Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,893 results
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,527 views
2 months ago
In this video I discuss how desktop ubuntu 23.10 got trolled with an insulting Ukrainian language translation and the most severe ...
85,183 views
8 months ago
In this video I discuss how Hackers using Tor get caught by divulging too many details about themselves and how they conduct ...
411,483 views
4 months ago
CHAPTERS: 0:00 - Intro 0:48 - How the backdoor was discovered 2:11 - Security Vulnerability Details 4:56 - Open Source ...
68,820 views
Firefox used to be one of the most popular web browsers. Now, barely anyone uses it. What happened to this once great free and ...
43,721 views
1 month ago
Secure the Linux Kernel with eBPF Linux Security Module - Vandana Salve, Independent Consultant Linux security module (LSM) ...
637 views
00:00:00 - Introduction To Linux Sucks 00:07:17 - Who Is This Lunduke Anyway 00:14:33 - And It Just Gets Worse 00:25:25 ...
28,324 views
Let's see some good security practices that can be applied on a server (best on: GNU/Linux) to proactively protect a web ...
13 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,280 views
6 months ago
In this video I discuss whether or not you should use a VPN before connecting to Tor and why this isn't a good idea in most ...
756,051 views
In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...
493,154 views
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
923 views
Mentor: Greg Kroah-Hartman, Kernel Maintainer & Fellow, The Linux Foundation There is a lot of misunderstanding about how the ...
2,977 views
Today I talk about the most powerful Linux tool in existence. YaST. PULL IT DOWN FOR THE GOOD STUFF Patreon ...
13,178 views
q3k will go over his efforts to get code execution on _all_ Apple iPod Nano devices. We'll start out with a general overview of the ...
957 views
In this video I show you how to install and verify TailsOS safely. 0:00 What is tails? 1:41 Installing Tails from different host OS's ...
398,032 views
9 months ago
Mitigating Hackers with Hardening on Linux – An Overview for Developers, Focus on BoF (Buffer Overflow) - Kaiwan Billimoria, ...
243 views
11 months ago
Time Stamps 00:00 - Which DNS Service is Best for Filtering Malicious Sites 00:30 - Services Tested Quad9, Cloudflare Families, ...
87,590 views
Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo, IBM & Teryl Taylor, IBM Research This talk ...
36 views
If you want to be private and anonymous online, just use a VPN! Now you're safe from all the bad guys online, right? The VPN ...
38,267 views
3 weeks ago