ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,239 results

Tech with Leens
Ports & Protocols Explained 🔌 | TCP vs UDP, HTTP, HTTPS & DNS for Beginners

Understanding ports and protocols is a core skill for networking and cybersecurity beginners. In this video, we break down: What ...

2:25
Ports & Protocols Explained 🔌 | TCP vs UDP, HTTP, HTTPS & DNS for Beginners

313 views

2 weeks ago

AXCP Protocol
AXCP Demo: Secure Multi-Agent AI Communication (Claude + Gemini + GPT) | AXCP Protocol

First working demonstration of AXCP (Adaptive eXchange Context Protocol), the secure communication layer for autonomous AI ...

5:38
AXCP Demo: Secure Multi-Agent AI Communication (Claude + Gemini + GPT) | AXCP Protocol

7 views

2 weeks ago

Dark Wire Labs
Developing own VPN protocol - Part 2

In today's video we're enhancing our VPN protocol by adding peer authentication and data encryption. If you missed Part 1, watch ...

14:32
Developing own VPN protocol - Part 2

5,479 views

2 weeks ago

Addie LaMarr
Diffie-Hellman: How to Share Secrets in Public

How the secure internet actually works (and why quantum breaks the rules) The truth about Diffie-Hellman, shared secrets, and ...

13:48
Diffie-Hellman: How to Share Secrets in Public

6,615 views

3 weeks ago

Coin Bureau
Stripe, Google and Amazon Are Betting on Crypto Payments. Here's How to Profit

Recently, Stripe announced it would be integrating x402 payments on Base, and this suggests that crypto payments and the ...

19:27
Stripe, Google and Amazon Are Betting on Crypto Payments. Here's How to Profit

30,381 views

1 day ago

Security Cryptography Whatever
Obviously you have to do a string compare to do AES GCM in OpenSSL 3

From https://youtu.be/dEKBHI3rodY The Python cryptography module, pyca/cryptography, has mostly been a sane wrapper ...

0:15
Obviously you have to do a string compare to do AES GCM in OpenSSL 3

13,186 views

2 weeks ago

Nicolas Neira
Google ADK + A2A Protocol: How 7 AI Agents Build an IDP

🤖 Google ADK + A2A Protocol in action: 7 AI agents generate a complete Internal Developer Platform, with no human intervention ...

49:41
Google ADK + A2A Protocol: How 7 AI Agents Build an IDP

2,363 views

2 weeks ago

Banyan Tree Movies
The Singularity Protocol (Full Movie)

AI, War, and Humanity's Future. Please subscribe, like, comment & share. Share this film - help start the conversation on safe AI.

49:40
The Singularity Protocol (Full Movie)

1,498 views

2 weeks ago

OpenSSL Foundation
How the OpenSSL community was built on Heartbleed

Before April 2014, OpenSSL was a backwater open source project with fewer than 10 regular contributors and 1 1/2 maintainers.

25:26
How the OpenSSL community was built on Heartbleed

21 views

2 weeks ago

TechKnowSurge
Computer Networking for Beginners: How the Internet Really Works (Easy to Understand!)

TechKnowSurge Membership ➡️ https://l.techknowsurge.com/membership-net101 A huge thanks to everyone for supporting the ...

1:27:41
Computer Networking for Beginners: How the Internet Really Works (Easy to Understand!)

198 views

3 weeks ago

GND STUDIO
[Subtitles] “Do I still look like a kid to you?” | Love in Protocol Ep.2

Love in Protocol (러브 인 프로토콜) Ep.2|GND Studio 📋 During a VR test for an emotional response experiment, Jeong-yeon is ...

8:35
[Subtitles] “Do I still look like a kid to you?” | Love in Protocol Ep.2

429,165 views

3 weeks ago

CyberTeaches
Endpoint - Protocol & Email Security

U3L11 (4.5.1) - Endpoint - Protocol & Email Security focuses on endpoint security for protocols and email communications.

3:50
Endpoint - Protocol & Email Security

5 views

4 weeks ago

Simon Gelo
I2S Protocol for ESP32

Learn how the I²S (Inter-IC Sound) protocol works on the ESP32 for digital audio applications. Resources: Wikipedia: ...

3:02
I2S Protocol for ESP32

423 views

2 weeks ago

CryptoCobra
NEAR Protocol: Dead Coin or Next AI Crypto Giant?

NEAR Protocol is down 95% from its all-time high and Binance delisted one of its trading pairs… but while everyone panics, ...

4:07
NEAR Protocol: Dead Coin or Next AI Crypto Giant?

430 views

6 days ago

NEAR Protocol
NEAR Intents 50/50 Fee Split, AI Job Apocalypse: Hiring Freeze & Rise of AI Agents

NEAR is the Blockchain for AI Website: https://near.org/ NEAR AI: https://near.ai/ Intents: https://near.org/intents Chain Abstraction: ...

3:02
NEAR Intents 50/50 Fee Split, AI Job Apocalypse: Hiring Freeze & Rise of AI Agents

65 views

16 hours ago

Data Slayer
This is a New Kind of Wireless

A New Band... This video explores the arrival of dual-band LoRa, combining traditional sub-GHz LoRa with a new 2.4 GHz LoRa ...

22:35
This is a New Kind of Wireless

88,635 views

3 weeks ago

StatusCake
HTTP Uptime Test Explained: (Intermediate) Content Matching, Redirects & Headers StatusCake

Want your uptime monitoring to detect more than just “site up or down”? In this intermediate StatusCake tutorial, you'll learn how to ...

4:55
HTTP Uptime Test Explained: (Intermediate) Content Matching, Redirects & Headers StatusCake

7 views

3 weeks ago

WilhelmTell
HelixNet EP.2: HTTPS in Development — Traefik, mkcert & /etc/hosts

Real HTTPS on localhost. No warnings. No workarounds. No excuses. In this episode we walk through the full local HTTPS setup ...

7:47
HelixNet EP.2: HTTPS in Development — Traefik, mkcert & /etc/hosts

28 views

2 weeks ago

AskF5
Configure the maximum allowed URL length for an HTTP request using the Configuration utility

In this video, AskF5 shows you how to configure the maximum allowed URL length for an HTTP request using the Configuration ...

2:03
Configure the maximum allowed URL length for an HTTP request using the Configuration utility

128 views

3 weeks ago

ITSystemsAdmin
VMware\Omnissa Horizon Gateway Certificate (SSL/TLS) CA-signed Cert.

An Omnissa Horizon Gateway Certificate is an SSL/TLS certificate installed on the Unified Access Gateway (UAG) to secure ...

5:52
VMware\Omnissa Horizon Gateway Certificate (SSL/TLS) CA-signed Cert.

44 views

2 weeks ago