Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Types of Attackers and Cybersecurity Professionals
In the field of information security, there are three well-known categories of hackers: black hats, white hats, and grey hats. In an effort to set themselves apart from one another and distinguish the good hackers from the evil, hackers...
Curated Video
Wi-Fi Security
You will learn how to protect your home WiFi and be vigilant when you are using public Wifi
Curated Video
Scala & Spark-Master Big Data with Scala and Spark - Quiz (Anonymous Functions)
It's time for a short quiz on anonymous functions. This clip is from the chapter "Functions" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section primarily focuses on functions and its types.
Curated Video
IIS Authentication Methods
The difference between Basic Authentication and Windows Integrated Authentication in IIS.
Coto Japanese Academy
placeでobjectをaction verb -doing something at or in in Japanese
Doing something at a place or in a place in Japanese.Place de Object o Action verb How to talk
Blockchain Central
Is Bitcoin an Anonymous Currency? | Blockchain Central
On today's episode of Blockchain Central we will shed some more light on the aspect of anonymity in the Bitcoin system. Can your transactions be tracked and what are the consequences? Let's find out!
Packt
Function Declarations & Expressions
JavaScript Language Fundamentals: Function Declarations & Expressions This clip is from the chapter "JavaScript Language Fundamentals" of the series "Modern JavaScript from the Beginning".In this section, you will learn the important...
Neuro Transmissions
How the internet turns us into trolls
We may have all engaged in some sort of unpleasant behavior thanks to the internet. But what makes someone want to troll the families of dead children or celebrities or vulnerable people? What is the psychology of trolls? How does...
Mediacorp
Understanding Online Vigilantism and Its Impact on Social Media
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback, an anonymous group accused of harassment, and Roads.sg, a website that exposes bad behavior on the roads. The video...
Mediacorp
Navigating the Dangers of Online Vigilantism: A Case Study
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback and Roads dot SG. It explores the potential dangers and consequences of individuals taking matters into their own hands...
Mazz Media
My Blog: Internet Bullies? (Just a Click Away)
For many kids, the Internet is an important part of their daily routine. Unfortunately, with the immediacy of the Internet, its anonymity and it’s easy accessibility, kids are using Instant Messaging, Blogs, e-mail, chat rooms and social...
Blockchain Central
Make Your Bitcoin Transactions Fully Anonymous
This week on Blockchain Central: we will talk about Bitcoin tumbler or mixer. What are mixers? What is their purpose? Are they legal? Let's find out!
Brainwaves Video Anthology
Lewis Gordon & Jason Stanley - When Philosophers Talk - Part 4
Lewis Gordon graduated in 1984 from Lehman College, CUNY, through the Lehman Scholars Program, with a Bachelor of Arts degree, magna cum laude and as a member of Phi Beta Kappa. He completed his Master of Arts and Master of Philosophy...
TLDR News
Police Raid over Hancock's Affair: Who Leaked the Photos? - TLDR News
Yesterday the Information Commissioners Office conducted two raids to try and find out who leaked the photos of Hancock's affair. These investigations aren't just about uncovering the scandal either, they're trying to uncover a potential...
Curated Video
Cypress - Modern Automation Testing from Scratch + Framework - Implementing Step Definition Files for Features Built with Real Cypress Code
This video introduces you to Implementing step definition files for features built with real cypress code. This clip is from the chapter "Cypress BDD Cucumber Framework Integration to Mocha" of the series "Cypress - Modern Automation...
CuriosaMente
¿Los hackers son delincuentes?
¿Quienes fueron los primeros hackers? ¿Cuáles son los hackers más famosos y más controvertidos? ¿Son malvados? Un hacker es una persona con habilidades avanzadas en computación que puede ingresar a sistemas informáticos sin autorización,...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Authorization Options
In this video, we will cover authorization options. This clip is from the chapter "Azure Storage" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure storage and Azure storage accounts and how to...
Curated Video
The Modern JavaScript Bootcamp (2019) - Multiple Arguments and Argument Defaults
In this video, we’re going to take a deeper dive into function arguments. You’ll learn how to set up multiple arguments and come up with default argument values if none is provided. This clip is from the chapter "JavaScript Functions" of...
Packt
CompTIA Network+ Certification N10-007: The Total Course - File Transfer Protocol (FTP)
This video explains the concept of FTP. This clip is from the chapter "Transmission Control Protocol/Internet Protocol TCP/IP Applications" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you...
Curated Video
The Complete React Developer Course (with Hooks and Redux) - Conditional Rendering in JSX
In this video you'll learn how to conditionally render content in JSX. This will allow you to hide and show content based on the application state. This clip is from the chapter "Hello React" of the series "The Complete React Developer...
Curated Video
Docker Certified Associate Certification Training Course - File System Mount
This video explains file system mount. This clip is from the chapter "Docker Container Storage and Volumes" of the series "Docker Certified Associate (DCA) Certification Training Course".This section explains Docker container storage and...
Curated Video
Minimal API Development with ASP.NET Core - Review and Update GitHub - Securing a Minimal API
This video summarizes the section and updates GitHub. This clip is from the chapter "Securing a Minimal API" of the series "Minimal API Development with ASP.NET Core".This section focuses on securing a Minimal API.
Curated Video
Minimal API Development with ASP.NET Core - Protecting Endpoints - Part 2
In this video, we will look at how to protect the API endpoints. This clip is from the chapter "Securing a Minimal API" of the series "Minimal API Development with ASP.NET Core".This section focuses on securing a Minimal API.