private network (VPN) allows users to send and receive data through shared or public networks as though their computing equipment were directly linked to the private network by extending a private network across the latter.
Curated Video
LAB 5: Shodan and IoT Scanners
I will introeuce you to shodan, and teach you how to discover assets over the Internet
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Learning to Code in HTML
This video demonstrates how to start coding in HTML. This clip is from the chapter "Introduction to Getting Started with Web Design" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section provides an introduction...
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Network Access
In this video, we will cover network access. This clip is from the chapter "Mongo with Node" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Mongo with Node.
Curated Video
gRPC [Golang] Master Class Build Modern API and Microservices - [Theory] SSL Security
[Hands-On] gRPC Advanced Features Deep Dive: [Theory] SSL Security This clip is from the chapter "[Hands-On] gRPC Advanced Features Deep Dive" of the series "gRPC [Golang] Master Class: Build Modern API and Microservices".In this...