Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,643 results
00:00:00 - Introduction To Linux Sucks 00:07:17 - Who Is This Lunduke Anyway 00:14:33 - And It Just Gets Worse 00:25:25 ...
28,176 views
4 months ago
As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ...
3,823 views
9 months ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,133 views
1 year ago
Additionally Alan Cox weights in on how *not* to do changes, using GNOME 3 as an example. This is an excerpt from ELCE 2011 ...
174,527 views
2 years ago
Hey! Check out MALIBAL Linux laptops at this link to help support the channel:➡ https://www.malibal.com/niccolove Help me ...
32,078 views
Everything You Know About the GIL is Wrong by Jerry D'Antonio When a Rubyist hears "concurrency" they usually Google Elixir, ...
2,863 views
8 years ago
The requirements for Windows 11 include UEFI, Secure Boot, and a Trusted Platform Module (TPM). This is how Microsoft will ...
2,145,943 views
Modern container engines such as systemd.nspawn and rkt provide a means of restricting privilege by limiting Linux capabilities.
417 views
5 years ago
Cockpit makes Linux discoverable. But it's really a Linux session in a web browser, accessing the native system APIs and tools ...
1,034 views
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your ...
78,050 views
4 years ago
on video, Jade version should be 1.3 #archlinux #gtk4 #gnome Crystal official site https://getcryst.al/ 00:00 Intro 00:49 Demo ...
6,449 views
This is how to install Man in the Middle Framework and avoid common errors. Link to scripts/commands: ...
5,772 views
Speculative Store Buffer Bypass is a security vulnerability that allows unauthorized users to steal sensitive information through ...
60,047 views
6 years ago
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated ...
9,904 views
This presentation will dive into research, outcomes, and recommendations regarding information security for the "Internet of ...
48,089 views
9 years ago
In this talk Dmitry will highlight some of the areas for improvement related to release quality, security, and developer experience ...
1,784 views
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,772 views
Watch this video to find out how to add a new drive and expand an existing RAID array without losing data. In this video, I'm going ...
9,457 views
MEGA cloud is one of the best cloud service on Linux. It is a viable alternative to popular Dropbox. MEGA provides robust cloud ...
22,104 views
7 years ago
Use Linux as the bootloader and start the system up fast. In contrast to most firmware, like UEFI based or the BIOS, Linux is free ...
1,462 views