Instructional Video11:28
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video5:52
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Creating Accounts

Higher Ed
In this video, we will be covering the process of creating user accounts for our application.
Instructional Video10:49
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tweeting

Higher Ed
In this video, you will learn how to create the API endpoint for posting tweets on our Twitter Clone app using Node.js, Express, and MongoDB.
Instructional Video13:21
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Login

Higher Ed
In this video, we will implement the user login functionality using Passport.js authentication.
Instructional Video13:36
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User Model and Validator

Higher Ed
In this video, we will explore how to create a user model and use a validator to ensure that the user data meets certain requirements.
Instructional Video16:36
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Auth | WelcomeView

Higher Ed
The WelcomeView is the first thing your users will see when they sign up for your Twitter Clone app, so it's important to make it welcoming, informative, and easy to use; in this video, we will show you how to design and implement a...
Instructional Video5:03
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Display Profile Image

Higher Ed
In this video, you will learn how to display the user's profile image in our SwiftUI Twitter Clone app.
Instructional Video7:45
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Profile Customization

Higher Ed
In this video, you will learn how to customize the profile of our Twitter Clone app. You will learn how to design and implement user profile pictures, headers, and other UI elements using SwiftUI.
Instructional Video6:27
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Delete User

Higher Ed
In this video, you will learn how to implement a secure endpoint for deleting a user, including verifying the user's identity, deleting all of the user's tweets, and using proper error handling.
Instructional Video7:49
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tokens

Higher Ed
In this video, we will dive deeper into JWTs and learn how to use them for secure user authentication and authorization.
Instructional Video4:13
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User and Tweet Relationship

Higher Ed
In this video, we will establish a relationship between users and tweets, and demonstrate how to fetch all tweets by a specific user.
Instructional Video12:02
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Managing Users and Groups

Higher Ed
Every version of Windows has some utility to create, maintain, and remove users and groups from a system. Local Users and Groups give the most granular settings, but for quick setup, you can always add and edit accounts in the User...
Instructional Video6:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Introduction to Users and Groups

Higher Ed
The Microsoft NT File System (NTFS) enables fine control of multiple users accessing resources on a single computer. To do this, every person accessing a single computer must have their own user account. Windows also has groups that...
Instructional Video1:00
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 5: Apps Can Go Down

Higher Ed
In this video, we will examine the limitation that generative AI apps and services can go down, causing disruptions in content creation workflows. This clip is from the chapter "When (And When Not) to Use AI" of the series "ChatGPT and...
Instructional Video24:09
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1

Higher Ed
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video4:24
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2

Higher Ed
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Instructional Video10:21
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 2

Higher Ed
This is the second of the two-part video that bypasses the authorization and helps you demonstrate the HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Instructional Video6:03
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1

Higher Ed
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Instructional Video2:25
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks

Higher Ed
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Instructional Video8:35
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video11:29
Curated Video

Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)

Higher Ed
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Instructional Video10:54
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup

Higher Ed
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2...
Instructional Video9:19
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail

Higher Ed
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Instructional Video7:25
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Touring iOS

Higher Ed
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...