Teaching Without Frills
How to Write a Research Paper for Kids - Episode 3: Researching
In this video, you will learn how to start researching a topic after you make a plan for your animal research paper. We will check to make sure the facts we already knew are really true. Then we'll learn even more information in books,...
Hip Hughes History
Linkage Institutions Explained
Perfect for APGOV students, Political Science kids, High Schoolers and especially cray cray on the internet. In this lecture we look at what linkage institutions do and the four examples of them for test day!
Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Vlogbrothers
Vital Status Report from NYC
In which Hank mostly goofs off with friends in New York. But, of course, there's a good bit of Paper Towns talk as well.
Vlogbrothers
Should You Abandon Social Media?
Did I make a video called "is twitter redeemable" last month? Yes I did. Do I think about Twitter a lot? Yes. Too much? Probably. Ultimately, the moments when I feel like I can't control myself on social media are the ones when I most...
Vlogbrothers
On Loneliness
In which John discusses loneliness, isolation, and the kinds of communities that work.
Vlogbrothers
Are You Stuck in The Sad Gap
I haven't run across a video that was so hard to fit into four minutes in a long time. There is a lot I want to say about this, and also a lot that I'm not 100% clear on. I don't know to what extent this is an artifact of the structure...
Vlogbrothers
I Quit Social Media. Here's How It's Going
In which John describes what he has (and hasn't) learned in his first month away from his twitter, reddit, instagram, and facebook.
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Vlogbrothers
You Cannot Trust Yourself (Hank's End of the Year Worries)
This video had a whole section in it where I complained about how annoyed I get when I see other people who don't consider their impact get really surprised when people get mad at them and how nice it must be to just be blissfully...
Vlogbrothers
Your Attention
In which John discusses what's wrong with the Internet, whether it's new, and the power (and value) of our attention.
Vlogbrothers
We're Thinking About Facebook Wrong
Usually I'm up in the description being like, "here are a bunch of things I wasn't really able to fit in the video" but actually...turns out, if you let me go for 20 minutes, I get most of it out. OK, I guess the one insight I had...
Vlogbrothers
We Have Destroyed Copyright Law
The internet destroyed copyright law and we have not re-built. Instead of laws and courts we now have claims and disputes. YouTube in particular has placed itself in the middle of extra-legal arbitrations over what is and is not fair...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Browsing the Internet Safely
The video highlights the tips on how to browse the internet safely and what are the risky habits to avoid over the internet
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Hack Using Google ONLY
You will learn how to easily perform hacking using search engines and publicly available information. Find passwords, confidential files, and gain access to systems with minimum efforts.
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Acquire Malicious Apps1
This video will describe the methods of acquiring malicious Android applications over the internet. There are few publicly available sites in addition to Github links that will be shared.
Curated Video
Hack Using a Rogue Access Point
In this tutorial, you will learn how to create a fake wireless access point and use it to hack the users logged on to it. We will use WiFi Pineapple device.
Curated Video
Google Dorks Live Examples
Spot the vulnerabilities in the wild, leverage Google to hack into web applications and systems that are published over the Internet. You will be surprised by how easy it is.
Curated Video
LAB 2: Google Hacking
I will show you the basics of Google hacking without any prior technical knowledge