ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

30 results

Open Source Security
Python Security with Seth Larson

In this episode Seth Larson gives us a cornucopia of topics relating to Python security. Seth discusses the Python Software ...

32:40
Python Security with Seth Larson

102 views

1 month ago

freeCodeCamp.org
Python for Everybody - Full University Python Course

This Python 3 tutorial course aims to teach everyone the basics of programming computers using Python. The course has no ...

13:40:10
Python for Everybody - Full University Python Course

7,557,037 views

6 years ago

DEFCONConference
DEF CON 21 - Dr Philip Polstra - We are Legion

We are Legion: Pentesting with an Army of Low-power Low-cost Devices DR. PHILIP POLSTRA HACKER IN RESIDENCE, ...

43:21
DEF CON 21 - Dr Philip Polstra - We are Legion

1,889 views

12 years ago

DEFCONConference
DEF CON Safe Mode - Michael Stay - How we recovered XXX,000 in Bitcoin from an zip file Q&A

Question and answer session for Michael Stay - How we recovered XXX,000 in Bitcoin from a zip file.

29:10
DEF CON Safe Mode - Michael Stay - How we recovered XXX,000 in Bitcoin from an zip file Q&A

1,152 views

5 years ago

Chuck Severance
Python for Informatics - Exercise from Chapter 9

This is Chapter 9 from Python for Informatics - Exploring Information. From www.pythonlearn.com.

29:04
Python for Informatics - Exercise from Chapter 9

15,545 views

12 years ago

William Silversmith
Downsampling, Meshing, and Skeletonizing with Igneous

This video shows how to use Igneous (https://github.com/seung-lab/igneous), Python software for processing Neuroglancer large ...

23:58
Downsampling, Meshing, and Skeletonizing with Igneous

476 views

3 years ago

DEFCONConference
DEF CON Safe Mode - Shlomi Oberman, Moshe Kol, Ariel Schön - Hacking the Supply Chain

This is the story of how we found and exploited a series of critical vulnerabilities (later named Ripple20) affecting tens or hundreds ...

44:10
DEF CON Safe Mode - Shlomi Oberman, Moshe Kol, Ariel Schön - Hacking the Supply Chain

8,923 views

5 years ago

DEFCONConference
DEF CON 21 - Jaime Filson and Rob Fuller - gitDigger Creating useful wordlists

gitDigger: Creating useful wordlists from public GitHub repositories JAIME FILSON (WIK) ROB FULLER (MUBIX) This presentation ...

20:22
DEF CON 21 - Jaime Filson and Rob Fuller - gitDigger Creating useful wordlists

622 views

12 years ago

Alfredo Canziani (冷在)
Week 6 – Lecture: CNN applications, RNN, and attention

Course website: http://bit.ly/DLSP20-web Playlist: http://bit.ly/pDL-YouTube Speaker: Yann LeCun Week 6: http://bit.ly/DLSP20-06 ...

1:28:48
Week 6 – Lecture: CNN applications, RNN, and attention

21,384 views

5 years ago

DEFCONConference
Andy Grant - Unpacking Pkgs A Look Inside MacOS Installer Packages - DEF CON 27 Conference

We are hackers, we won't do as you expect or play by your rules, and we certainly don't trust you. JAR files are really ZIPs...unzip ...

22:08
Andy Grant - Unpacking Pkgs A Look Inside MacOS Installer Packages - DEF CON 27 Conference

1,800 views

6 years ago

DEFCONConference
DEF CON Safe Mode - Jack Baker - Finding and Exploiting Bugs in Multiplayer Game Engines

Unreal Engine 4 and Unity3D dominate the multiplayer gaming landscape. They're also complicated pieces of software written in ...

41:38
DEF CON Safe Mode - Jack Baker - Finding and Exploiting Bugs in Multiplayer Game Engines

21,244 views

5 years ago

Jeremy Howard
Lesson 14: Cutting Edge Deep Learning for Coders

Deep learning has generally been associated with unstructured data such as images, language, and audio. However it turns out ...

2:10:13
Lesson 14: Cutting Edge Deep Learning for Coders

14,166 views

8 years ago

Jon Gjengset
Implementing (parts of) git from scratch in Rust

In this stream, we implement core pieces of git from scratch by following the CodeCrafters git "course" ...

4:29:28
Implementing (parts of) git from scratch in Rust

104,711 views

1 year ago

DEFCONConference
DEF CON 21 - Wesley McGrew - Pwn The Pwn Plug

Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices WESLEY MCGREW RESEARCH ASSOCIATE, ...

40:55
DEF CON 21 - Wesley McGrew - Pwn The Pwn Plug

2,696 views

12 years ago

José A. Alonso
Definiciones de listas por comprensión en Haskell

Se estudia cómo definir funciones en Haskell usando listas de comprensión. En concreto, se estudia cómo definir: listas con un ...

1:20:23
Definiciones de listas por comprensión en Haskell

1,851 views

5 years ago

SiliconANGLE theCUBE
Milin Desai, Sentry.io | CUBE Conversation, March 2020

Milin Desai, CEO of Sentry.io, sits down with John Furrier for a CUBE Conversation in the Palo Alto studios. #CUBEConversation ...

25:08
Milin Desai, Sentry.io | CUBE Conversation, March 2020

1,608 views

5 years ago

DEFCONConference
DEF CON 21 - Franz Payer - Exploiting Music Streaming with JavaScript

Exploiting Music Streaming with JavaScript FRANZ PAYER PROGRAMMER, TACTICAL NETWORK SOLUTIONS As the music ...

33:03
DEF CON 21 - Franz Payer - Exploiting Music Streaming with JavaScript

1,780 views

12 years ago

DEFCONConference
DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers

TASBot is an augmented Nintendo R.O.B. robot that can play video games without any of the button mashing limitations us ...

41:57
DEF CON 24 - Allan Cecil - Robot Hacks: TASBot Exploits Consoles with Custom Controllers

2,876 views

9 years ago

Tyler Caraza-Harter
CS 320 Oct 28 (Part 1) - Matplotlib Coordinate Systems

... this the other thing i can do in python is called unpacking if i know that i'm getting something here which is uh has two entries in ...

22:13
CS 320 Oct 28 (Part 1) - Matplotlib Coordinate Systems

396 views

5 years ago

twoormore
Bowling Clojure - Part 1

We revisit the bowling kata, this time in Clojure, with the intention of looking at the past, not the future. For the full series playlist ...

27:40
Bowling Clojure - Part 1

61 views

3 years ago