Curated Video
The Evolution of Computer Interaction: Meet Jeremiah, the Expressive Computer Character
Jeremiah is a computer-based character with a face that can interact with people through simple expressions. Created for an art exhibition, Jeremiah's visual system tracks moving objects and changes its expression accordingly. This...
Curated Video
Transforming Education: The Hole in the Wall Project Empowering Indian Children
The Hole in the Wall Project is a unique IT experiment that has brought computer literacy to over 40,000 Indian children in just five years. By setting up computers in public places, children in urban and remote areas have been able to...
Curated Video
Java Multithreading and Parallel Programming Masterclass - What Is a Process?
This video talks about process in detail.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Windows 10 with Bitlocker
Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Back Up Your Computer
In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ransomware - Cryptolocker, WannaCry, Bad Rabbit
In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Securing the Windows 10 Boot Process
In this video, we will look at how a rootkit can infect a system with the boot process and how this can be eliminated.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN + Tor
In this video, the author addresses the question of using VPN and Tor to provide more anonymity.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacking Tor - The End-to-End Correlation Hack
This video will discuss a significant attack on Tor, the end-to-end correlation attack.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Internet Protocol Suite - TCP/IP
In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.
Curated Video
Practical Cyber Hacking Skills for Beginners - Target Reconnaissance
In this video, you will learn how to perform reconnaissance based on a specific target, usually, a location, understand the groundwork and infrastructure involved, and the possibilities of being able to hack.
Curated Video
Practical Cyber Hacking Skills for Beginners - Cookies Revisited
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Curated Video
Practical Cyber Hacking Skills for Beginners - Windows 10 Firewall Demo
This video walks us through the built-in firewall of the Windows 10 operating system. The advantages of using the firewall, and how it protects the operating system.
Curated Video
Practical Cyber Hacking Skills for Beginners - The TCP 3-Way Handshake
This video demonstrates how the TCP protocol operates in a 3-way mode through host-server-host communication.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to NAT
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.
Curated Video
Practical Cyber Hacking Skills for Beginners - Ports and Protocols
This video explores the ports, networks, and protocols used to operate each port.
Curated Video
Practical Cyber Hacking Skills for Beginners - Malware Revisited
This video revisits the concepts of malware, the kinds of malware, and the options available to us to mitigate the problem as much as possible.
Curated Video
Learn Midjourney For Your Future 6 Figure Career - Create Beautiful Patterns
In this video, you will learn about one of the most creative things with a plethora of practical uses, which is the creation of beautiful patterns that can be used in various kinds of artforms such as generating book covers, t-shirt...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
Cell nucleus: structure and function
The nucleus is one of the most important organelles found in eukaryotic cells. In this video, we will cover the definition, structure and functions of the cell nucleus.