Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
30 results
0:00 Introduction 0:19 The badly coded form submission plugin 2:26 SQL Injection XSS Cross Site Scripting CSRF Cross-site ...
79 views
1 month ago
Welcome to the second part of our exclusive Q&A session, celebrating the launch of our new book on persistence. In this video ...
100 views
7 months ago
Sven und Holger nehmen euch mit auf Verbrecherjagd! Mit dem SQL Murder Mystery lernt ihr nicht nur spielerisch den Nutzen ...
201 views
10 months ago
... often exploit well-known vulnerabilities such as SQL injection and cross-site scripting. WAF on Application Gateway is based on ...
196 views
3 months ago
The year is 2023 and we're still finding very basic vulnerabilities in enterprise software. In this presentation, we detail how the ...
7,570 views
9 months ago
Do you want to know how to perform DAST scans using a containerized version of OWASP ZAP? ❓ If so, you should watch this ...
274 views
3 weeks ago
JJ tags: defeat serial number protection in software pwning a license registration server SQL injection PoC remote php file upload ...
4 views
Streamed 7 months ago
Cellular networks form large complex compounds for roaming purposes. Thus, geographically-spread testbeds for masurements ...
22,056 views
SQL injection. We know how to avoid SQL injection in our ME in my secret code. Nobody has come up with a convincing fix for ...
4,100 views
Welcome back to another intermediate-advanced SQL tutorial! Let us talk about Stored Procedures in SQL, more specifically, ...
71 views
Machine Learning in SQL is not only possible but is not too difficult if we think about what we know, i.e., where we are and where ...
42 views
Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.
1,707 views
Austin Theriault (he/they) https://emacsconf.org/2023/talks/lspocaml 00:00 Introduction 00:16 What is Semgrep? 00:40 How do we ...
258 views
6 months ago
Developers are threat actors' targets of choice because of their access to business-critical services. After compromising a single ...
2,578 views
CQRS stands for Command, Query responsibility segregation. Let's have a quick overview of what the hell it is. And by the way.
177 views
4 months ago
Ever got frustrated typing the as prop in React components? How about this in combination with forwardRef? To put it short: It's not ...
185 views
ChatGPT and other large-language models can help you create business applications that make users more efficient. Get ideas ...
488 views
Let's "get off the island" and look at Drupal security from the point of view of an outsider. The OWASP Top Ten is an industry ...
51 views
Présentation des nouveautés de Dolibarr v19 (In French - En Français) Par Laurent Destailleur, "mergeur" du projet Dolibarr ERP ...
7,444 views
Originally presented at the 2023 Adobe ColdFusion Summit, recorded during a live rebroadcast on Oct 20th. In today's high end, ...
182 views