Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
93 results
Twenty years ago, a 15-years old Norwegian kid was put on trial for breaking the DVD Copy Prevention system. His case ...
224 views
3 years ago
(44 mins) In 2000, a whole lot of movie companies sued a whole lot of people over the coding of a routine called DeCSS, which ...
909 views
9 years ago
2 views
2 years ago
Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James ...
265 views
5 years ago
Wir präsentieren zum dritten Mal einen bunten Blumenstrauß aus Nerdsniping-Themen – einige unserer Lieblingsfakten über ...
28,697 views
4 years ago
Eine Einführung in Brainfuck, INTERCAL, Befunge, Malbolge und Shakespeare Es gibt eine Gruppe von Programmiersprachen, ...
13,323 views
7 years ago
Following the failure and easy exploitation of the AACSv1 DRM on HD-DVD and Blu-ray, AACS-LA went back to the drawing ...
13,097 views
4 months ago
At the Internet Archive, a non-profit library and archive founded in the go-go 1990s, an effort has been underway to save as much ...
11,947 views
8 years ago
5,791 views
il 14 marzo 2001 Phil Carmody codifica un numero primo la cui diffusione è illegale. Perché? È una storia che parte dagli hacker ...
1,469 views
1 year ago
ECSE-4540 Intro to Digital Image Processing Rich Radke, Rensselaer Polytechnic Institute Lecture 21: Digital watermarking ...
19,784 views
VTLUUG Talk on 12/03/2015 in MCB 328 at Virginia Tech.
298 views
A college lecture at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by ...
216 views
(116 mins) Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking ...
39,782 views
Vintage Computer Festival East 9.1 April 4-6, 2014 Hosted at InfoAge Science History Center, 2201 Marconi Road, Wall Township ...
1,504 views
( 30 mins) SecureDrop is an open-source whistleblower submission system that media organizations can use to securely accept ...
306 views
Based on this book Hands-On Ethical Hacking and Network Defense, Third Edition by Michael T. Simpson, Kent Backman, and ...
152 views
6 years ago
Have this black box process that you're just dying to peek inside of? Is this process perhaps running on your cell phone, or on a ...
8,165 views
(86 mins) We had to keep this bombshell quiet til the last minute since some of the most powerful people in the world would prefer ...
1,797 views
The Digital Millennium Copyright Act (DMCA), codified in part in 17 U.S.C. §1201, makes it illegal to circumvent technological ...
698 views