TED-Ed
TED-Ed: How close are we to uploading our minds? | Michael S.A. Graziano
Imagine a future where nobody dies— instead, our minds are uploaded to a digital world. There they could live on in a realistic, simulated environment with avatar bodies, calling in and contributing to the biological world....
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Scripting
In this video, we will look at the different scripts used in NMAP, programs, or codes used to check the vulnerability of networks and other functional availabilities.
Curated Video
SETI: Are We Alone?
The SETI project scans the skies for alien messages, and controversially claim they succeeded in 1977. Physics - Universe - Learning Points. The Search for Extra-Terrestrial Intelligence, or SETI, is a collection of scientists who scan...
Curated Video
Intuition
What is intuition and how does it work? A fireman explains how intuition saved his and his crews' lives. Biology - Being Human - Learning Points. The human brain has powers we aren't normally aware of. There is a part of our brain that...
Curated Video
Digitizing Ghent University's Library
At the heart of the historic Belgian city of Ghent is the city's university. Ghent University s library has a collection in excess of a million books in French, Flemish, German and English. Since 2007 the library has been working with...
Curated Video
Master SQL for Data Analysis - Partitions
In this lesson, we will explore partitions, a popular strategy to handle growing amounts of data, and break tables into smaller parts called partitions. This clip is from the chapter "Databases - Terminology" of the series "Master SQL...
Curated Video
The Evolution of Shopping Technology: From ATMs to Biometric Transactions and Online Innovation
This video explores the evolution of electronic transactions over the past four decades, highlighting key advancements such as biometric authentication, mobile phone scanning for product information, and the rise of online shopping. From...
Brave Wilderness
SPIKED by Sharpest Lizard on Earth! (Thorny Devil)
On this adventure I’m in Western Australia tracking down the sharpest lizard in the world! Covered from head to tail with spikes as sharp as a rose thorn. I’m going to put it to the test and see if it’s sharp enough to draw blood!
Curated Video
Cutting-Edge Technologies for the Blind and Visually Impaired
At Vision in Birmingham, cutting-edge inventions and gadgets were showcased to assist the blind and visually impaired. These included computer keyboards with larger buttons and Braille computer pads, phones with larger buttons and...
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
How Does Port Scanning Work
In this video, you will learn the two main techniques used in port scanning. We will be mainly using NMAP tool
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
LAB 11: NMAP Tool
We will download and install ZENMAP, which is the GUI version of NMAP
Curated Video
Accessing and Treating the Brain and Nervous System: Scanning, Tumors, and Spinal Injuries
The video discusses how the brain works, various methods to investigate its function, and the limitations of the treatments used for brain and spinal injuries. The video covers the use of CT scan and PET scan, highlighting their...
Brainwaves Video Anthology
Barry Joseph - Informal Science Learning in a Digital Age
Barry Joseph is known as a changemaker who is passionately devoted to envisioning new ways digital media can "address significant personal and social issues." Since 2012 Joseph has worked as the Associate Director For Digital Learning at...
AllTime 10s
10 Strangest Underwater Discoveries
With so much of the earth's oceans being unmapped, there are certainly some strange things down there. . .
Curated Video
Explain web security : The Course Overview
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Physics Girl
Are MRIs safe?
Are there any dangers associated with receiving an MRI and how exactly does an MRI work? Is it safe? Medical imaging, specifically magnetic resonance imaging (MRI), has come so far that we can create high resolution images of the entire...
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Brave Wilderness
Frog Scavenger Hunt! - Can I Catch Them All?
In this episode, Coyote is in Costa Rica to go on a frog scavenger hunt! Costa Rica is home to many diverse frog species, making it the perfect place for this scavenger hunt. The question is.. how many different species of frogs can...
Curated Video
Explain web security : Operating Systems and Tools Used
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
ACDC Leadership
Role of Government- EconMovies #12- The Terminator
In this episode of Econmovies, I discuss the role of the government and the two extremes of the economic spectrum: State Socialism and Neoliberalism. I also talk about the views of Milton Friedman. By the way, what did you think about...
Curated Video
Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...