Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs
This video talks about how to find sensitive data in URLs using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Publicly Exposed Backup Files
This video talks about how to find publicly exposed backup files using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding SQL Syntax Errors
This video talks about how to find SQL syntax errors using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Directory Listings
This video talks about how to find directory listings using Google Hacking. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This...
Curated Video
Web Hacker's Toolbox - Tools Used by Successful Hackers - Introduction-Web Application Security Testing with Google Hacking
This video provides an introduction to the section. This clip is from the chapter "Web Application Security Testing with Google Hacking" of the series "Web Hacker's Toolbox - Tools Used by Successful Hackers".This section focuses on web...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Auth | WelcomeView
The WelcomeView is the first thing your users will see when they sign up for your Twitter Clone app, so it's important to make it welcoming, informative, and easy to use; in this video, we will show you how to design and implement a...
Curated Video
SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Downloading Node.js
This video helps you with downloading and installing Node.js and NPM.
Curated Video
The Art of Doing - Web Development for Beginners - Search Engine Project Part 3
In this video, we will give style to our search engine name "Eramoogle", just like Google. You will learn how to add custom styles to text elements and align them according to the desired layout. This clip is from the chapter "CSS Layout...
Curated Video
The Art of Doing - Web Development for Beginners - Search Engine Preview
In this video, we will take a quick preview of our project. You will learn how to create your own search engine layout, mimicking Google. This includes creating a thematic header, a search section, a news section with thumbnails for news...
Curated Video
ChatGPT for Creatives - How to Save Your Work Right Away
In this video, the author talks about the importance of saving work while creating comics or manga. He also shares his personal experience of losing work and the lessons he learned from it. Finally, he offers practical tips on how to...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Browser Security
With the variety of browsers available to download, it's important to know where the trusted sources are. There are also many other important features to browsers such as extensions and plugins, settings, ad blockers, password managers,...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Internet of Things (IoT)
Author explores some of the latest and greatest networking technologies with the Internet of Things (IoT). He describes the three common wireless technologies used to connect to IoT devices, 802.11, Zigbee, and Z-wave. The author...
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Virtual Private Networks (VPNs)
In this video, Author shows how Virtual Private Networks (VPNs) work and why people use VPN connections. He discusses the types of protocols and clients that make this work today and walks through a generic VPN setup. This clip is from...
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Firebase Configuration / 164
In this lesson, we will focus on the configuration part of the Firebase app. We will also work on receiving the information from the Firestore.
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Firebase Setup / 163
The Firebase Realtime Database is a cloud-hosted NoSQL database that lets you store and sync data between your users in real time. We will look at the setup and authentication.
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Authentication - I / 263
Firebase Authentication provides backend services, easy-to-use SDKs, and ready-made UI libraries to authenticate users to your app.
Curated Video
React JS Masterclass - Go From Zero To Job Ready - Firebase Introduction
The Firebase Realtime Database lets you build rich, collaborative applications by allowing secure access to the database directly from client-side code.
Curated Video
Deep Learning - Artificial Neural Networks with Tensorflow - Why Keras?
In this video, we will understand why we use Keras in this course and not TensorFlow 2. This clip is from the chapter "Machine Learning and Neurons" of the series "Deep Learning - Artificial Neural Networks with TensorFlow".In this...
Curated Video
Deep Learning - Computer Vision for Beginners Using PyTorch - Why Learn Any Programming Language
In this video, we will first understand why we should learn any programming language. This clip is from the chapter "Optional Learning - Python Basics" of the series "Deep Learning - Computer Vision for Beginners Using PyTorch".In this...
Curated Video
Deep Learning - Computer Vision for Beginners Using PyTorch - Installing PyTorch
In this video, you will learn how to install PyTorch using Google Colab ipynb. This clip is from the chapter "Diving into PyTorch" of the series "Deep Learning - Computer Vision for Beginners Using PyTorch".In this section, we will dive...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Device Security
Mobile device security starts with a lock screen but goes beyond multifactor authentication (MFA) and remote find, lock, and wipe. Corporate environments use mobile device management (MDM) services for even more control over mobile...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Devices and E-Mail
Corporate or ISP e-mail setup requires various configuration options, such as POP or IMAP for incoming mail and SMTP for outgoing mail. S/MIME was a way to encrypt e-mail attachments. Standard Google or Apple accounts are set up with a...