Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
67 results
About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...
6,340 views
3 years ago
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.
1,069 views
5 years ago
To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...
202,017 views
4,902 views
This is the 5th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
21,300 views
12 years ago
Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...
1,649 views
A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...
4,094 views
9 years ago
dApp security is a whole new world where we should re-learn and change our perspective on security concepts. In this workshop ...
207 views
Streamed 3 years ago
https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...
31,859 views
7 years ago
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...
1,240 views
8 years ago
45,302 views
This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
7,407 views
This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
10,317 views
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...
458 views
6 years ago
Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...
387 views
For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment ...
106,026 views
4 years ago
This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
4,298 views
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer ...
501,867 views
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.
480 views
This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
2,093 views