ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

550 results

GhostStrats
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

In this video, I take you on a trip to Walmart to find the perfect budget-friendly laptop for your cybersecurity and privacy needs.

7:59
Building a Budget-Friendly Private Cybersecurity Laptop Step by Step!

70,244 views

9 months ago

GhostStrats
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

This is a safety and awareness demo done only on hardware I own. I am not showing how to break into other people's computers.

5:10
Build a Tails Linux Wallet Drive – Boot Any Computer & Protect Your Privacy (Cheap & Easy DIY!)

13,591 views

2 months ago

Pat's Cyber Chronicles
Linux isn’t as secure as you think

In this video I rant about why Linux isn't as secure as you think.

9:54
Linux isn’t as secure as you think

448 views

5 months ago

Pat's Cyber Chronicles
Powershell is better than Bash on Linux

In this video I have a hot take about how Bash is worse than Powershell.

8:09
Powershell is better than Bash on Linux

1,181 views

4 months ago

Cyber SecGuru
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

CyberSec Guru: Mastering Windows & Linux Hardening" "OS Fortification: Windows & Linux Security Strategies" "The Cyber ...

57:55
Part - 13 - Secure Your Systems: Windows & Linux Hardening Essentials

22 views

4 months ago

GhostStrats
DIY Ghost Computers Explained: Why Privacy Is an Illusion in 2026

In this video, I explore the reality of modern privacy and why true anonymity on today's hardware is almost impossible. This is not ...

15:37
DIY Ghost Computers Explained: Why Privacy Is an Illusion in 2026

49,197 views

3 days ago

Pat's Cyber Chronicles
a realistic rant about the future of Linux

This is barely coherent bro.

16:31
a realistic rant about the future of Linux

6,553 views

9 months ago

Rodski
linux secure boot

linux secure boot.

2:02
linux secure boot

247 views

2 years ago

GhostStrats
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

In this video, I take a bunch of hidden flash drives and transform them into powerful cybersecurity tools. Follow along as I walk you ...

5:35
Turning Hidden Flash Drives into Powerful Cybersecurity Tools! | Tails, Kali Linux, and Parrot OS

10,637 views

9 months ago

GhostStrats
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

In this updated Ghost Laptop Build, I take everything I learned from my original video — along with your feedback from the ...

8:21
I Built the Ultimate Privacy Laptop (Ghost Laptop 2.0 Upgrade) Hardware Privacy & WiFi PenTesting!

33,070 views

9 months ago

ruth karen
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

Learn how to encrypt and decrypt files on Linux using OpenSSL in this tutorial. I covered the basics of encryption, demonstrated ...

12:29
ENCRYPTION AND DECRYPTION USING OPENSSL IN LINUX

54 views

9 months ago

GhostStrats
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

In this video, I explore the idea of building a ghost laptop — a system designed for maximum privacy and minimal traceability.

18:46
DIY Ghost Laptop UPDATED: Full Build Guide — And the Harsh Truth About Privacy!

273,525 views

7 months ago

9to5Linux
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based off Gentoo Linux, Pentoo is ...

10:08
Is Pentoo 2025 the BEST Hacking Distro? (Hands-On Tutorial)

1,223 views

1 year ago

Secure Solution
Log Forenix - Cyber Security Projects For Beginners  || The Terminal Boy

Welcome to log Forenix (Log + Forencis + Linux ) - Your Linux Forensic Artifacts Collector Tool! Forenix is a powerful shell CLI ...

4:24
Log Forenix - Cyber Security Projects For Beginners || The Terminal Boy

188 views

1 year ago

The Staying Up Show
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

In this video, I describe how to leverage the social engineering tool kit on Callie Lennox installed on a 100% free Amazon EC2 ...

8:48
How to Create a Spear Phishing Attack with Kali Linux! #tutorial #hacking #kali

78 views

5 months ago

GhostStrats
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

In this video, I share my top recommended tools for learning cybersecurity through hands-on experience. After over a year and a ...

22:00
Exploring Cybersecurity Tools: From Free DIY Gear to Advanced Tech – The Ultimate Starter Guide!

24,027 views

6 months ago

Anthony Thompson
Basic Pentest Vulnhub 1 with Kali Linux Walkthrough - 1 Brotherhood Empowered
13:24
Basic Pentest Vulnhub 1 with Kali Linux Walkthrough - 1 Brotherhood Empowered

6 views

1 month ago

Anthony Thompson
Basic Pentest Vulnhub 1 with Kali Linux Walkthrough - 1 Brotherhood Empowered
9:50
Basic Pentest Vulnhub 1 with Kali Linux Walkthrough - 1 Brotherhood Empowered

11 views

1 month ago