ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,228 results

Tech with Leens
Ports & Protocols Explained 🔌 | TCP vs UDP, HTTP, HTTPS & DNS for Beginners

Understanding ports and protocols is a core skill for networking and cybersecurity beginners. In this video, we break down: What ...

2:25
Ports & Protocols Explained 🔌 | TCP vs UDP, HTTP, HTTPS & DNS for Beginners

310 views

2 weeks ago

AXCP Protocol
AXCP Demo: Secure Multi-Agent AI Communication (Claude + Gemini + GPT) | AXCP Protocol

First working demonstration of AXCP (Adaptive eXchange Context Protocol), the secure communication layer for autonomous AI ...

5:38
AXCP Demo: Secure Multi-Agent AI Communication (Claude + Gemini + GPT) | AXCP Protocol

7 views

2 weeks ago

Dark Wire Labs
Developing own VPN protocol - Part 2

In today's video we're enhancing our VPN protocol by adding peer authentication and data encryption. If you missed Part 1, watch ...

14:32
Developing own VPN protocol - Part 2

5,488 views

2 weeks ago

Addie LaMarr
Diffie-Hellman: How to Share Secrets in Public

How the secure internet actually works (and why quantum breaks the rules) The truth about Diffie-Hellman, shared secrets, and ...

13:48
Diffie-Hellman: How to Share Secrets in Public

6,605 views

3 weeks ago

Banyan Tree Movies
The Singularity Protocol (Full Movie)

AI, War, and Humanity's Future. Please subscribe, like, comment & share. Share this film - help start the conversation on safe AI.

49:40
The Singularity Protocol (Full Movie)

1,498 views

2 weeks ago

Coin Bureau
Stripe, Google and Amazon Are Betting on Crypto Payments. Here's How to Profit

Recently, Stripe announced it would be integrating x402 payments on Base, and this suggests that crypto payments and the ...

19:27
Stripe, Google and Amazon Are Betting on Crypto Payments. Here's How to Profit

29,909 views

1 day ago

Security Cryptography Whatever
Obviously you have to do a string compare to do AES GCM in OpenSSL 3

From https://youtu.be/dEKBHI3rodY The Python cryptography module, pyca/cryptography, has mostly been a sane wrapper ...

0:15
Obviously you have to do a string compare to do AES GCM in OpenSSL 3

13,047 views

2 weeks ago

Nicolas Neira
Google ADK + A2A Protocol: How 7 AI Agents Build an IDP

🤖 Google ADK + A2A Protocol in action: 7 AI agents generate a complete Internal Developer Platform, with no human intervention ...

49:41
Google ADK + A2A Protocol: How 7 AI Agents Build an IDP

2,343 views

2 weeks ago

OpenSSL Foundation
How the OpenSSL community was built on Heartbleed

Before April 2014, OpenSSL was a backwater open source project with fewer than 10 regular contributors and 1 1/2 maintainers.

25:26
How the OpenSSL community was built on Heartbleed

21 views

2 weeks ago

GND STUDIO
[Subtitles] “Do I still look like a kid to you?” | Love in Protocol Ep.2

Love in Protocol (러브 인 프로토콜) Ep.2|GND Studio 📋 During a VR test for an emotional response experiment, Jeong-yeon is ...

8:35
[Subtitles] “Do I still look like a kid to you?” | Love in Protocol Ep.2

428,891 views

3 weeks ago

StatusCake
HTTP Uptime Test Explained: (Intermediate) Content Matching, Redirects & Headers StatusCake

Want your uptime monitoring to detect more than just “site up or down”? In this intermediate StatusCake tutorial, you'll learn how to ...

4:55
HTTP Uptime Test Explained: (Intermediate) Content Matching, Redirects & Headers StatusCake

7 views

3 weeks ago

TechKnowSurge
Computer Networking for Beginners: How the Internet Really Works (Easy to Understand!)

TechKnowSurge Membership ➡️ https://l.techknowsurge.com/membership-net101 A huge thanks to everyone for supporting the ...

1:27:41
Computer Networking for Beginners: How the Internet Really Works (Easy to Understand!)

198 views

3 weeks ago

DNSimple
TLSA Records: Creating Secure Connections Reliable

TLS certificates protect your connections every day, but how do you verify they're legitimate? TLSA records provide a powerful ...

6:44
TLSA Records: Creating Secure Connections Reliable

55 views

2 weeks ago

Techlore
Mac Owners: Hackers Hid Malware Inside a Google Ad This Week

No operating system is safe, and this week, Mac users got hit from three directions at once. We cover the attacks, Discord's messy ...

49:57
Mac Owners: Hackers Hid Malware Inside a Google Ad This Week

1,471 views

2 hours ago

Simon Gelo
I2S Protocol for ESP32

Learn how the I²S (Inter-IC Sound) protocol works on the ESP32 for digital audio applications. Resources: Wikipedia: ...

3:02
I2S Protocol for ESP32

423 views

2 weeks ago

CyberTeaches
Endpoint - Protocol & Email Security

U3L11 (4.5.1) - Endpoint - Protocol & Email Security focuses on endpoint security for protocols and email communications.

3:50
Endpoint - Protocol & Email Security

5 views

4 weeks ago

WilhelmTell
HelixNet EP.2: HTTPS in Development — Traefik, mkcert & /etc/hosts

Real HTTPS on localhost. No warnings. No workarounds. No excuses. In this episode we walk through the full local HTTPS setup ...

7:47
HelixNet EP.2: HTTPS in Development — Traefik, mkcert & /etc/hosts

28 views

2 weeks ago

ITSystemsAdmin
VMware\Omnissa Horizon Gateway Certificate (SSL/TLS) CA-signed Cert.

An Omnissa Horizon Gateway Certificate is an SSL/TLS certificate installed on the Unified Access Gateway (UAG) to secure ...

5:52
VMware\Omnissa Horizon Gateway Certificate (SSL/TLS) CA-signed Cert.

43 views

2 weeks ago

CryptoCobra
NEAR Protocol: Dead Coin or Next AI Crypto Giant?

NEAR Protocol is down 95% from its all-time high and Binance delisted one of its trading pairs… but while everyone panics, ...

4:07
NEAR Protocol: Dead Coin or Next AI Crypto Giant?

423 views

6 days ago

Astarte Cybersecurity
Scanning 17,000 Chrome Extensions for Security Issues with CRXaminer

Tool: https://crxaminer.tech/ You spend your time configuring HTTP headers and hardening your containers, meanwhile your CFO ...

22:57
Scanning 17,000 Chrome Extensions for Security Issues with CRXaminer

417 views

4 weeks ago