Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
59 results
https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...
31,884 views
7 years ago
Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...
1,652 views
3 years ago
To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...
202,090 views
5 years ago
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,070 views
4 years ago
From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...
449 views
9 years ago
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...
1,240 views
8 years ago
About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...
9,767 views
45,360 views
A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...
4,098 views
This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
7,407 views
12 years ago
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.
480 views
2015-02-26. CS Colloquium at Harvard School of Engineering and Applied Sciences. Notes from this talk: ...
29,049 views
10 years ago
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...
460 views
6 years ago
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.
1,070 views
Damian Gomez: Intelligent debugging for vuln-dev Damian Gomez is a Security Researcher at Immunity, which he joined in ...
224 views
11 years ago
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,299 views
This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
2,093 views
This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
10,317 views
Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...
387 views
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
502,868 views