Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Exploiting Race Conditions Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Creating Accounts
In this video, we will be covering the process of creating user accounts for our application.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tweeting
In this video, you will learn how to create the API endpoint for posting tweets on our Twitter Clone app using Node.js, Express, and MongoDB.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Login
In this video, we will implement the user login functionality using Passport.js authentication.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User Model and Validator
In this video, we will explore how to create a user model and use a validator to ensure that the user data meets certain requirements.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Auth | WelcomeView
The WelcomeView is the first thing your users will see when they sign up for your Twitter Clone app, so it's important to make it welcoming, informative, and easy to use; in this video, we will show you how to design and implement a...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Display Profile Image
In this video, you will learn how to display the user's profile image in our SwiftUI Twitter Clone app.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Profile Customization
In this video, you will learn how to customize the profile of our Twitter Clone app. You will learn how to design and implement user profile pictures, headers, and other UI elements using SwiftUI.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Delete User
In this video, you will learn how to implement a secure endpoint for deleting a user, including verifying the user's identity, deleting all of the user's tweets, and using proper error handling.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Tokens
In this video, we will dive deeper into JWTs and learn how to use them for secure user authentication and authorization.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - User and Tweet Relationship
In this video, we will establish a relationship between users and tweets, and demonstrate how to fetch all tweets by a specific user.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Managing Users and Groups
Every version of Windows has some utility to create, maintain, and remove users and groups from a system. Local Users and Groups give the most granular settings, but for quick setup, you can always add and edit accounts in the User...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Introduction to Users and Groups
The Microsoft NT File System (NTFS) enables fine control of multiple users accessing resources on a single computer. To do this, every person accessing a single computer must have their own user account. Windows also has groups that...
Curated Video
ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 5: Apps Can Go Down
In this video, we will examine the limitation that generative AI apps and services can go down, causing disruptions in content creation workflows. This clip is from the chapter "When (And When Not) to Use AI" of the series "ChatGPT and...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 1
This is the first of the two-part video that demonstrates the actual attack where you would take control of the account with the help of Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Account Takeover through Clickjacking – Part 2
This is the second of the two-part video that demonstrates how to be prevented from the account takeover through Clickjacking. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 2
This is the second of the two-part video that bypasses the authorization and helps you demonstrate the HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the series "Web Hacking...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - HTTP Parameter Pollution – Part 1
This is the first of the two-part video that talks about the root cause of the problem in the browser where we can use this HTTP Parameter Pollution. This clip is from the chapter "Full-Stack Attacks on Modern Web Applications" of the...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Case Studies of Award-Winning Race Condition Attacks
This video explains some case studies of award-winning race condition attacks. This clip is from the chapter "Exploiting Race Conditions in Web Applications" of the series "Web Hacking Expert Full-Stack Exploitation Mastery".This section...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part2)
This is the first of the two-part video on exploiting race conditions for case 2. Here, you would be looking at how the hackers use another race conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
Web Hacking Expert - Full-Stack Exploitation Mastery - Exploiting Race Conditions – Case 1 (Part1)
This is the first of the two-part video on exploiting race conditions for case 1. Here, you would be looking at how the hackers use multithreading conditions for stealing money from a bank. This clip is from the chapter "Exploiting Race...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - The Zen of Backup
Back up your data before you lose it! Create local backups, image backups, and file backups. Use Cloud storage for even more security. This clip is from the chapter "Operational Procedures" of the series "CompTIA A+ Certification Core 2...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Touring iOS
iOS devices use a lot of gestures for accessing functions. The App Store offers all apps available for iOS. Settings enable you to change application permissions, account information, location services, and more. This clip is from the...