Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,667 results
Hey! Check out MALIBAL Linux laptops at this link to help support the channel:➡ https://www.malibal.com/niccolove Help me ...
32,105 views
1 year ago
00:00:00 - Introduction To Linux Sucks 00:07:17 - Who Is This Lunduke Anyway 00:14:33 - And It Just Gets Worse 00:25:25 ...
28,478 views
4 months ago
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,782 views
2 years ago
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,843 views
9 months ago
Additionally Alan Cox weights in on how *not* to do changes, using GNOME 3 as an example. This is an excerpt from ELCE 2011 ...
174,750 views
Help me contribute to KDE and do these videos: Paypal: https://paypal.me/niccolove Patreon: ...
40,478 views
10 months ago
Speculative Store Buffer Bypass is a security vulnerability that allows unauthorized users to steal sensitive information through ...
60,052 views
6 years ago
Watch this video to find out how to add a new drive and expand an existing RAID array without losing data. In this video, I'm going ...
9,567 views
For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...
104,187 views
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,136 views
Everything You Know About the GIL is Wrong by Jerry D'Antonio When a Rubyist hears "concurrency" they usually Google Elixir, ...
2,864 views
8 years ago
This is how to install Man in the Middle Framework and avoid common errors. Link to scripts/commands: ...
5,814 views
There are built-in capabilities in Red Hat Enterprise Linux that can use deep threat intelligence to help you review and prioritize ...
1,158 views
The requirements for Windows 11 include UEFI, Secure Boot, and a Trusted Platform Module (TPM). This is how Microsoft will ...
2,158,142 views
3 years ago
In this video I share with you my 10 things to do first after installing Arch Linux. Also check out the previous Arch Linux Videos: ...
271,564 views
7 years ago
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,067,601 views
There are a lot of presentations and suggestions that indicate HSMs, TrustZone, AMT, TrEE, SecureBoot, Attestation, TPMs, ...
1,417 views
Feeling overwhelmed by the vast world of Linux distributions? Fear not! This video explores the Top 5 beginner-friendly distros, ...
2,061 views
5 days ago
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated ...
9,907 views
The web, and big tech at large, is tracking our every move, habit, and facial expression. As developers who are also users, we ...
948 views
4 years ago