Skip to main content

PART OF
Community Texts
More right-solid
More right-solid
More right-solid
SHOW DETAILS
up-solid down-solid
eye
Title
Date Published
Creator
Hacking and InfoSec stuff
by GoogleTechTalks
movies
eye 757
favorite 2
comment 0
Google Tech Talks February 21, 2007 ABSTRACT The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators,...
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
by RSA Conference
movies
eye 567
favorite 0
comment 0
Konstantinos Karagiannis, Chief Technology Officer, Security Consulting, BT Proponents of blockchain want to apply it to more than Bitcoin. Suggested applications include identity management, verifiable records and digital assets such as stocks. Is it really future-proof? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=0gL6DsR6vGg Uploader: RSA Conference Upload date: 2017-02-15
Topics: Youtube, video, Science & Technology, Cryptography, Identity Management & Governance,...
Hacking and InfoSec stuff
movies
eye 437
favorite 0
comment 0
تور چیه؟ چه جوری کار میکنه؟ https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw...
Topics: Youtube, video, Education, Online Privacy, Surveillance, Encryption, Tor (Software), Persian...
Hacking and InfoSec stuff
by Google Developers
movies
eye 423
favorite 0
comment 0
Google Python Class Day 1 Part 1: Introduction and Strings. By Nick Parlante. Support materials and exercises: https://developers.google.com/edu/python/introduction Source: https://www.youtube.com/watch?v=tKTZoB2Vjuk Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, languages, python, tutorial
Hacking and InfoSec stuff
by Google Students
movies
eye 385
favorite 0
comment 0
The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators, metaclasses, reference-counting and the...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
movies
eye 293
favorite 0
comment 0
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=JWII85UlzKw...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies
eye 278
favorite 0
comment 0
MagSpoof is a device that can spoof/emulate any magnetic stripe or credit card *wirelessly*. Full details at https://samy.pl/magspoof/ By Samy Kamkar - Allows you to store all of your credit cards and magstripes in one device - Works on traditional magstripe readers wirelessly (no NFC/RFID required) - Can disable Chip-and-PIN - Correctly predicts Amex credit card numbers + expirations from previous card number - Supports all three magnetic stripe tracks, and even supports Track 1+2...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, coding, samy kamkar,...
Hacking and InfoSec stuff
movies
eye 233
favorite 0
comment 0
How to Crack Weak Wi-Fi Passwords Full Tutorial: http://bit.ly/ParrotAir Subscribe to Null Byte: https://goo.gl/J6wEnH In this edition of Cyber Weapons Lab, we explore hacking Wi-Fi with bad passwords. We'll show you how using bad passwords can let anyone with a simple wireless network adapter and laptop hack a network with almost no resistance. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=ejTPWPGP0GA...
Topics: Youtube, video, People & Blogs, null byte, airgeddon, wifi hacking, wpa, wpa2, cracking,...
Hacking and InfoSec stuff
by Ethereum
movies
eye 211
favorite 0
comment 0
Presented by Stephan Tual, CCO - (Twitter: @stephantual) Companion Document: https://medium.com/@ethereumproject/4790bf5f7743 Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications. Borrowing the concept of distributed consensus and cryptographic proof that makes cryptocurrencies such as Bitcoin so effective in trustless payments, Ethereum extends the use of these technologies to trustless agreements. This allows...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, decentralized applications,...
Hacking and InfoSec stuff
movies
eye 207
favorite 0
comment 0
How to Use Lazy Script to Hack Wi-Fi & More Full tutorial: http://bit.ly/LAZYwifi Subscribe to Null Byte: https://goo.gl/J6wEnH I'll explain how to use LAZY script, a "lazy" framework with a series of shell scripts which greatly simplifies Wi-Fi hacking tactics to be possible for even the newest of beginners. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=PUQ1bMtft-o Uploader: Null Byte
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 193
favorite 1
comment 0
The principals behind the WW2 Enigma machine. Explore the theory behind how it worked and why it was broken/cracked. Source: https://www.youtube.com/watch?v=2cqbeSVhLBM Uploader: Art of the Problem
Topics: Youtube, video, Education, enigma machine, enigma, ww2, encryption machine, one-time-pad,...
Hacking and InfoSec stuff
movies
eye 181
favorite 0
comment 0
PoisonTap - siphons cookies, exposes internal router & installs web backdoor (reverse tunnel) on locked/password protected computers with a $5 Raspberry Pi Zero and Node.js. https://samy.pl/poisontap/ By Samy Kamkar Full details and source code at https://samy.pl/poisontap/ Buy a Raspberry Pi Zero here: https://amzn.to/2eMr2WY Buy cement for your USB ports here: https://amzn.to/2fX0I1e When PoisonTap (Raspberry Pi Zero & Node.js) is plugged into a locked/password protected computer...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, coding, samy kamkar,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 176
favorite 1
comment 0
History of the Alphabet. This video introduces the Hieroglyphic, Cuneiform, Hieratic, Demotic & Phoenician writing systems. It presents information as a series of selections from a finite collection of symbols... References (book): - The Alphabetic Labyrinth (Drucker) - Letter Perfect (David Sacks) - Empire and Communications (Innis) - The Mathematical Theory of Communication (Shannon) Image References: - http://cuneiform.library.cornell.edu/ (Cuneiform Library at Cornell) - Egyptian...
Topics: Youtube, video, Education, Phonetician, cuneiform, demotic, History of the Alphabet, language of...
Hacking and InfoSec stuff
movies
eye 174
favorite 0
comment 0
How to Break WPS PINs Using Airgeddon & Bully Full Tutorial: http://bit.ly/AirPixieDust Subscribe to Null Byte: https://goo.gl/J6wEnH If you're squaring up against a WPA or WPA2 network with a strong password, you may feel like you're at the end of your options if you can't brute-force or social engineer the password. Fortunately, many routers have a flaw in the WPS setup pin feature that makes bypassing any WPA-based security trivial. Using a tool called Bully, we can exploit weak entropy...
Topics: Youtube, video, Science & Technology, kali linux, wifi, wifi hacking, besside-ng, airgeddon,...
Hacking and InfoSec stuff
by RSA Conference
movies
eye 164
favorite 0
comment 0
Uri Rivner, Head of Cyber Strategy, BioCatch Blockchain has huge potential in finance and trade—but a Bitcoin-less Blockchain is an open invitation to fraud and identity theft. Why are blockchains so exposed? What can be done to protect them? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=UJBMerQ3kJA Uploader: RSA Conference Upload date: 2017-02-15
Topics: Youtube, video, Science & Technology, Authentication, Supply Chain, Identity Theft, Identity...
Hacking and InfoSec stuff
movies
eye 156
favorite 0
comment 0
How to Conduct Online Investigations with Buscador Full Tutorial: http://bit.ly/BuscadorOS Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/kodykinzie Hackers, researchers, and investigators use powerful OSINT tools to find clues during an investigation. In this episode of Cyber Weapons Lab, we'll check out the Buscador virtual machine, developed by Mike Bazzell and David Westcott, which is full of powerful OSINT tools that allow investigators to track down...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by GoogleTechTalks
movies
eye 150
favorite 0
comment 0
Google Tech Talks July 1, 2008 ABSTRACT "Python behind the scenes": some advanced aspects of Python. The talk addresses an audience of proficient Python programmers and deals with several advanced topics: object creation: metaclasses, new, and init - attribute lookup mechanics and descriptor objects - introspection on objects, garbage collection, stack frames, tracebacks - Python bytecode inspection and alteration. Speaker: Alex Martelli Source:...
Topics: Youtube, video, Science & Technology, google, techtalks, techtalk, engedu, talk, talks,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 142
favorite 0
comment 0
What is the essence of information? We explore the history of communication technology leading to the modern field of information theory. We'll build up towards Claude Shannon's measure of information entropy, one step at a time. Source: https://www.youtube.com/watch?v=p0ASFxKS9sg Uploader: Art of the Problem
Topics: Youtube, video, Education, information theory, entropy, bit, language of coins, what is a bit,...
Hacking and InfoSec stuff
movies
eye 142
favorite 0
comment 0
To Protect And Infect, Part 2 The militarization of the Internet Speaker: Jacob Applebaum ( @ioerror ) EventID: 5713 Event: 30th Chaos Communication Congress [30c3] by the Chaos Computer Club [CCC] Location: Congress Centrum Hamburg (CCH); Am Dammtor; Marseiller Straße; 20355 Hamburg; Germany Language: english Begin: Mon, 12/30/2013 11:30:00 +01:00 Lizenz: CC-by Source: https://www.youtube.com/watch?v=vILAlhwUgIU Uploader: CCCen Upload date: 2013-12-30
Topics: Youtube, video, Education, CCC, Chaos Computer Club, 30c3, Talk, Lecture, 2013, Jacob Appelbaum...
Hacking and InfoSec stuff
movies
eye 133
favorite 0
comment 0
SkyJack is a drone engineered to autonomously seek out, hack, and wirelessly take over other drones within wifi distance, creating an army of zombie drones under your control. More details below... by Samy Kamkar FULL DETAILS on SkyJack website: http://samy.pl/skyjack You can support SkyJack on Suprmasv: https://www.suprmasv.com/projects/161/skyjack Follow me on Twitter: https://twitter.com/samykamkar Hardware/software used: SkyJack: http://samy.pl/skyjack Raspberry Pi:...
Topics: Youtube, video, Science & Technology, skyjack, drone, parrot, ar.drone, aircrack, aircrack-ng,...
Hacking and InfoSec stuff
by Zcash
movies
eye 130
favorite 0
comment 0
This is the story of of the Zcash Multi-Party Computation Ceremony. Zcash's zero-knowledge proofs rely on a set of public parameters which allow users to construct and verify private transactions. Due to cryptographic limitations, these parameters must be generated in a setup phase: some random numbers are sampled (which we refer to as the "toxic waste") which are then used to construct the parameters. After the setup phase (aka "The Ceremony"), the toxic waste must be...
Topics: Youtube, video, Science & Technology, zcash, cryptography, cryptocurrency, zcash ceremony,...
Hacking and InfoSec stuff
by GoogleTechTalks
movies
eye 125
favorite 0
comment 0
Google TechTalks July 21, 2006 Guido van Rossum is a computer programmer who is best known as the author and Benevolent Dictator for Life of the Python programming language. ABSTRACT The next major version of Python, nicknamed Python 3000 (or more prosaically Python 3.0), has been anticipated for a long time. For years I have been collecting and exploring ideas that were too radical for Python 2.x, and it's time to stop dreaming and start coding. In this talk I will present the community...
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 123
favorite 0
comment 0
Follows the development of needle telegraphs in Europe which eventually lead to Morse code & key lever designs. During this period there was a focus on increasing the signal rate in order to send more letters per minute. This video focuses on details related to line coding strategies and how time/tempo played a role in information transmission. (1820-1900) Morse Code Simulator:...
Topics: Youtube, video, Education, signal rate, samuel morse, Educational Webseries, Art Of The Problem,...
Hacking and InfoSec stuff
movies
eye 123
favorite 1
comment 0
KeySweeper (http://samy.pl/keysweeper) is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboards (using proprietary 2.4GHz RF) in the area. Keystrokes are sent back to the KeySweeper operator over the Internet via an optional GSM chip, or can be stored on a flash chip and delivered wirelessly when a secondary KeySweeper device comes...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, keysweeper, microsot,...
Hacking and InfoSec stuff
by Samy Kamkar
movies
eye 120
favorite 0
comment 0
USBdriveby (http://samy.pl/usbdriveby) is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks. It also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings,...
Topics: Youtube, video, Science & Technology, hacking, usbdriveby, samy kamkar, reverse engineering,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 120
favorite 0
comment 0
Visualize why evidence alters our confidence (probability) of prior events leading to Bayes theorem. This formula is explained using a tree analogy. This video acts as an introduction to Bayesian statistics. Thanks a bunch to Kalid Azad for reviewing this lesson. Source: https://www.youtube.com/watch?v=Zxm4Xxvzohk Uploader: Art of the Problem
Topics: Youtube, video, Education, Bayes Rule, bayes theorem, bayes law, probability, probability tree,...
Hacking and InfoSec stuff
by Google Developers
movies
eye 113
favorite 0
comment 0
Google Python Class Day 1 Part 2: Lists, Sorting, and Tuples. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=EPYupizJYQI Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
by aantonop
movies
eye 109
favorite 0
comment 0
In this talk, Andreas examines the sensationalist debate over "fake news," the rising tide of faith-based nation states declaring bitcoin as "fake money," and alternative mechanisms we can build to fill the void left by retired fact-checking departments & central bank authorities. This talk took place at the Silicon Valley Bitcoin meetup on April 11th 2017 at the Plug and Play Tech Center (@PlugandPlayTC) in Sunnyvale, California:...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, internet, money, network,...
Hacking and InfoSec stuff
movies
eye 107
favorite 0
comment 0
How to Load Kali onto the Pi 3 Model B+ Full Tutorial: http://bit.ly/3BPlusKali Subscribe to Null Byte: https://goo.gl/J6wEnH To get started with the Raspberry Pi as a hacking platform, you'll need a few key components to get the Pi up and running our ethical hacking version of Kali Linux. Initially, you'll need access to another computer to burn your Kali image to an SD card. You'll also need a good power adapter, SD card, keyboard/mouse combo, wireless network adapter, and a USB Rubber Ducky....
Topics: Youtube, video, Science & Technology, hacking, wonderhowto, wonder how to, nullbyte, null byte,...
Hacking and InfoSec stuff
movies
eye 101
favorite 1
comment 0
OwnStar is a device that can locate, unlock and remote start any vehicle with OnStar RemoteLink after intercepting communication between the RemoteLink mobile app and OnStar servers. It can also unlock (and more) BMW Remote, Mercedes-Benz mbrace, Chrysler Uconnect, and Viper SmartStart. More technicals details to come at Defcon and in a future video. Since my communications with GM, GM/OnStar have resolved this issue for more than 3 million RemoteLink users! Read more:...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, onstar, ownstar,...
Hacking and InfoSec stuff
movies
eye 99
favorite 0
comment 0
Tor: Hidden Services and Deanonymisation This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. There is no public list of onion addresses available; instead, over a period of 6 months, we ran a large number of Tor relays to infiltrate the Distributed Hash Table which Hidden Services publish to. From this, we were able to collect the list of Tor onion addresses AND the number of requests for each site (e.g. loosely...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Tor (Software), Hacking,...
Hacking and InfoSec stuff
by Google Developers
movies
eye 96
favorite 0
comment 0
Google Python Class Day 2 Part 3: Utilities: URLs and HTTP, Exceptions. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=Nn2KQmVF5Og Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
by Google Students
movies
eye 96
favorite 0
comment 0
Design Patterns must be studied in the context on the language in which they'll get implemented (the Gang of Four made that point very strongly in their book, though almost everybody else seems not to have noticed). This talk explores several categories of classic "elementary" DPs in a Python context -- Creational, Masquerading, Adaptation, and Template. http://www.google.com/jobs/studentvideovig Source: https://www.youtube.com/watch?v=4KZx8bATBFs Uploader: Google Students Upload...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
by Google Developers
movies
eye 92
favorite 0
comment 0
Google Python Class Day 2 Part 1: Regular Expressions. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=kWyoYtvJpe4 Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
movies
eye 92
favorite 0
comment 0
Claude Shannon demonstrated how to generate "english looking" text using Markov chains and how this gives a satisfactory representation of the statistical structure of any message. He uses this model as a framework with which to define 'information sources' and how they should be measured. References:...
Topics: Youtube, video, Education, claude shannon, markov chains, approximation to english, generating,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 92
favorite 1
comment 0
A Turing machine is a model of a machine which can mimic any other (known as a universal machine). What we call "computable" is whatever a Turing machine can write down. This video is about how it was conceived and why it works. This is the second last video in the CS series (/watch?v=fjMU-km-Cso) Source: https://www.youtube.com/watch?v=-ZS_zFg4w5k Uploader: Art of the Problem
Topics: Youtube, video, Education, turing machine, universal machine, computer science, art of the problem,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 92
favorite 0
comment 0
Claude Shannon's idea of perfect secrecy is introduced. I'd like to get the point across that no amount of computational power can help improve your ability to break a perfectly secrect encryption scheme. Source: https://www.youtube.com/watch?v=cAt6MYoGqJ4 Uploader: Art of the Problem
Topics: Youtube, video, Education, perfect secrecy, claude shannon, encryption, random, cryptography
Hacking and InfoSec stuff
by Google Developers
movies
eye 90
favorite 0
comment 0
Google Python Class Day 1 Part 3: Dicts and Files. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=haycL41dAhg Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 79
favorite 0
comment 0
Fermat's Little Theorem Visualized. Introduction to a key result in elementary number theory using a visualization with beads Source: https://www.youtube.com/watch?v=XPMzosLWGHo Uploader: Art of the Problem
Topics: Youtube, video, Education, visual proof, prime, fermat, artoftheproblem, fermat's theorem, little...
Hacking and InfoSec stuff
by BlackOpsPro07
movies
eye 75
favorite 1
comment 0
This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only negative actions but it is divided into 3 categories black hat- illegal (bad) grey hat- both legal and illegal helps the community but at times does things that are illegal and white hat- such as security firms or individuals hacking for the security of others (good) Source: https://www.youtube.com/watch?v=PUf1d-GuK0Q Uploader: BlackOpsPro07
Topics: Youtube, video, Education, Hacker, Hackers, Hacking, guide, How to Hack, History of hacking
Hacking and InfoSec stuff
by Tor Project
movies
eye 74
favorite 0
comment 0
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=6v0ga4f2myY...
Topics: Youtube, video, Education, Online Privacy, Anonymity, Tor (Software), Arabic, Surveillance,...
Hacking and InfoSec stuff
movies
eye 73
favorite 0
comment 0
How do we communicate digital information reliably in the presence of noise? Hamming's (7,4) error correction code demonstrates how parity bits can help us recover from transmission/storage errors. This must be taken into account when thinking about Shannon's idea of channel capacity and information rate. (hamming code, error correction) Source: https://www.youtube.com/watch?v=cBBTWcHkVVY Uploader: Art of the Problem
Topics: Youtube, video, Education, error correction, codes, error correction codes, hamming, richard...
An academic lecture by Andreas M. Antonopoulos explaining the consensus algorithm, "Proof of Work", used by bitcoin and many other blockchains. This talk was presented in collaboration with the Department of Computer Science, at University College London. Andreas is a UCL alum. Source: https://www.youtube.com/watch?v=fw3WkySh_Ho Uploader: aantonop Upload date: 2016-01-31
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, lecture,...
Hacking and InfoSec stuff
movies
eye 71
favorite 0
comment 0
How to Hack WPA2 Networks with the PMKID Hashcat Attack Full Tutorial: http://bit.ly/PMKIDattack Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Hacking WPA networks can be a fairly noisy attack that required the target to have someone connected in order to capture a handshake. However, some networks using PMKID are susceptible to a recently discovered vulnerability. We'll show you how to take advantage of this vulnerability with Hashcat on this...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies
eye 71
favorite 0
comment 0
In this follow-up video I go over the full details of cracking open any Master combination lock in 8 tries or less. In my previous video, I provided a simple online tool to crack open any Master combination lock in 8 combinations or less! This new technique will allow you to learn the combination of any Master combo lock with only eight attempts maximum: http://samy.pl/mastervuln/ Online calculator: http://samy.pl/master/ By Samy Kamkar First part here: http://youtu.be/09UgmwtL12c Third part...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, master, cracking, lock,...
Hacking and InfoSec stuff
movies
eye 71
favorite 0
comment 0
Using Airgeddon for an Evil Twin AP Attack with Captive Portal Full Tutorial: http://bit.ly/EvilTwinWiFi Subscribe to Null Byte: https://goo.gl/J6wEnH Wi-Fi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an evil twin attack can steal Wi-Fi passwords by kicking a user off their trusted network while creating a nearly identical fake one. This forces the victim to connect to the fake network and supply the...
Topics: Youtube, video, Science & Technology, wonderhowto, null byte, hacking, hack, wi-fi, password,...
Hacking and InfoSec stuff
movies
eye 70
favorite 0
comment 0
Unlocking Motion-Sensor Secured Doors With Air Duster (Canned Air) by Samy Kamkar (read more...) After testing various methods purportedly used to defeat motion sensors that are used to unlock doors, I found none of the methods documented on the Internet or that I heard about actually work. After performing my own research, I discovered a new technique that actually does work, and is simple and inexpensive -- using air duster (canned air) to set off the PIR (passive infrared) motion sensor from...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, canned air, air duster,...
Hacking and InfoSec stuff
movies
eye 69
favorite 0
comment 0
How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
movies
eye 69
favorite 0
comment 0
In this talk, Andreas explores the rise of the term "blockchain" as a counterweight to bitcoin. The term blockchain does not provide a definition, as it has been diluted to be meaningless. Saying "blockchain" simply invites questions, such as "what is the consensus algorithm". Meanwhile, bitcoin continues to offer an alternative to the traditional financial system. Andreas looks at the value of private ledgers, which he sees as having a small impact on finance,...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
by GoogleTechTalks
movies
eye 68
favorite 0
comment 0
Google Tech Talks February 14, 2007 ABSTRACT Since the renewed Python 3000 effort was announced at PyCon 2006, a lot has happened. We've implemented about half of the promised changes in a branch, we've solidified the schedule, there's a refactoring tool that can do source-to-source translations, and we've produced several gigabytes of discussion about language change proposals (most of which were deemed too radical in the end :-). In this talk, a preview of a keynote to be given at PyCon 2007,...
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
movies
eye 67
favorite 1
comment 0
How to Automate Wi-Fi Handshake Harvesting on a Raspberry Pi Full Tutorial: http://bit.ly/RpiDucky Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While the USB Rubber Ducky was made famous as an offensive device, it's also useful for using things like a headless Raspberry Pi running Kali Linux. In this video, we'll show you how to use Ducky Script to automate Besside-ng, a tool that allows mass auditing of local networks to discover ones with weak...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by RSA Conference
movies
eye 67
favorite 0
comment 0
Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike George Kurtz, CEO, CrowdStrike Real-world case studies of advanced intrusions on MacOS systems, with detailed breakdown of TTPs and artifacts. In the typical raw Hacking Exposed style, the session will demonstrate these attacks and provide relevant countermeasures for detection and response. Reprising their appearance again this year are also the must-see Adversary Oscars.Learning Objectives:1: Learn what the different attacker TTPs are on...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
by Google Developers
movies
eye 67
favorite 0
comment 0
Google Python Class Day 2 Part 2: Utilities: OS and Commands. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=uKZ8GBKmeDM Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
by aantonop
movies
eye 66
favorite 0
comment 1
This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 65
favorite 0
comment 0
RSA Encryption (step 3) Source: https://www.youtube.com/watch?v=wHiBGONmxwA Uploader: Art of the Problem
Topics: Youtube, video, Education, YouTube editor, History Of Science, Educational Webseries
Hacking and InfoSec stuff
movies
eye 65
favorite 0
comment 0
Google TechTalks April 26, 2006 Jacob Kaplan-Moss ABSTRACT Django is one of the premier web frameworks for Python, and is often compared to Ruby-on-Rails. Jacob is one of the lead developers on Django. Source: https://www.youtube.com/watch?v=p-WXiqrzAf8 Uploader: GoogleTechTalks Upload date: 2007-10-08
Topics: Youtube, video, Howto & Style, python, django, google
Hacking and InfoSec stuff
by Google Developers
movies
eye 63
favorite 0
comment 0
Google Python Class Day 1 Part 1: Closing Thoughts. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=IcteAbMC1Ok Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 61
favorite 1
comment 0
Caesar cipher was a simple technique for disguising a message. Used for hundreds of years to keep secrets. Cryptography begins with the Caesar cipher. Stock footage under CC license from Prelinger Archive Source: https://www.youtube.com/watch?v=N2tjzHzWOjQ Uploader: Art of the Problem
Topics: Youtube, video, Education, caesar cipher, shift cipher, cryptography, rome, encryption, cipher, how...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 59
favorite 0
comment 0
What is Computer Memory? Punch cards, core memory and atomic memory are introduced. It's important to realize that computer memory takes up space. Thanks to - IBM for animation of atomic memory - Department of Defense footage available here (/redirect?v=Q4ihOCocaVw&redir_token=ioAsq4GyQ8geXwwsZ2gGarAm5cB8MTUyNzg3NjcyNUAxNTI3NzkwMzI1&event=video_description&q=http%3A%2F%2Farchive.org%2Fdetails%2Fgov.dod.dimoc.28374) Source: https://www.youtube.com/watch?v=Q4ihOCocaVw Uploader: Art of...
Topics: Youtube, video, Education, hard drives, computers, Educational Webseries, Khanacademy, atomic...
Hacking and InfoSec stuff
movies
eye 58
favorite 0
comment 0
Use a Domain to Gather Info About a Network Full Tutorial: http://bit.ly/MaltegoPrint Subscribe to Null Byte: https://goo.gl/J6wEnH Maltego is a great tool for any white hat hacker, pentester, or digital security professional. One of the uses is fingerprinting an entire network, and we can do that just by starting out with a single website domain. You can view all the technical details about a target network, including name server, MX server, DNS server, IP addresses, IP netblocks, AS number,...
Topics: Youtube, video, Science & Technology, wht, wonderhowto, nullbyte, null byte, hack, hacking,...
Hacking and InfoSec stuff
movies
eye 57
favorite 0
comment 0
Entropy is a measure of the uncertainty in a random variable (message source). Claude Shannon defines the "bit" as the unit of entropy (which is the uncertainty of a fair coin flip). In this video information entropy is introduced intuitively using bounce machines & yes/no questions. Note: This analogy applies to higher order approximations, we simply create a machine for each state and average over all machines! Source: https://www.youtube.com/watch?v=R4OlXb9aTvQ Uploader: Art of...
Topics: Youtube, video, Education, entropy, information, information entropy, bit, information theory,...
Hacking and InfoSec stuff
movies
eye 56
favorite 1
comment 0
Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 55
favorite 0
comment 0
History of the telegraph from the signal fire to 18th Century semaphore lines. We visit ideas of Polybius, Aeneas Tactius, Sushruta, Francis Bacon, Robert Hooke and others. References: Communications: An International History of the Formative Years (Burns) Understanding Media (McLuhan) The Mathematical Theory of Communication (Shannon) The Histories (Polybius) translation link:...
Topics: Youtube, video, Education, polybius, information theory, francis bacon, chappe telegraph,...
Hacking and InfoSec stuff
by Null Byte
movies
eye 55
favorite 0
comment 0
How to Use Aircrack-ng & Besside-Ng to Crack WEP Passwords Full Tutorial: http://bit.ly/WEPcracking Subscribe to Null Byte: https://goo.gl/J6wEnH While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and can be cracked in a matter of minutes. We'll show you how this works, and explain why you should be careful to avoid hacking...
Topics: Youtube, video, Science & Technology, hack, hack wifi, wifi hacking, wep, wep hacking, beginner...
Hacking and InfoSec stuff
movies
eye 54
favorite 0
comment 0
Emily Wilson, Director of Analysis, Terbium Labs The reality of the dark web goes against industry reports. Most of the dark web is legal, even ridiculous activity amidst drugs, fraud and other crimes. This session will look at the funny and absurd. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=sCaiWFyKVBY Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, data security, identity theft,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 54
favorite 0
comment 0
I created this video with the YouTube Video Editor (http://www.youtube.com/editor) Source: https://www.youtube.com/watch?v=ko62sibi668 Uploader: Art of the Problem
Topics: Youtube, video, Education, YouTube editor, History Of Science, Educational Webseries
Hacking and InfoSec stuff
by Privacy International
movies
eye 50
favorite 0
comment 0
This video is a high level overview of why privacy is important. Privacy ensures that democracy is possible by allowing citizens to have safe spaces to discuss ideas, grow, and learn. PI investigates the secret world of government surveillance and exposes the companies enabling it and litigate to ensure that surveillance is consistent with the rule of law. We advocate for strong national, regional, and international laws that protect privacy. We conduct research to catalyse policy change. We...
Topics: Youtube, video, People & Blogs, privacy, privacy international, civil liberties, human rights,...
Reconstructing narratives transparency in the service of justice Surveillance, cryptography, terrorism, malware, economic espionage, assassination, interventions, intelligence services, political prisoners, policing, transparency, justice and you. Structural processes and roles are designed to create specific outcomes for groups. Externally facing narratives are often only one of many and they seek to create specific outcomes by shaping discourse. We will cover a wide range of popular...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Narrative (Profession),...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 49
favorite 0
comment 0
A short story about the need for digital communication and how it leads to coding theory (variable length source coding) with a lossless compression problem. Source encoding attempts to compress the data from a source in order to transmit it more efficiently. Source: https://www.youtube.com/watch?v=musBo7Kafic Uploader: Art of the Problem
Topics: Youtube, video, Education, coding theory, shannon, information theory, compression, lossless,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 49
favorite 0
comment 0
This video explores the origin and history of computers from Gottfried Leibniz's dreams of mechanizing mental work through Charles Babbage's analytic engine. It ends with Ada Lovelace's famous insights about computer programming...ushering a new era of Computer Science which explodes in the 20th Century. Please support this independent production: https://www.patreon.com/artoftheproblem To learn more about Lovelace check out this article:...
Topics: Youtube, video, Education, what is a computer, computer science, computer history, history of...
Hacking and InfoSec stuff
movies
eye 49
favorite 0
comment 0
Use MITM Framework to Capture Passwords Over Local Network Full Tutorial: /redirect?v=J6Fm1Da5a4w&redir_token=_AdM0_78t7SHFwIqYDC34-n_TCR8MTUzNzI4ODgxN0AxNTM3MjAyNDE3&event=video_description&q=https%3A%2F%2Fnull-byte.wonderhowto.com%2Fhow-to%2Fhacking-pranks-flip-photos-change-images-inject-messages-into-friends-browsers-your-wi-fi-network-0180303%2F Subscribe to Null Byte: https://goo.gl/J6wEnH MITMf - https://github.com/byt3bl33d3r/MITMf Networking is built largely on trust. Most...
Topics: Youtube, video, People & Blogs, kali linux, mitm, mitmf, man in the middle, wifi hacking,...
Hacking and InfoSec stuff
by Art of the Problem
movies
eye 49
favorite 0
comment 0
Overview of network coding. This video was produced with the IEEE Information Theory Society. Learn more at: https://www.youtube.com/channel/UCNCCcJS339B8H2PVtq68YQg Paper featured in this video: Network Information Flow -...
Topics: Youtube, video, Education, network coding, ieee, information theory, line capcity
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Privacy International
movies
eye 49
favorite 1
comment 0
Are you a lawyer? An activist? A journalist? A doctor, teacher, parent, student, researcher, politician, or citizen? Communications surveillance affects you. This video is a high level overview of communications surveillance! More videos and information here: https://privacyinternational.org Donate here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=RJpmbQTuItE Uploader: Privacy International
Topics: Youtube, video, People & Blogs, communications surveillance, surveillance, GCHQ, NSA, United...
Hacking and InfoSec stuff
movies
eye 48
favorite 0
comment 0
How to Watch Wi-Fi User Activity Through Walls Full Tutorial: http://bit.ly/kismetwifi Subscribe to Null Byte: https://goo.gl/J6wEnH Kismet can detect any nearby devices that use Wi-Fi, whether they are connected or not. This ability lets us scan the nearby area for both APs and client devices, and even watch small details about when a device or connection is in use. With this data, we can tell when people are home, what devices they own, and when they are using them. You can grab a Panda PAU05...
Topics: Youtube, video, People & Blogs, kismet, wireless, osint, sigint, null byte, nullbyte,...