ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

13 results

UBC_CPSC_103 _screencasts
Module 5: How to Design Functions with arbitrary-sized data (example a)
3:27
Module 5: How to Design Functions with arbitrary-sized data (example a)

5,914 views

7 years ago

UBC_CPSC_103 _screencasts
Module 5: How to Design Functions for arbitrary-sized data (example b)

I forgot to put accord in quotes so it thinks it's a variable name but I intended it to be a string. You can see that my tests are running.

5:58
Module 5: How to Design Functions for arbitrary-sized data (example b)

6,634 views

7 years ago

Concepts Illuminated
The Verhoeff-Gumm Check Digit Algorithm #SoME3

Rediscover and explore the Verhoeff-Gumm algorithm, a check digit formula which is more resilient to common errors than the ...

17:00
The Verhoeff-Gumm Check Digit Algorithm #SoME3

197,152 views

2 years ago

kleines Filmröllchen
But how can it fit so much music? (The FLAC Codec #2 – Lossless Audio Compression)

UPDATE: Martijn van Beurden, one of the two authors of the IETF FLAC spec, has left a comment with some corrections and ...

28:43
But how can it fit so much music? (The FLAC Codec #2 – Lossless Audio Compression)

8,901 views

3 years ago

DEFCONConference
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

eBPF (or "extended" Berkeley Packet Filter) is a bytecode instruction set and virtual machine used as a safe computing ...

46:59
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

4,840 views

6 years ago

Sprouts
Positive and Negative Liberty: Who has more Freedom?

Learn the difference between negative liberty and positive liberty in this 5:58 minute video lesson. We often think of freedom as ...

5:58
Positive and Negative Liberty: Who has more Freedom?

84,917 views

2 years ago

DEFCONConference
smea - Adventures In Smart Buttplug Penetration testing - DEF CON 27 Conference

Analysts believe there are currently on the order of 10 billions Internet of Things (IoT) devices out in the wild. Sometimes, these ...

45:34
smea - Adventures In Smart Buttplug Penetration testing - DEF CON 27 Conference

140,059 views

6 years ago

LiveOverflow
Hacking into Google's Network for $133,337

In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...

31:32
Hacking into Google's Network for $133,337

1,076,049 views

4 years ago

nptelhrd
Mod-01 Lec-03 Language and Arbitrariness, Language and Dialect

Principles and Parameters in Natural Language by Prof.Rajesh Kumar,Department of Humanities and Social Sciences,IIT Madras.

56:11
Mod-01 Lec-03 Language and Arbitrariness, Language and Dialect

3,800 views

10 years ago

Media/Pool
Semiotics for Beginners

Here is a video outlining the key concepts involved when considering Semiotics. You can see a break down of what Semiology is, ...

3:15
Semiotics for Beginners

63,813 views

7 years ago

DEFCONConference
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections

Over the past few years, we have seen some novel presentations re-introducing the concept of HTTP request smuggling, ...

45:34
DEF CON 29 - Martin Doyhenard - Response Smuggling: Pwning HTTP 1 1 Connections

5,377 views

4 years ago

Ingenarel (NeoJesus)
Approaching Neovim The Right Way: Lua Crash Course

0:00 Sick 0:07 Docs 0:25 Lua types 1:09 Strings 1:35 Numbers 1:54 Boolean values and nil 2:05 Tables 3:28 Functions 3:55 ...

7:28
Approaching Neovim The Right Way: Lua Crash Course

214 views

5 months ago

Rahad Chowdhury
Firebase database takeover vulnerability | firebase exploit

Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...

4:47
Firebase database takeover vulnerability | firebase exploit

8,106 views

2 years ago