Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
5,524 results
I've learned the hard way how to make threads in FreeCAD, from various projects I've designed and 3D printed. Some techniques ...
11,330 views
3 years ago
Better graphics performance leads to richer, smoother and more responsive user experiences. Several new APIs ...
12,409 views
7 years ago
Ever wake up and ask yourself: “Damn, how could I make email security suck even more today”? Tired of your Red Teams ...
125,602 views
9 months ago
Exploring in depth the android permission mechanism, through different protection levels. Step by step exploitations techniques ...
6,614 views
1 year ago
System Integrity Protection (SIP) is a macOS technology that limits the capabilities of the root user, most notably - it maintains the ...
1,371 views
Introduced in 2012, Secure Boot - the OG trust in boot - has become a foundational rock in modern computing and is used by ...
1,687 views
In 2021 the FORCEDENTRY sandbox escape introduced the usage of NSPredicate in an iOS exploit. This new technique allowed ...
5,601 views
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,132 views
A recent vulnerability, CVE-2021-30657, neatly bypassed a myriad of foundational macOS security features such as File ...
2,145 views
2 years ago
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,402 views
Insecurity - A Failure of Imagination MARC WEBER TOBIAS INVESTIGATIVE ATTORNEY AND SECURITY SPECIALIST, ...
4,915 views
10 years ago
Von Hand Dokumente sortieren am iPhone nervt. Ich zeige Euch, wie ich mir einen Dateiablage-Helfer gebaut habe – und was ...
9,136 views
The Chrome DevTools codebase is around 150000 lines of first-party JavaScript, with some parts being over ten-years old.
15,033 views
The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...
967 views
A deep dive into the Windows boot process, its security mechanisms, and the security issues that have been found within the last ...
2,130 views
On the Windows platform, macro-based Office attacks are well understood (and frankly are rather old news). However on macOS ...
11,853 views
Activate subtitles for comments. More videos will follow soon. For the soundtrack, look into my channel. You can get the game on ...
111 views
The concept of Trusted Execution Environments has been broadly introduced to microcontrollers with ARM's TrustZone-M. While ...
4,653 views
Active Directory has always been a popular target for attackers, with a constant rise in attack tools attempting to compromise and ...
2,011 views
4 years ago
Apple's AirTags enable tracking of personal belongings. They are the most recent and cheapest device interacting with the Apple ...
28,788 views