Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,872 results
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,036 views
2 months ago
In this video I discuss how desktop ubuntu 23.10 got trolled with an insulting Ukrainian language translation and the most severe ...
85,164 views
8 months ago
In this video I discuss how Hackers using Tor get caught by divulging too many details about themselves and how they conduct ...
405,721 views
4 months ago
Let's see some good security practices that can be applied on a server (best on: GNU/Linux) to proactively protect a web ...
13 views
Secure the Linux Kernel with eBPF Linux Security Module - Vandana Salve, Independent Consultant Linux security module (LSM) ...
625 views
Mentor: Greg Kroah-Hartman, Kernel Maintainer & Fellow, The Linux Foundation There is a lot of misunderstanding about how the ...
2,975 views
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
920 views
Firefox used to be one of the most popular web browsers. Now, barely anyone uses it. What happened to this once great free and ...
42,373 views
4 weeks ago
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,268 views
6 months ago
Mitigating Hackers with Hardening on Linux – An Overview for Developers, Focus on BoF (Buffer Overflow) - Kaiwan Billimoria, ...
239 views
11 months ago
Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo, IBM & Teryl Taylor, IBM Research This talk ...
36 views
1 month ago
CHAPTERS: 0:00 - Intro 0:48 - How the backdoor was discovered 2:11 - Security Vulnerability Details 4:56 - Open Source ...
68,782 views
In this video I show you how to install and verify TailsOS safely. 0:00 What is tails? 1:41 Installing Tails from different host OS's ...
396,290 views
9 months ago
Time Stamps 00:00 - Which DNS Service is Best for Filtering Malicious Sites 00:30 - Services Tested Quad9, Cloudflare Families, ...
86,547 views
In this video I discuss whether or not you should use a VPN before connecting to Tor and why this isn't a good idea in most ...
750,023 views
Today I talk about my first week on NixOS. I have positive and negative things to say. PULL IT DOWN FOR THE GOOD STUFF ...
60,904 views
If you want to be private and anonymous online, just use a VPN! Now you're safe from all the bad guys online, right? The VPN ...
37,171 views
2 weeks ago
In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...
489,669 views
In this video, we'll discuss how to collect endpoint logs with Elastic Agent and send those logs to Security Onion. For more ...
3,661 views
3 months ago
q3k will go over his efforts to get code execution on _all_ Apple iPod Nano devices. We'll start out with a general overview of the ...
945 views