Hi, what do you want to do?
Curated Video
Python for Network Forensics 3.3: Deeper File Properties
In this video, we will explore other important properties of file that will allow you to decipher a known bad or malicious actor. • Learn how a digest algorithm works with a file • Develop a Python application to hash a file • Alter our...
IDG TECHtalk
How to and why you should disable LLMNR with Windows Server
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.
Curated Video
Bash Shell Scripting- Writing Comments for a Shell Script
This video shows how to write comments for a shell script.<br/<br/>>
This clip is from the chapter "Basics of shell scripting" of the series "Complete Bash Shell Scripting".This section covers the basics of shell scripting.
This clip is from the chapter "Basics of shell scripting" of the series "Complete Bash Shell Scripting".This section covers the basics of shell scripting.
Packt
Practice Exercises with XPath and Cascading Style Sheets (CSS) with Regular Expressions
This video contains practice exercises with XPath and CSS with regular expressions.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to...
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to...
Curated Video
Learn and Master C Programming - Understanding Conditional Compilation
We will learn about new preprocessor directives used for conditional compilation of code.
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In...
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - What is the Hash Function?
This video explains the hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a new Git...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a new Git...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Attacks on our cryptography
CISSP Domain 3: System Architecture and Engineering: Attacks on our cryptography.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Number of Folders Created for Objects
This video explains the number of folders that can be created for objects. This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Read-tree
This video sheds light on the Git read-tree.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel.
r/>
This clip is from...
r/>
This clip is from...
Curated Video
Describe network protocols : The Course Overview
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP.<b<br/>r/>
This video will give you an overview about the course.
This video will give you an overview about the course.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - JSON Versus Git Database
This video illustrates the difference between JSON and the Git database.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Exploring Git Objects with the git cat-file Command
This video explores some Git objects with the git cat-file command.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains...
Curated Video
Complete Modern C++ - std::hash (C++11)
This video demonstrates how to write a custom hash function and equality function object for unordered containers.
r/>
This clip is from the chapter "Standard Template Library" of the series "Complete Modern C++".This section...
r/>
This clip is from the chapter "Standard Template Library" of the series "Complete Modern C++".This section...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - Project: Job Scheduler execution flow
Visualization of how a hashmap works to achieve O(1) complexity/performance
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data...
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Contents of Git Objects
This video explains the various contents of Git objects.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Versus GitHub
This video illustrates the difference between Git and GitHub.
r/>
This clip is from the chapter "Introduction to Git and GitHub" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section provides an...
r/>
This clip is from the chapter "Introduction to Git and GitHub" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section provides an...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Writing a New Git Object with a git hash-object
This video illustrates how to write a new Git object with a git hash-object.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Packt
Generating Customized Cascading Style Sheets (CSS) from HTML Attributes
This video explains how to generate a customized CSS from HTML attributes.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to Advanced...
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to Advanced...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hashing
CISSP Domain 3: System Architecture and Engineering: Hashing.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
Curated Video
Core Java Programming Course- Hash Map
This video explains the Hash map.<br/<br/>>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available in Java.
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available in Java.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - What Have We Learned so Far?
This video provides an overview of the contents we have learned so far in this section.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Accounting
The 3 As—authentication, authorization, and accounting/auditing—play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows.
r/> ...
r/> ...