Hi, what do you want to do?
Curated Video
Wi-Fi Security: The Risks of Hacking and Freeloading
In this video, the speaker highlights the ease with which people can tap into someone's wireless computer network without paying for it, emphasizing the lack of security measures taken by many Wi-Fi users. They explain the risks...
Curated Video
Struggle to Sustain the Halibut Population in the Bering Sea
St. Paul Island, a small fishing community in the Bering Sea, relies heavily on halibut stocks, is struggling as fish trawlers damage the halibut supply. As these industrial boats trawl for various types of fish, they often unintentially...
Curated Video
Landmarks - House of The Future
HOUSE OF THE FUTURE THIS IS THE HOUSE OF THE FUTURE OR AT LEAST ONE VERSION OF IT - ON DISPLAY AT THE BELGIUM LIVING TOMORROW CONVENTION. 80 PERCENT OF THE TECHNOLOGY IN THIS HOUSE IS ALREADY ON THE MARKET, THE REST IS NOT FAR AWAY....
Curated Video
High-Tech Security: Aerial Surveillance with the Helium-Filled Airship
This video showcases a 60-meter helium-filled airship called Foibos, which was used during the 2004 Olympics in Athens for high-tech security purposes. Equipped with dome-shaped sensors, chemical sniffers, ultra-high-resolution cameras,...
Curated Video
GMES: Advancing Global Monitoring for Environment and Security
The Group on Earth Observation is overseeing a 10-year plan to coordinate data gathered on the environment from satellites and terrestrial sources. Europe's Global Monitoring for Environment and Security system (GMES) is at the forefront...
Curated Video
How to Define Team Ground Rules
Ground rules… What are they, does your project team need them, and how to set and maintain them if it does? That’s what we’ll look at in this video.
What are Gr
ound Rules
Ground...
What are Gr
ound Rules
Ground...
Curated Video
What is the Blockchain?
Blockchain is a technology for recording transactions. And, since its first use in 2008 for cryptocurrency, it is emerging as one of the must-have technologies in many industry sectors. Project managers will often be called upon to...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Types of VPNs
In this video, the author discusses the various kinds of VPNs used and the benefits and disadvantages of the VPNs
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to NAT
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Curated Video
Practical Cyber Hacking Skills for Beginners - Section Preview-5
This video briefly outlines the section concepts, including a typical home network setup, DHCP and DNS, commands used in them, TCP versus UDP, and firewalls and hardening networks to prevent attacks.
Curated Video
Practical Cyber Hacking Skills for Beginners - Key Principles of Cybersecurity
Let's look at the technological practices and critical principles of cybersecurity.
Curated Video
Practical Cyber Hacking Skills for Beginners - Incident Response Plan
We will look at the policies and procedures used to identify, contain, and eliminate cyber-attacks.
Curated Video
What If Our Clothes Could Disrupt Surveillance Cameras?
What do you get when you combine mass surveillance with A.I.? It’s a dystopia that’s already a reality in places across the world. Fashion designers are pushing back, crafting clothing and accessories that trick facial recognition...
Science ABC
How Are Computer Games ‘Cracked’?
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Curated Video
The Prime Number Code
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Curated Video
How Algorithms Change the World
What are algorithms, and how do they dictate human behaviour? Helpful and often life-saving functions, algorithms are shaping our lives more and more as they become increasingly complex. Maths - Algebra A Twig Math Film. Reinforce and...
Weird History
How the Altamont Free Concert Ended the Summer of Love
Lambasted by Rolling Stone magazine as "rock and roll's all-time worst day — a day when everything went perfectly wrong," the 1969 music festival at Altamont Speedway in Northern California was a concert unlike any other. Immortalized in...