Hi, what do you want to do?
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
60 Second Histories
Maya religion - sacrifice
This short video looks at why the Ancient Maya believed in sacrifice and how they carried it out - not too gruesome but not for the feint-hearted either.
Kult America
Abandoned - Atlantic City
Over the past years Atlantic City, New Jersey, has been slowly turning into a ghost city. Once one of the most popular gambling destinations, now it’s dotted with enormous abandoned hotels with little to see and little to eat. What was...
Weird History
What Was It Like To Be A Body Collector During The Black Plague?
Buboes, black spots, and bloody froth: it was all in a day’s work for Black Death body collectors. The plague, which may have killed as many as 200 million people worldwide, changed everything—including body disposal.
Science360
Autonomous Helicopters
Claire Tomlin, formerly of Stanford and currently with Berkeley, is pushing the envelope of aerospace design, building a new class of autonomous helicopters, with support from the National Science Foundation. These aircraft don't need a...
The Wall Street Journal
Working Together
Businesses need to cooperate with government and with one another to defend against cybersecurity threats. But it isn't always clear how to make those relationships work. Leaders in this effort explore how to get it done.
Mazz Media
My Blog: Why Are There Bullies? (What are They Thinking?)
This program explores the reasons why kids become bullies. Through live-action, age-appropriate scenarios, viewers will come to understand why some kids are so aggressive, hurtful and mean to their classmates, teammates, friends and...
Curated Video
Surviving Trauma and Finding Inner Power: The Story of Sam
Sam's Triumph part 1/4: The video is a transcript of an interview with a survivor of the Holocaust, who shares his experiences of living through the trauma of the war and losing his family members to the violence of the German occupying...
Step Back History
Elizabeth Bathory and the Literal Blood Bath
The Countess Elizabeth Bathory is one of the most infamous women in history. She's known for legendarily drinking and bathing in the blood of young girls. But, how accurate is that?
AllTime 10s
10 Mysteries Solved By The Internet
Sometime it takes more than good old fashioned detective work to solve the supposedly unsolvable.
Curated Video
Surviving Childhood Trauma: A Personal Story
Maria's Triumph part 1/4: The video contains a personal testimony by an individual who grew up in the Dominican Republic and experienced trauma such as alcoholism in their family, abuse and rape at a young age. They share their childhood...
Curated Video
Bug Bounty Program Certification 5.3: Perform Denial of Service Attack on Server
This video will help you understand DOS attack process • Use LOIC tool to perform DOS attack • Attack on other systems in network • Monitor DOS attack using Wireshark
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Hacking Terminology
This video teaches you the terminology used in hacking.
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Networking Tools and Essential Terminology" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
The Wall Street Journal
The Threat Landscape
The FBI discusses how businesses are being targeted, how the picture varies at a national/international level and what resources or help the respective agencies can offer.
60 Second Histories
Mary Seacole; successfully treats cholera
Part 2 of this series, Mary describes her first experience of treating cholera victims in Panama.
Institute for New Economic Thinking
The Origins of American Racial Disparities
Why does the racial divide persist between comparatively similar segments of the workforce? If additional education is not the solution to racial inequality, what is? Why did the Civil War lead to a troubling trend in the North? In this...
Science ABC
How Long It Takes For Chloroform To Make A Person Unconscious?
In 1865, The Lancet, the medical journal, called upon any person, criminal or not, to prove that waving a chloroform-drenched handkerchief was enough to knock someone out. To date, nobody has stepped forward!
While the right...
While the right...
Healthcare Triage
Samoa's Devastating Measles Outbreak: An Antivax Story
Measles is one of the world’s most contagious diseases but is preventable with high vaccination rates. Unfortunately, this isn't happening everywhere, including in Samoa.
Curated Video
Crocodilian Interaction with Ancient and Modern Humans
This video explores the fascinating history and mythology surrounding crocodilians, shedding light on their cultural significance and the misconceptions that have surrounded them. It also delves into the threats they face today,...
Psychology Unlocked
What's the difference between INTERNAL and EXTERNAL VALIDITY?
Validity is a key concept in research methods. It can be broken down into two umbrella categories: internal validity and external validity. 1) Internal validity considers factors within the design of the experiment. 2) External validity...
The Wall Street Journal
What Are The New Risks In Ransomware?
WSJ's Marilia Wyatt and David Breg discuss the latest incidents of ransomware attacks, the new compliance risks for businesses, and how attackers may respond.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Stored XSS
In this video, you'll learn how to use stored XSS (persistent XSS) for your web applications.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp:...
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp:...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Session Fixation
This video shows you what session fixation is with an example.
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
r/>
This clip is from the chapter "Web Application Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section,...
Brainwaves Video Anthology
Kanchan Bhaskar - Leaving: How I Set Myself Free from an Abusive Marriage
Kanchan Bhaskar was born and brought up in New Delhi, India. She holds a master’s degree in social work from Delhi University and a postgraduate certificate in personnel management and industrial relations. She moved to the US in 2000...