ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

149 results

DevDojo Academy
Spring Boot 2.3 Essentials 11 - Spring Data JPA with MySQL pt 02

Spring Boot Essentials is the course you were looking for if you never had contact with Spring Boot before. In this tutorial like ...

9:15
Spring Boot 2.3 Essentials 11 - Spring Data JPA with MySQL pt 02

787 views

5 years ago

Red Hat Developer
Readiness Liveness Probes

In this video, the user learns how to configure Readiness and Liveness probes to monitor service health.

6:50
Readiness Liveness Probes

652 views

4 years ago

John Hammond
Basic Buffer Overflow - VulnServer TRUN

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

1:03:04
Basic Buffer Overflow - VulnServer TRUN

201,889 views

5 years ago

DevDojo Academy
SpringBoot 2.3 Essentials 15 - Exception Handling pt 03 - @Transactional

More info and contact: http://devdojo.academy Source code: https://github.com/devdojoacademy/springboot2-essentials ...

8:20
SpringBoot 2.3 Essentials 15 - Exception Handling pt 03 - @Transactional

722 views

5 years ago

SreenuTech
JAVA Security Scanning Tool (Snyk) | By Mr. Sreenivas

About Sreenu Technologies: Sreenu Technologies has established in 2013 May. We are experts on Java Realtime Project ...

48:16
JAVA Security Scanning Tool (Snyk) | By Mr. Sreenivas

6,327 views

3 years ago

OWASP Foundation
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong According to the 2016 Verizon Data Breach ...

46:05
Popular Approaches to Preventing Code Injection Attacks are Dangerously Wrong - AppSecUSA 2017

1,239 views

8 years ago

Howard Abrams
Demonstration of demo-it

A demonstration of my Emacs demonstration tool, demo-it, given at the PDX Emacs Hacker night. Sorry that the recording just cuts ...

24:16
Demonstration of demo-it

4,094 views

9 years ago

The Linux Foundation
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google.

45:30
Mitigating (Some) Use-after-frees in the Linux Kernel - Jann Horn, Google

1,069 views

5 years ago

Nobody
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

This is the 4th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:07:37
Offensive Security 2013 - FSU - Lecture4: Rootkits / Code Auditing

7,407 views

12 years ago

DEFCONConference
DEF CON 30  - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...

38:52
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

1,648 views

3 years ago

CCS 2016
CCS 2016 - CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

Authors: Jun Xu (Pennsylvania State University), Dongliang Mu (Nanjing University) Ping Chen, Xinyu Xing and Peng Liu ...

23:09
CCS 2016 - CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

387 views

9 years ago

Nobody
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1

This is the 5th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:15:56
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1

21,299 views

12 years ago

Nobody
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

This is the 15th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:20:48
Offensive Security 2013 - FSU - Lecture15: Web Application Hacking 104 & Exploit Development 104

4,298 views

12 years ago

The Linux Foundation
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin, Canvass Labs Surprisingly, often ...

32:50
Where is my Code Vulnerable: Matching CVEs and Source Code - David A. Barrett & Peter Shin

458 views

6 years ago

media.ccc.de
35C3 -  From Zero to Zero Day

https://media.ccc.de/v/35c3-9657-from_zero_to_zero_day In this talk I will share my story of how in a little over a year, a high ...

48:29
35C3 - From Zero to Zero Day

31,802 views

7 years ago

dist67
Quick & Dirty Shellcode Analysis - CVE-2017-11882

More info: https://videos.didierstevens.com/2022/03/09/quick-dirty-shellcode-analysis-cve-2017-11882/

4:49
Quick & Dirty Shellcode Analysis - CVE-2017-11882

1,730 views

3 years ago

Nobody
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

56:45
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

2,093 views

12 years ago

Nobody
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

This is the 7th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

1:11:04
Offensive Security 2013 - FSU - Lecture7: Fuzzing / Exploit Dev 101

10,316 views

12 years ago

The Linux Foundation
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students

Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students.

40:46
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students

478 views

5 years ago

OWASP Foundation
AppSecEU 16 - Dan Cornell - The ABCs of Source-Assisted Web Application Penetration Testing

From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...

44:57
AppSecEU 16 - Dan Cornell - The ABCs of Source-Assisted Web Application Penetration Testing

449 views

9 years ago