Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
166 results
With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However ...
4,617 views
2 years ago
We're constantly under attack, you could say. Our minds are being fished. We're like fish, that the bait's coming out at us, the ...
264 views
See how beams bend (learn about the "kinematics" of beam bending). You might also like our Beam Bending Playlist at ...
70,991 views
9 years ago
Virtual Reality by Prof Steven LaValle, Visiting Professor, IITM, UIUC. For more details on NPTEL visit http://nptel.ac.in.
1,469 views
8 years ago
Think of a random number between '0' and infinity. Was your number '0'? Seriously? Crap. Well unfortunately, the hardware ...
7,247 views
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,781 views
This talk will cover the unique threats and challenges of working in information security for a news organization. Some best ...
4,531 views
2,611 views
We'll teach you: * How to open your photo in our powerful VR editor * Where to add 3D models to your scene * How to illuminate ...
4,869 views
7 years ago
... bubble,warp bubble explained,real warp bubble,new warp bubble creation,insane comeback,reality warp bubble,warp bubble ...
9,694 views
1 year ago
Virtualization and containers are the foundations of cloud services. Containers should be isolated from the real host's settings to ...
838 views
Like this material? Please Subscribe, Comment, and Share! Ra Uru Hu was the Human Design System's founder and messenger.
1,056 views
Modern programming languages are, more and more, being designed not just around performance, ease-of-use, and ...
2,164 views
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,051 views
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,407 views
3 years ago
Decades ago, breaking the sound barrier was a huge deal in transportation science... but many didn't think it could be done.
149,134 views
What are the threats and vulnerabilities of a retail central bank digital currency (CBDC)? The central bank of Sweden has built a ...
1,618 views
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
1,747 views
9 months ago
4,002 views
Phantom attack is a collection of attacks that evade Linux system call monitoring. A user mode program does not need any special ...
2,871 views