IDG TECHtalk
How to use Attack Surface Reduction Rules in Windows 10
These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.
IDG TECHtalk
3 easy ways to make your Windows network harder to hack
Start the new year off by eliminating common paths for attackers to breach your network.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - The fire triangle and fire suppression
CISSP Domain 3: System Architecture and Engineering: The fire triangle and fire suppression. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Brian McLogan
What is the solution to the system of equations
👉Learn about solving a system of equations by graphing. A system of equations is a set of more than one equations which are to be solved simultaneously. To solve a system of equations graphically, we graph the individual equations making...
Curated Video
Understanding Digital Technology in Business: Ecommerce, Big Data, and ERP Systems
The video discusses digital technology and its impact on businesses. It explains that any equipment containing a computer chip is considered digital technology and the adoption of such technology can lead to increased efficiency and...
Curated Video
Principles of Energy and Energy Transfers
This is a video presentation that discusses the principles of energy. It starts by defining different types of energy stores such as kinetic, gravitational potential, elastic potential, thermal, chemical, electrical, and internal energy....
Brainwaves Video Anthology
Lisa Feldman Barrett - How Emotions are Made The Secret Life of the Brain
Lisa Feldman Barrett, PhD, is a University Distinguished Professor of Psychology at Northeastern University, with appointments at Harvard Medical School and Massachusetts General Hospital. In addition to the book How Emotions are Made:...
Packt
Introduction to computer hardware and software : Troubleshooting Firmware
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A system’s BIOS is robust and rarely causes trouble, but when it does a good tech must be ready to troubleshoot. Understanding a few simple tricks...
Tumble Science Podcast for Kids
Candy Mountain: Using Sweets to Study the Earth
Landscapes evolve very slowly, over thousands of years, which makes them both fascinating and a little difficult to study. Mathematicians have looked at landscape features, including mountains and big rock formations, and wondered where...
IDG TECHtalk
What do recent public SAP exploits mean for enterprises? | TECH(talk)
Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...
Curated Video
Industrial Refrigeration system Basics - Ammonia refrigeration working principle
Industrial refrigeration system basics, in this video we'll be looking at how ammonia refrigeration systems work, starting at the basics to understand how industrial refrigeration systems work. We'll be looking at system schematics and...
Brainwaves Video Anthology
Sir Ken Robinson - Revolutionizing Education from the Ground Up
Sir Ken Robinson - Revolutionizing Education from the Ground Up
National education systems worldwide are being reformed to meet the challenges of the 21st century. As a respected adviser to governments in Europe, Asia and the United...
Curated Video
CISSP®- General Data Protection Regulation (GDPR)
This video focuses on GDPR. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk Management...
Curated Video
C++ Programming By Example - Why C++?
Why should you use C++ in 2018? Is the language still useful? • Identify how C++ is used today • Compare the advantages that C++ has over other languages • Analyze the particular reasons for using C++ This clip is from the chapter...
Flipping Physics
Introduction to Base Dimensions and Your Friends
Introduction to SI (Système international d'unités or Metric Units) and English (or Imperial) units. Dimensions are your Friend.
IDG TECHtalk
How to prevent credential theft in Windows networks
Attackers covet credentials, and Windows admins sometimes make it too easy for them. Here’s how to harden Windows networks against credential theft.
NASA
NASA | Climate in a Box
Climate modeling requires massive computational power. Until recently, that power required room sized machines with daunting technical and logistic requirements. But new advances in computer design, including hardware and software,...
Brian McLogan
Graphing a system of liner inequalities with shading
👉 Learn how to graph a system of inequalities. A system of inequalities is a set of inequalities which are collectively satisfied by a certain range of values for the variables. To graph a system of inequalities, each inequality making...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - IPSec and PGP
CISSP Domain 3: System Architecture and Engineering: IPSec and PGP. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The CIA triad
CISM Domain 1: Information Security Governance: The CIA triad This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp...
Curated Video
IELTS Reading Tips and Tricks for Every Exam: IELTS Energy 1095
Learn the IELTS Reading tips and tricks you need for both the Academic and the General IELTS Exams.
IDG TECHtalk
How to secure printers on Windows networks
Attackers often gain access to networks through the printers connected to them. Here’s how to address printer vulnerabilities on your network.