Curated Video
Blake Ross and the Firefox Revolution: Challenging Internet Explorer
Blake Ross, a sophomore at Stanford University, is part of the developmental team behind Firefox, a revolutionary Internet browser aiming to challenge Microsoft's Internet Explorer. With customizable features, protection against pop-up...
Curated Video
Innovations and Celebrations: Self-Cooling Cans and Wacky Shaped Cars at the FIFA World Cup Park
This video transcript showcases two unique inventions - a self-cooling can that allows for a refreshing drink without the need for a refrigerator, and a football-shaped car designed to promote the FIFA World Cup. These inventions not...
Curated Video
Battle of Targoviste (Part 1/2) Vlad the Impaler Rises
Battle of Targoviste (Part 1/2) Vlad the Impaler Rises
Curated Video
David Beckham: From Football Legend to Global Brand
This video highlights the incredible fame and success of David Beckham, the world-renowned footballer, and his influential partnership with his wife, Victoria Beckham. It touches on the challenges they faced in the public eye, including...
Curated Video
Learning from Your Mistakes
We make mistakes all the time. Have you learned as much - maybe more - from the mistakes of your career, as from anything else? The only real mistake is getting things wrong, and not learning anything from your mistakes. Mistakes are...
Curated Video
Discovery Mode: Cheese or Owl?
If you want your team to solve problems more effectively, you need to get them into Discovery Mode. Put another way, is it to be Cheese or Owl? What I like about projects is the constant flow of problems. It isn't that I like the...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Detect Email Tracking
In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Accessing the Dark Web with Tor
This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Stylometry
This video illustrates an application called Stylometry, which can determine if an anonymous document may or may not have been written by us.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Exception Handling
In this video, you will learn about exception handling with try, throw, and catch functions. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Classes and Objects
In this video, you will learn about classes and objects with abstraction and encapsulation. This clip is from the chapter "Module 2" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, we will cover...
Curated Video
Practical Cyber Hacking Skills for Beginners - Launching a Combinator Attack
Here, we will look at how the combinator attack is performed with the two text files required to complete the attack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Setting Up Hashcat
This lesson will teach us how to install and set up the Hashcat by changing the folder structures and deleting older hashtag versions.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Zenmap
This video demonstrates using Zenmap, the graphical user interface for NMAP, to scan different networks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Scanning Techniques
This video elaborates on NMAP's different techniques for scanning networks using the available network probes.
Curated Video
Practical Cyber Hacking Skills for Beginners - NMAP Port States
This video will teach us about the six port states: open, closed, filtered, unfiltered, closed/filtered, and open/filtered.
Curated Video
Practical Cyber Hacking Skills for Beginners - Basics of NMAP
After installing and configuring NMAP, we will look at how this NMAP scanning program works.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-6
This video briefly outlines the concepts you will learn in this section regarding NMAP, its installation, and its use.
Curated Video
Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Curated Video
Practical Cyber Hacking Skills for Beginners - Creating a LinkedIn Clone Site
This video demonstrates how to clone the LinkedIn site.
Curated Video
Practical Cyber Hacking Skills for Beginners - BlackEye Update
In this video, you will learn about a tool for phishing called the blackeye.