ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

6,262 results

Community Developer
Spacemacs: Evaluate Clojure in the code buffer

Using Spacemacs to evaluate Clojure code with the results in-line in the code buffer (rather than the repl) At the end, switching to ...

0:45
Spacemacs: Evaluate Clojure in the code buffer

1,027 views

8 years ago

OpenSecurityTraining2
Vulns1001 01 Class Intro

View the full free class at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

26:42
Vulns1001 01 Class Intro

7,451 views

2 years ago

DistroTube
Doom Emacs On Day One (Learn These Things FIRST!)

Many Vim users find Doom Emacs overwhelming at first, because of the orgy of documentation. There is so much to learn!

35:10
Doom Emacs On Day One (Learn These Things FIRST!)

228,992 views

3 years ago

Startup to Storefront
The Dirty Truth Behind Monthly Contact Lenses

While Daily Contact Lenses can be cost prohibitive for most people, there is a dirty secret behind what can happen when wearing ...

0:33
The Dirty Truth Behind Monthly Contact Lenses

290,873 views

3 years ago

Sophia Wagner
Codereview: Fast circular buffer

Fast circular buffer Hey guys! Hopefully you found a solution that helped you! The Content is licensed under ...

6:08
Codereview: Fast circular buffer

8 views

1 year ago

John Hammond
Basic Buffer Overflow - VulnServer TRUN

To help support me, check out Kite! Kite is a coding assistant that helps you faster, on any IDE offer smart completions and ...

1:03:04
Basic Buffer Overflow - VulnServer TRUN

201,999 views

5 years ago

Ultimate Tech Hub
How To Fix Plex - Media Server Streaming Issues (2025)

These are the Top 8 Plex Media Server Issues with the 8 Simple Solutions! https://www.plex.tv/plex-pass/ Best Deals On NAS ...

8:31
How To Fix Plex - Media Server Streaming Issues (2025)

72,374 views

9 months ago

OpenSecurityTraining2
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

44:12
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

1,729 views

13 years ago

media.ccc.de
35C3 -  The Layman's Guide to Zero-Day Engineering

https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering A demystification of the exploit development ...

57:04
35C3 - The Layman's Guide to Zero-Day Engineering

44,408 views

7 years ago

AI and Healthcare
Can you kill a tumor cell?

Watch the full video with Dr. Thomas Seyfried ▶️ : https://www.youtube.com/watch?v=qa3j40c8iAo Hosted by Sanjay Juneja, ...

0:20
Can you kill a tumor cell?

1,697,147 views

2 years ago

OpenSecurityTraining2
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

26:15
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

2,178 views

13 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

59:07
Day 1 Part 3: Exploits1: Introduction to Software Exploits

6,725 views

13 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

1:17:34
Day 1 Part 1: Exploits 2: Exploits in the Windows Environment

13,612 views

13 years ago

OpenSecurityTraining2
Day 1 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

58:59
Day 1 Part 1: Exploits1: Introduction to Software Exploits

38,861 views

13 years ago

collaborate.je
Exploiting Buffer Overflows - by Paul Dutot

Workshop presented at collaborate.je Open Source Day, 11th Feb 2015 at the Digital Jersey Hub. Thanks to Paul Dutot of ...

43:55
Exploiting Buffer Overflows - by Paul Dutot

305 views

10 years ago

OpenSecurityTraining2
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

51:26
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

1,926 views

13 years ago

OpenSecurityTraining2
Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news ...

32:06
Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

1,155 views

13 years ago

IndiGo 6E
In-flight Services |  Cabin Crew | IndiGo 6E

Ready to take off, daily and non-stop. That's our ninjas on board. #goIndiGo.

0:19
In-flight Services | Cabin Crew | IndiGo 6E

27,648,383 views

3 years ago

Trend Zero Day Initiative
Highlights from Pwn2Own Vancouver  Day 1 - Team Theori vs VMware Workstation+LPE #shorts #pwn2own

pwn2own #0day Gwangun Jung and Junoh Lee from Theori combined an uninitialized variable bug, a UAF, and a heap-based ...

0:30
Highlights from Pwn2Own Vancouver Day 1 - Team Theori vs VMware Workstation+LPE #shorts #pwn2own

860 views

1 year ago

OpenSecurityTraining2
Day 2 Part 1: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

44:21
Day 2 Part 1: Exploits1: Introduction to Software Exploits

3,521 views

13 years ago