Hi, what do you want to do?
Curated Video
Practical Cyber Hacking Skills for Beginners - Working with DNS Commands
In this video, you will learn about the different commands needed to operate the DNS and protect a network from being attacked.
Curated Video
Easy File Conversion
Learn how to convert files between different formats quickly and easily. This video covers online tools and software for converting documents, images, and media files. Save time by knowing the best methods for file conversion. ...
Let's Tute
Maintaining Property Documents and Helpline Numbers
In this session we are going to understand the How to maintain property documents and Importance of safeguarding property documents and the Types of Property documents and the different way of maintaing records of helpline...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Environment Setup and First Run
In this video, you will learn how to download and install Code::Block IDE on our system, then learn how to set it up.
<
br/>
This clip is from the chapter "Module 1" of the series "Fundamentals of Object-Oriented Programming -...
<
br/>
This clip is from the chapter "Module 1" of the series "Fundamentals of Object-Oriented Programming -...
Curated Video
Java Multithreading and Parallel Programming Masterclass - Why We Should Reuse Threads
This video explains why you should reuse threads.
Curated Video
Java Multithreading and Parallel Programming Masterclass - Project - Parallel Text File Processing
This is a project-based video on parallel text file processing.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Hardening - Enabling the Smart Screen Filter
Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Tor
In this video, the author talks about a popular anonymity tool called Tor, the most powerful tool available to provide anonymity on the Internet.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - UML Inheritance - Case Study - Employee Part 1
In this video, we will first understand what inheritance is. Then we will have a look at an employee inheritance hierarchy with a UML diagram. Based on the information in the diagram, we will be writing a program to fulfil the...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Classes - File I/O Program
In this video, we will work on a patient data program and learn about input/output classes.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will...
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Files - CHAR IO RDBUF
In this video, you will learn about char() and rdbuf().
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Files - BUFFER
In this video, you will learn about file I/O readd Buffer class.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard...
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Files - FSTREAM
In this video, you will learn about file I/O classes such as fstream, ifstream, and ofstream.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Header and Implementation Files
In this video, you will learn how to add header and implementation files to our distance program.
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
<
br/>
This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you...
Curated Video
Practical Cyber Hacking Skills for Beginners - Launching a Combinator Attack
Here, we will look at how the combinator attack is performed with the two text files required to complete the attack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Launching a Word List Attack
This video illustrates the first attack type, the word list, which is by specifying the actual mode to Hashcat.
Curated Video
Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Curated Video
Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hashing
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hardening Networks
Here, you will learn how to harden networks. What devices and protocols are available to harden a network from being hacked?