ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,271 results

Community Developer
Spacemacs: Evaluate Clojure in the code buffer

Using Spacemacs to evaluate Clojure code with the results in-line in the code buffer (rather than the repl) At the end, switching to ...

0:45
Spacemacs: Evaluate Clojure in the code buffer

1,027 views

9 years ago

Startup to Storefront
The Dirty Truth Behind Monthly Contact Lenses

While Daily Contact Lenses can be cost prohibitive for most people, there is a dirty secret behind what can happen when wearing ...

0:33
The Dirty Truth Behind Monthly Contact Lenses

293,892 views

3 years ago

OpenSecurityTraining2
Vulns1001 01 Class Intro

View the full free class at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

26:42
Vulns1001 01 Class Intro

7,515 views

2 years ago

DistroTube
Doom Emacs On Day One (Learn These Things FIRST!)

Many Vim users find Doom Emacs overwhelming at first, because of the orgy of documentation. There is so much to learn!

35:10
Doom Emacs On Day One (Learn These Things FIRST!)

229,917 views

3 years ago

John Hammond
Basic Buffer Overflow - VulnServer TRUN

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

1:03:04
Basic Buffer Overflow - VulnServer TRUN

202,111 views

5 years ago

Sophia Wagner
Codereview: Fast circular buffer

Fast circular buffer Hey guys! Hopefully you found a solution that helped you! The Content is licensed under ...

6:08
Codereview: Fast circular buffer

8 views

1 year ago

Ultimate Tech Hub
How To Fix Plex - Media Server Streaming Issues (2025)

These are the Top 8 Plex Media Server Issues with the 8 Simple Solutions! https://www.plex.tv/plex-pass/ Best Deals On NAS ...

8:31
How To Fix Plex - Media Server Streaming Issues (2025)

75,493 views

9 months ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,542 views

7 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

59:07
Day 1 Part 3: Exploits1: Introduction to Software Exploits

6,725 views

13 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,884 views

13 years ago

AI and Healthcare
Can you kill a tumor cell?

Watch the full video with Dr. Thomas Seyfried ▶️ : https://www.youtube.com/watch?v=qa3j40c8iAo Hosted by Sanjay Juneja, ...

0:20
Can you kill a tumor cell?

1,714,006 views

2 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

1:17:34
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

13,619 views

13 years ago

Trend Zero Day Initiative
Highlights from Pwn2Own Vancouver  Day 1 - Team Theori vs VMware Workstation+LPE #shorts #pwn2own

pwn2own #0day Gwangun Jung and Junoh Lee from Theori combined an uninitialized variable bug, a UAF, and a heap-based ...

0:30
Highlights from Pwn2Own Vancouver Day 1 - Team Theori vs VMware Workstation+LPE #shorts #pwn2own

864 views

1 year ago

collaborate.je
Exploiting Buffer Overflows - by Paul Dutot

Workshop presented at collaborate.je Open Source Day, 11th Feb 2015 at the Digital Jersey Hub. Thanks to Paul Dutot of ...

43:55
Exploiting Buffer Overflows - by Paul Dutot

305 views

10 years ago

IndiGo 6E
In-flight Services |  Cabin Crew | IndiGo 6E

Ready to take off, daily and non-stop. That's our ninjas on board. #goIndiGo.

0:19
In-flight Services | Cabin Crew | IndiGo 6E

27,697,530 views

3 years ago

OpenSecurityTraining2
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

44:12
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

1,729 views

13 years ago

The Linux Foundation
Exploiting Buffer Overflows on RISC-V - Christina Quast, None

Exploiting Buffer Overflows on RISC-V - Christina Quast, None Almost 10 years ago, work on the RISC-V ISA specification began.

36:23
Exploiting Buffer Overflows on RISC-V - Christina Quast, None

2,401 views

6 years ago

Nida Karagoz
Where is the code position that Postgresql write wal buffer on lack of space (2 SOLUTIONS!!)

Where is the code position that Postgresql write wal buffer on lack of space (2 SOLUTIONS!!) ✧ I really hope you found a helpful ...

1:55
Where is the code position that Postgresql write wal buffer on lack of space (2 SOLUTIONS!!)

4 views

8 months ago

OpenSecurityTraining2
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

26:15
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

2,178 views

13 years ago

Bitwise
Bitwise, Day 3: More Programming & Parsing

Discussion: https://bitwise.handmade.network/forums Repository: https://github.com/pervognsen/bitwise/

2:00:50
Bitwise, Day 3: More Programming & Parsing

13,238 views

7 years ago

OktaDev
Okta Authorization Servers for OpenID Connect and OAuth 2.0 Integrations

This video explains the two types of OAuth 2.0 authorization servers Okta provides and gives you tips on how to create and debug ...

17:23
Okta Authorization Servers for OpenID Connect and OAuth 2.0 Integrations

31,132 views

3 years ago

OpenSecurityTraining2
Day 2 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

44:21
Day 2 Part 1: Exploits1: Introduction to Software Exploits

3,521 views

13 years ago

Sleep Doctor
if you wake up tired

What Happens If You Wake Up Tired #shorts.

0:22
if you wake up tired

360,955 views

3 years ago

RCGM tutorials
How to reset LG TV -  Factory Settings LG TV

LG SMART TV How to Factory Reset - How to Factory Reset LG TV - LG TV Factory reset - LG Default Settings - Factory Rese LG ...

0:25
How to reset LG TV - Factory Settings LG TV

287,953 views

1 year ago

Midnight ProteX
HOW TO REMOVE ADHESIVE LEFT BEHIND ON A CAR

If you enjoyed the video please like, share and subscribe! Daily tinting, wrapping, and PPF uploads. Follow us on Facebook: ...

0:13
HOW TO REMOVE ADHESIVE LEFT BEHIND ON A CAR

175,835 views

3 years ago