Hi, what do you want to do?
SciShow
The Infamous, Brain-Bending Birthday Problem
There's a rather famous problem in math of probability called the Birthday Paradox. Let's get into how it works, and how creative uses of this hypothetical problem have real-world applications!
SciShow
4 Algorithms We Borrowed from Nature
We use algorithms every day for things like image searches, predictive text, and securing sensitive data. Algorithms show up all over nature, too, in places like your immune system and schools of fish, and computer scientists...
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Git Snapshot - What It Means to Take a Snapshot
This video explains the Git snapshot.
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Git Internals (All about Object Database) Part 2
This video explains how Git stores the data inside an object database.
Curated Video
Git and GitHub Masterclass - Fast track your Journey to Git! - Understanding Digital Signatures
This video explains digital signatures.
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - Central Logger (rsyslog)
Implement rsyslog for centralized logging, an essential practice for monitoring and troubleshooting system activities.
Curated Video
What is the Blockchain?
Blockchain is a technology for recording transactions. And, since its first use in 2008 for cryptocurrency, it is emerging as one of the must-have technologies in many industry sectors. Project managers will often be called upon to...
Curated Video
Java Multithreading and Parallel Programming Masterclass - Project - Parallel Text File Processing
This is a project-based video on parallel text file processing.
Curated Video
Practical Cyber Hacking Skills for Beginners - Launching a Word List Attack
This video illustrates the first attack type, the word list, which is by specifying the actual mode to Hashcat.
Curated Video
Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hashing
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hardening Networks
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?
Curated Video
Harmful Drugs: Cannabis
Cannabis is a controversial drug: there are debates around its production, legal status and use. What are the facts behind the use of this drug, and how safe or dangerous is it? Biology - Healthy Living - Cannabis is a mild sedative and...
Curated Video
Burp Suite Unfiltered - Go from a Beginner to Advanced - How to Use Decoder Tab
This video explains how to use the decoder tab.
Curated Video
Git and GitHub Masterclass - The Practical Bootcamp - Profile README
This video explains the profile README file, which allows users to use a markdown file named README to write details about themselves such as their skills, interests, GitHub stats, and showcase it to the GitHub community.
<
br/>...
<
br/>...
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - What Is Blue Ocean?
This video explains what Blue Ocean is, which advantages it brings, and its main features.
Curated Video
The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - What Are Cryptographic Functions
In this video, we will be discussing cryptographic functions in Solidity. Cryptographic functions play a critical role in securing smart contracts and ensuring that data transmitted over the blockchain is kept private and tamper-proof....
Curated Video
Learn Java from Scratch - A Beginner's Guide - Step 09 - Inheritance and Overriding with toString() Method
In this video, you will learn about inheritance and overriding with the toString() method.
Curated Video
Express Framework Fundamentals - Secure Sign-Up with Auth0 and Node.js - Sign Up and Database Completion with Hashing and Salt
In this video, we will work on sign up and database completion with Hashing and Salt.
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework...
<
br/>
This clip is from the chapter "Authenticating Username and Password with Express and Passport" of the series "Express Framework...
Curated Video
Fundamentals of Secure Software - Hashing Overview
This video provides an introduction and overview of hashing.
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files
This video talks about how to find publicly exposed backup files using Google Hacking.
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by...
<
br/>
This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Login
In this video, we will implement the user login functionality using Passport.js authentication.
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Password Hashing with Bcrypt
In this video, we will explore how to securely hash and store user passwords using Bcrypt.