Curated Video
Introduction to Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Account Management
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Practical Ninjas
What makes our phones smart? - SOC | System on Chip | Brain of a smartphone
What makes our phones smart? - SOC ------------------------------------------------------------- In this age of digitisation, the one thing that we have on us is undoubtedly the smartphone. Some smartphones are great while some are just...
Next Animation Studio
FDA approves first indigestible medical sensor
The FDA has approved the first medical sensor pill that sends biostat messages to a smartphone via a patch worn on the stomach. The pill tells a patient whether they have taken their medication, and can also record vital stats such as...
Next Animation Studio
Deep-sea ‘gold rush’ led by China could be about to devastate the oceans
A deep-sea ‘gold rush’ led by China could soon have catastrophic consequences for marine ecosystems.
Science ABC
USB Types: Various Types of USB Cables (A, B and C) and Their Differences
USB cables are of different types like Type A, Type B and Type C. This classification is based on type of the connector found at the end of a USB connector. Another way to classify USB is based on its generation like: USB 1.0 (oldest),...
Curated Video
Do Microwaves Interfere With WiFi Signals?
Yes. Microwaves and radio waves are physically the same, i.e. both are forms of electromagnetic radiation. Some microwave rays can leak out and interfere with WiFi signals. We are basically constantly surrounded by electromagnetic...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Curated Video
5G and Wireless Communication for Beginners - Extra Story 03: Setting up the Market Landscape with/without FRAND (Fair, Reasonable, and Non-discriminatory)
This video explains how to set up the market landscape with/without FRAND. This clip is from the chapter "Expanding Mobile Internet with 3G" of the series "5G and Wireless Communication for Beginners".This section explains expanding...
Curated Video
Why New Business Ideas Come About: The Pressures That Force Them
This video is a lecture presentation that discusses why new business ideas come about. The speaker talks about the importance of businesses reacting to changes, including changes in consumer tastes and preferences, technological...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Next Animation Studio
What causes smartphone glass to break
Whether a smartphone screen will shatter or escape destruction depends on a few factors. Two of these factors include; hardness and strength of the glass. Glass breaks when the force of impact becomes stronger than surface compression. A...
Science360
The spy who hacked me - Measuring the security vulnerabilities of 3-D printing
In episode 65, Jordan and Charlie explore how a smartphone can hack a 3-D printer by measuring leaked energy and acoustic waves. Despite features such as encryption and watermarks, researchers at the University at Buffalo have found...
Science360
NSF Science Now: Episode 18
In this week's episode we dig up the ""King of Gore,"" the oldest discovered Tyrannosaurid dinosaur yet. We also learn how ordinary foam can help protect athletes from concussions and how a tongue-controlled wheelchair could give people...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
NASA
NASA in Silicon Valley: Roger Hunter Talks About Taking Big Risks with Small Satellites
A conversation with Roger Hunter, Program Manager for the Spacecraft Technology Program at NASA’s Ames Research Center in Silicon Valley.
Paul Marriott
Blynk IoT (Blynk 2.0) App w/Arduino Uno R3, ESP8266 ESP-01 Module, Blynk Cloud & 4 x LED - Tutorial
A full fledged tutorial of 4 LEDs connected to an Arduino device via. Blynk IoT (aka Blynk 2.0), Blynk Cloud and the ESP8266 ESP-01 WiFi module. The device simulates 'lights' of a smart home by turning LEDs on and off through 'Blynk IoT'...
Science360
SMARTPHONE-COMPATIBLE DEVICE TO DETECT MISLABELED DRUGS
A new more affordable, portable, smartphone-compatible spectrometer could soon help users detect mislabeled or fake pills. The device, which is being developed by NSF-funded small business Stratio, Inc., is based on a shortwave infrared...
Science360
Scientists discover the King of Gore ! NSF Science Now 18
In this episode, we dig up the “King of Gore,” the oldest discovered Tyrannosaurid dinosaur yet. We also learn how ordinary foam can help protect athletes from concussions and how a tongue-controlled wheelchair could give people with...
Limonero Films
Kodak: A Tale of Missed Opportunities in the Digital Age
This video explores how Kodak, once a dominant force in the photography industry, failed to adapt to the rise of digital technology and smartphones, ultimately leading to its downfall and bankruptcy. It highlights the importance of...
Curated Video
Google Maps Secrets: How Exactly Does Google Maps Work?
How Google Maps work? How does Google Maps know about the traffic conditions? How is it so accurate about predicting traffic conditions? This is a short, animated videos for kids and laymen to understand the science and technology that...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Smartphone Hardening Lab
Smartphones are small computers that almost everybody carries around with them. Many standard desktop computers hardening techniques can be applied to smartphones. This clip is from the chapter "Securing Dedicated Systems" of the series...