Hi, what do you want to do?
IDG TECHtalk
How to reset the Kerberos password in Active Directory
Changing the Kerberos password will help prevent golden ticket attacks on Active Directory.
Curated Video
Core Java Programming Course- Hash Set
This video explains the Hash set.<br/<br/>>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available in Java.
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available in Java.
Packt
Hash Tables
This video provides an introduction to hash tables.
<
br/>
This clip is from the chapter "Data Structures – Hash Tables" of the series "Data Structures and Algorithms: The Complete Masterclass".This section introduces you to hash...
<
br/>
This clip is from the chapter "Data Structures – Hash Tables" of the series "Data Structures and Algorithms: The Complete Masterclass".This section introduces you to hash...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The CIA Triad - Part 1 - Confidentiality, Integrity, and Availability
This is the first part of a two-part video that explains the CIA triad.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 09 - Inheritance and Overriding - with toString() Method
In this session, we will learn about inheritance and overriding - with the toString() method.
r/>
This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java...
r/>
This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - Thank you for taking the course and next steps
Start building the set_val method and introduce python's hash function
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data...
r/>
This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data...
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 21)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web...
Curated Video
Power BI Masterclass - Learning DAX: Dynamically Highlight Highest and Lowest Sales
In this video, we will be learning DAX to dynamically highlight highest and lowest sales.
r/>
This clip is from the chapter "Additional Tips and Tricks" of the series "Power BI Masterclass".In this section, we will be covering...
r/>
This clip is from the chapter "Additional Tips and Tricks" of the series "Power BI Masterclass".In this section, we will be covering...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Fast-Forward Merge in Action
This video demonstrates the process of fast-forward merge.
r/>
This clip is from the chapter "Merging Branches" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section focuses on the need for...
r/>
This clip is from the chapter "Merging Branches" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section focuses on the need for...
Curated Video
Java Interview Guide : 200+ Interview Questions and Answers - Map interfaces and implementations - HashMap, LinkedHashMap and TreeMap
Collections: Map interfaces and implementations - HashMap, LinkedHashMap and TreeMap
r/>
This clip is from the chapter "Collections" of the series "Java Interview Guide : 200+ Interview Questions and Answers".In this section,...
r/>
This clip is from the chapter "Collections" of the series "Java Interview Guide : 200+ Interview Questions and Answers".In this section,...
Curated Video
Multi-Paradigm Programming with Modern C++ - Searching and Sorting
Search is the most common operation we perform on data. There are three common types of search: Linear, sorted (binary), and by hash.
• Linear search is the simplest way to find things, and often the fa
stest
• Overview...
• Linear search is the simplest way to find things, and often the fa
stest
• Overview...
Curated Video
Complete Modern C++ - Feature Test Macros
This video introduces the __has_include macro to test for existence of a header file.
r/>
This clip is from the chapter "C++17 Core Language Features" of the series "Complete Modern C++".This section explains core features of...
r/>
This clip is from the chapter "C++17 Core Language Features" of the series "Complete Modern C++".This section explains core features of...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Exploring a Git Tag Object
This video explains the process of exploring a Git tag object.
r/>
This clip is from the chapter "Git Tags" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains the concept Git tags. It...
r/>
This clip is from the chapter "Git Tags" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains the concept Git tags. It...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - MAC, HMAC, SSL, and TLS
CISSP Domain 3: System Architecture and Engineering: MAC, HMAC, SSL, and TLS.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
Learn and Master C Programming - Section Overview - Preprocessor Directives
Quick introduction and overview.
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In this section, we look into #define directive and its uses to...
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In this section, we look into #define directive and its uses to...
IDG TECHtalk
Card skimming moves online | TECH(talk)
CSO staff writer Lucian Constantin offers advice on how online retailers can prevent online payment fraud.
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Why Git Blobs do not Store File Names
This video explains why the Git blobs do not store a file name.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how...
Curated Video
The Full Stack Web Development - Login Functionality
Backend programming with Node.js: Login Functionality
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
Curated Video
Core Java Programming Course- Linked Hash Set
This video explains the linked Hash set.
r/>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available...
r/>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps available...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Cryptographic Hashes
This video explains the working of hashes, such as MD5 and SHA-1. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification N10-007: The Total...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Revert
This video explains the Git revert command.
r/>
This clip is from the chapter "Advanced Git" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to clone one of the public...
r/>
This clip is from the chapter "Advanced Git" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to clone one of the public...
Packt
Logging in Users
API Authentication and Security (Task App): Logging in Users
<
br/>
This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you...
<
br/>
This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you...
Curated Video
The Full Stack Web Development - Password Encryption
Backend programming with Node.js: Password Encryption
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
r/>
This clip is from the chapter "Backend programming with Node.js" of the series "The Full Stack Web Development".In this section, we work with the backend technology like...
Curated Video
Learn Git in 3 Hours- Browsing Project History
The main focus of Git is to track changes to files over time. To view all changes committed to a repository over a certain time period, we can use the Git log command.
• Open a repository that has been committ
ed to
• Use...
• Open a repository that has been committ
ed to
• Use...