Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
120 results
With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However ...
4,609 views
2 years ago
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,401 views
3 years ago
This talk will cover the unique threats and challenges of working in information security for a news organization. Some best ...
4,531 views
Think of a random number between '0' and infinity. Was your number '0'? Seriously? Crap. Well unfortunately, the hardware ...
7,246 views
Virtual Reality by Prof Steven LaValle, Visiting Professor, IITM, UIUC. For more details on NPTEL visit http://nptel.ac.in.
2,608 views
8 years ago
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
1,735 views
9 months ago
Honoring the term, the variety of technologies in the Big Data stack is hugely BIG. Many complex components in charge of ...
4,084 views
4,001 views
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,772 views
Phantom attack is a collection of attacks that evade Linux system call monitoring. A user mode program does not need any special ...
2,862 views
What are the threats and vulnerabilities of a retail central bank digital currency (CBDC)? The central bank of Sweden has built a ...
1,618 views
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,051 views
Modern programming languages are, more and more, being designed not just around performance, ease-of-use, and ...
2,163 views
You've seen talks about container hacking. You've seen talks about mainframe hacking. But how often do you see them together?
19,264 views
With attacks moving below the operating system and computer firmware vulnerability discovery on the rise, the need to keep ...
2,349 views
Google Cloud's security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and ...
7,778 views
This SCP Foundation wiki reading covers the various groups of interests in the SCP universe! Learn about the serpents hand, the ...
44,549 views
9 years ago
Offensive testing in organizations has shown a tremendous value for simulating controlled attacks. While cyber extortion may be ...
1,424 views
The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server ...
16,439 views
Join HowlRound staff and theatremakers from around the world for a virtual celebration of our new book: Essays and ...
188 views
1 year ago