Instructional Video17:55
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Fuzzing for SQL Injection Demo

Higher Ed
This is a demo video on how to do Fuzzing for SQL injection. This clip is from the chapter "Fuzzing with Burp Suite Intruder" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on Fuzzing with...
Instructional Video3:26
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-2

Higher Ed
This video helps you with the summary of the entire section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video2:16
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking Database

Higher Ed
This video explains about the Google Hacking database. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on...
Instructional Video3:56
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding SQL Syntax Errors

Higher Ed
This video talks about how to find SQL syntax errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video2:53
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Directory Listings

Higher Ed
This video talks about how to find directory listings using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video5:07
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Summary-1

Higher Ed
This video helps you with the summary of this section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on...
Instructional Video4:00
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - From SQL Injection to Remote Code Execution Demo

Higher Ed
This is a demo video that demonstrates how to execute the code from SQL injection to remote. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by...
Instructional Video3:39
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Demo

Higher Ed
This is a demo video on how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section...
Instructional Video2:07
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Dumping Database Table Entries Overview

Higher Ed
This video provides an overview of how to dump database table entries. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Instructional Video6:59
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - The Basics of Sqlmap Overview

Higher Ed
This video provides an overview of the basics of Sqlmap. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses...
Instructional Video10:11
Curated Video

Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-How Hackers Find SQL Injections in Minutes with Sqlmap

Higher Ed
This video provides an overview of the section. This clip is from the chapter "How Hackers Find SQL Injections in Minutes with Sqlmap" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on how...
Instructional Video12:55
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Server and User Model

Higher Ed
This video will cover the creation of server and user models for the backend part of our full stack Twitter Clone app.
Instructional Video8:39
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Presenting User Profile Images

Higher Ed
In this video, the presenter shows how to present the user profile images in the app UI by creating a route to serve the static files.
Instructional Video13:21
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Login

Higher Ed
In this video, we will implement the user login functionality using Passport.js authentication.
Instructional Video19:28
Instructional Video6:27
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Delete User

Higher Ed
In this video, you will learn how to implement a secure endpoint for deleting a user, including verifying the user's identity, deleting all of the user's tweets, and using proper error handling.
Instructional Video8:19
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Mongoose and MongoDB

Higher Ed
In this video, we will show you how to use Mongoose, a popular Node.js library, to build and manage a MongoDB database.
Instructional Video10:56
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - GET Request in the App

Higher Ed
In this video, we will walk through how to implement GET requests in a mobile app, and provide examples of how to use this functionality to retrieve and display data from an API.
Instructional Video5:31
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Running the API

Higher Ed
This video demonstrates how to run an API required for frontend of the app development.
Instructional Video12:02
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - UPDATE and DELETE Requests

Higher Ed
UPDATE and DELETE requests are essential tools for managing data in web applications; in this video, we will walk through how to structure and implement these requests in your own projects.
Instructional Video8:20
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - GET Request

Higher Ed
In this video, we will take a closer look at GET requests and how they function, as well as some best practices for implementing them in your web applications.
Instructional Video10:16
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Note Model and POST Request

Higher Ed
In this video, we will explore the Note model and POST request in depth, including how they work and how to use them effectively in your programming projects.
Instructional Video10:03
Instructional Video1:08
Curated Video

ChatGPT and DALL-E: Sell Your Creative Thinking with AI - Limitation 1: The Training Data Is Finite

Higher Ed
In this video, we will discuss the limitation that the training data used to train generative AI models is finite, which can impact the quality of the output. This clip is from the chapter "When (And When Not) to Use AI" of the series...