Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
117 results
With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However ...
4,609 views
2 years ago
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,402 views
3 years ago
Honoring the term, the variety of technologies in the Big Data stack is hugely BIG. Many complex components in charge of ...
4,084 views
This talk will cover the unique threats and challenges of working in information security for a news organization. Some best ...
4,531 views
Virtual Reality by Prof Steven LaValle, Visiting Professor, IITM, UIUC. For more details on NPTEL visit http://nptel.ac.in.
2,607 views
8 years ago
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,770 views
You've seen plenty of talks on exploiting, escalating, and exfiltrating the magical world of Google Cloud (GCP), but what about its ...
6,970 views
With attacks moving below the operating system and computer firmware vulnerability discovery on the rise, the need to keep ...
2,349 views
Phantom attack is a collection of attacks that evade Linux system call monitoring. A user mode program does not need any special ...
2,862 views
Modern programming languages are, more and more, being designed not just around performance, ease-of-use, and ...
2,163 views
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
1,729 views
9 months ago
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,051 views
This SCP Foundation wiki reading covers the various groups of interests in the SCP universe! Learn about the serpents hand, the ...
44,550 views
9 years ago
Think of a random number between '0' and infinity. Was your number '0'? Seriously? Crap. Well unfortunately, the hardware ...
7,246 views
What are the threats and vulnerabilities of a retail central bank digital currency (CBDC)? The central bank of Sweden has built a ...
1,618 views
I explain why it is wrong to write free will off as a fantasy. 00:00 - Introduction 01:15 - Determinism 04:50 Quantum indeterminism ...
83 views
1 year ago
Join HowlRound staff and theatremakers from around the world for a virtual celebration of our new book: Essays and ...
188 views
Offensive testing in organizations has shown a tremendous value for simulating controlled attacks. While cyber extortion may be ...
1,424 views
Virtualization and containers are the foundations of cloud services. Containers should be isolated from the real host's settings to ...
834 views
4,000 views