Curated Video
Python In Practice - 15 Projects to Master Python - Admin Application and Creating Our Own Applications
This video explains the Admin application and creating our own applications. This clip is from the chapter "eBook Web Store" of the series "Python in Practice - 15 Projects to Master Python".This section focuses on the eBook web store.
Curated Video
Python In Practice - 15 Projects to Master Python - Creating GUI Application Tk( ) Windows and Widgets
This video explains creating GUI application Tk( ) windows and widgets. This clip is from the chapter "Advanced Level: Python GUI" of the series "Python in Practice - 15 Projects to Master Python".This section focuses on the advanced...
Curated Video
Python for Network Forensics 1.4: Importing Scapy Modules
In this video, we will design a Python based Scapy tool to automate our network analysis. • Familiarize ourselves with common Python data structures • Learn to import 3rd party modules into our own application • Unleash the power of...
Curated Video
Python for Network Forensics 5.4: Post Enumeration
In this video, we will learn how to perform post enumeration once access has been obtained. • Learn what post-enumeration will provide an attacker • Learn how popular post-exploitation scripts find data • Challenge yourself to modify...
Curated Video
Python for Network Forensics 5.1: Enumeration
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Curated Video
Python for Network Forensics 3.5: Reading the Journal
In this video, we will continue our experimentation with reading and parsing system logs. • Further interact with the Systemd journal • Use our Python skills to effectively parse information regarding system events • Narrow down events...
Programming Electronics Academy
Download and Install the Arduino IDE for MAC :: Arduino Crash Course
Before you begin using the Arduino IDE, you must first learn how to download, install, and set your preferences. This lesson is specifically tailored for those who use a Mac. (The last lesson covered this same topic, but for PC users.)...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 2)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Programming Electronics Academy
What is Serial.begin(9600)?
WHAT IS SERIAL.BEGIN(9600)? Are you wondering what Serial.begin(9600) does? You’ve probably seen it in most of the Arduino programs you’ve looked at – but what’s it there for?! Do you even need to use Serial.begin()? What if you change...
Rock 'N Learn
Subtraction Rap - Digits up to 20
Here is the fun and easy way to learn to read with Rock 'N Learn Mathematics. Enjoy learning with fun, catchy, engaging mathematics songs.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - Self-Hosting Versus Hosting Provider
In this lesson, we will understand the basic difference between the self-hosting provider, which runs and maintains a website or service using a private web server, and the hosting provider, using a service outside of someone's own control.
Curated Video
Programming Basics: Definite and Indefinite Iteration in Scratch
This tutorial video explores the concepts of definite and indefinite iteration in programming using Scratch. The instructor demonstrates how to create a password protection system and a game where a pterodactyl chases the mouse. Viewers...
Curated Video
Robotic Process Automation - UiPath RPA Developer Masterclass - Introduction to RPA – What and How
This video teaches you what RPA is and how it works. The lesson also includes a demo. This clip is from the chapter "Introduction to RPA and Its Working Methodology" of the series "Robotic Process Automation - UiPath RPA Developer...
Curated Video
The Ultimate Guide to Python Programming With Python 3.10 - Terminal
Here, we will understand the concept of working on a terminal with programming and non-programming operations of a computer. This clip is from the chapter "Generic Programming" of the series "The Ultimate Guide to Python Programming with...
Curated Video
Python for Everybody: The Ultimate Python 3 Bootcamp - Project: Project: the Code
It's 20 lines of codes. Seriously, that's it! 20 lines of Python can leverage machine learning and detect objects (and people) inside of images! We wrote longer classes in this course than that. This clip is from the chapter "Final...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Internet Protocol Suite - TCP/IP
In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.
NASA
Elegance: Music & Math
At NASA's Goddard Space Flight Center in Greenbelt, Maryland, this past summer, sometimes before the start of the work day, interns Philip Lu and Gabriel Apaza played impromptu classical piano concerts on the Steinway in Goddard's...
friEdTech
How to Use the New Screencastify
Screencasting is an incredibly valuable skill for teachers. Just think of all the applications! *Can't be at school tomorrow? Talk directly to your students with a Screencast & avoid writing lengthy sub plans! *Need to give directions...
Curated Video
Python for Network Forensics 3.1: Enumerating Directories
In this video, we will further the understanding of directory traversal in GNU/Linux systems. We will also understand and accomplish traversal recursively. • Learn the concepts of threading to implement recursive traversing • Begin using...
Curated Video
Python for Network Forensics 5.3: Exploitation
Once an attack vector has been found we will proceed with exploitation to take over the system. • Learn about a common attack vector through exploitable web services • Develop a Python-based reverse shell to gain access into the system •...
Curated Video
Python for Network Forensics 2.2: Populating File Properties
In this video, we will learn to populate properties of files such as permissions and timestamps. • Understand how to populate file properties • Populate and examine file permissions • Learn and query the different available timestamps of...
ProgrammingKnowledge
C Programming Tutorial | Learn C programming | C language
C Programming Language is the most popular computer language and most used programming language till now. It is very simple and elegant language. 1) This is by far the most comprehensive C Programming course you'll find here, or anywhere...
Big Think
Can We Digitize the Voting System? Blockchain, Corruption, and Hacking | Brian Behlendorf
New videos DAILY: https://bigth.ink Join Big Think Edge for exclusive video lessons from top thinkers and doers: https://bigth.ink/Edge ---------------------------------------------------------------------------------- Anyone who's...