Hi, what do you want to do?
Curated Video
Lady Jane Grey part 16: a Protestant Martyr
The young Lady Jane and Lord Guildford are beheaded. Mary attempts to convert Jane to Catholicism before hear death, but Jane refuses. Her deep and outspoken commitment to her protestant faith preserved Jane's legacy as a martyr for...
Curated Video
Judith Slaying Holofernes, Artemisia Gentileschi: Great Art Explained
Women were excluded from almost all cultural and social resources in the centuries from 1400 to 1900 when so much of the world's great art was created. And visual art was almost entirely a male industry before modern times.
Having...
Curated Video
Hieronymus Bosch, The Garden of Earthly Delights (Part Three): Great Art Explained
The painting was just too complex and detailed to deal with in fifteen minutes, so I made it in three parts.
There are no records to tell us what Bosch or his contemporaries were thinking. There are so many theories...
There are no records to tell us what Bosch or his contemporaries were thinking. There are so many theories...
Barcroft Media
I Found My Father’s Killer | CHASING JUSTICE
A WOMAN whose life was torn apart by the killing of her father as a child says she finally feels peace after helping to bring the perpetrator to justice. Joselyn Martinez was just nine on November 22 1986 when her father was shot outside...
Curated Video
The Mysterious Death of Edgar Allen Poe
Famous American author Edgar Allan Poe’s haunting death may have been a result of cooping, a violent form of voter fraud practiced in the 19th century.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - MITM Attacks Explained
This video shows you all the attacks that can be performed using MITM.
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
r/>
This clip is from the chapter "MITM Attacks (Man in the Middle)" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Getting a Meterpreter Session with Command Injection
In this video, you'll learn what a Meterpreter session is and how to use it with command injection.
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp:...
r/>
This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp:...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation
Session Management: Session hijacking using session fixation
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking counter measures
Session Management: Session hijacking counter measures
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Anatomy of a session attack
Session Management: Anatomy of a session attack
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats...
r/>
This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats...
PBS
Top 5 Biggest Financial Scams
Don't be fooled! Here are the top 5 financial scams you can fall victim to.
AllTime 10s
10 Deadliest Animals on Earth
Sure, sharks are dangerous, but these 10 animals are way more scary than them! Here are the 10 Deadliest Animals on Earth! Jason Statham - take note'
PBS
Is My Identity Safe From Hackers?
You can never protect yourself 100% from identity thieves, but there are ways to make it harder for them! Here's how you can help protect yourself from identity theft.
Weird History
Unusual Viking Rituals That Will Surprise You
Vikings would slaughter dozens and perform some pretty severe ritualistic executions. What’s known is that the Viking age is littered with some extreme rituals from the Norse religion but also a few oddball traditions that Vikings...
Curated Video
How kidnapping became a big business
Kidnapping has created a growing insurance industry, which regulates ransom demands and saves lives. But it's a complicated business model in which poorer victims are losing out. Read more hereref='https://econ.st/2S97rrl'...
Mazz Media
My Blog: Dealing with Bullies (And No One Gets Hurt)
Bullying is a reality for students in schools everywhere. You’re either a bully, a victim or a witness. Using true to life scenarios, this program explains exactly what bullying is and how it affects people who are abused by bullies. The...
Curated Video
Snake Hunting and Reproduction
This video provides an overview of snake mating and reproduction, including the use of hemipenis for internal fertilization, different mating behaviors and strategies, egg-laying and live birth, and the varying effects of venomous...
Mr. Beat
There Are No Bullies
But there is plenty of bullying. Mr. Beat proposes we end it by respecting the victim, not giving the bullying behavior an audience, and treating others with kindness, even if they don't deserve it.
PBS
The Origin of Medusa
Medusa has inspired art for centuries, whether as a symbol of protection or a monster. Explore her literary and cultural history in this episode of Monstrum from PBS Digital Studios. #GreatReadPBS
Brainwaves Video Anthology
Johanna Jarcho - Peer Victimization
Johanna M. Jarcho, PhD, University of California, Los Angeles (2008)
is an Assistant Professor, Clinical, Social & Health at Stony Brook Univer
sity.
Dr. Jarcho studies the relationship between brain function and social...
is an Assistant Professor, Clinical, Social & Health at Stony Brook Univer
sity.
Dr. Jarcho studies the relationship between brain function and social...
Independent Producers
Psychology of a Bully
Bullying can happen to anyone in any place. One former bully explains how she bullied, the reasons why she bullied, but she also reflects on her experience as the victim of a bully. A professional psychologist also offers her perspective...
Seven Dimensions
Understanding Workplace Bullying and Harassment
In this video, the concept of workplace bullying is explored, highlighting its definition, examples, and impacts on victims. The discussion also touches on the overlap between bullying and harassment, as well as situations that may be...
Science360
Unmanned Helicopters Could Help Air Traffic Controllers - Science Nation
Remember flying miniature helicopters when you were a kid? Claire Tomlin is building a new class of unmanned small helicopters that help all flying vehicles not collide in the sky. These aircrafts don't need pilots steering them remotely...
Seven Dimensions
Addressing Inappropriate Behavior in the Workplace
This video provides practical advice for addressing and resolving inappropriate behavior in the workplace. It emphasizes the importance of setting ground rules, approaching the situation calmly and privately, offering specific feedback,...