Get Ghidra: https://ghidra-sre.org/ Streamers: https://www.twitch.tv/syrillian https://www.twitch.tv/malwaretechblog https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw (John Hammond) https://www.youtube.com/watch?v=Ml8bfFs_Tp8 gamozolabs -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #MakingOf #LiveStream
Views: 71604 LiveOverflow
Hang with our community on Discord! https://discord.gg/Kgtnfw4 If you would like to support me, please like, comment & subscribe, and check me out on Patreon: https://patreon.com/johnhammond010 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 14827 John Hammond
Category: Reverse Engineering Type: Flag Facebook: http://facebook.com/TheNittam Twitter: http://twitter.com/TheNittam Website: http://Nirmaldahal.com.np/ Website: http://IAmNir.ml/ Website: http://EminenceWays.com/
Views: 447 #Nittam
In this introduction to Ghidra we will find the source code of a simple executable without reading any assembly code! Pull apart an EXE with Ghidra (NSA Tool). Subscribe now https://goo.gl/EG1EPH We will also look at some more difficult executables and learn a little about the exe file format and what to look for. We can blame John Hammond and the PWD challenge. They get way more into the Assembly than I. His Videos are worth a look. They find exploits and do lots of geeky things. Want to know about the EXE header segments ? http://www.hexacorn.com/blog/2016/12/15/pe-section-names-re-visited/ Want an alternative to Ghidra ? https://reverseengineering.stackexchange.com/questions/1817/is-there-any-disassembler-to-rival-ida-pro Tools used in this video https://www.abyssmedia.com/scriptcryptor/ https://upx.github.io/ https://www.rarlab.com/download.htm Please subscribe, ring the bell and share this video. (and comment) This Video brought to you by the Virus Doctor. You will get a 15% discount on a course if you use coupon code Mickyj15. https://www.thevirusdoc.com/ Mickyj Whitehat playlist https://www.youtube.com/watch?v=gzfxJqU9sVQ&list=PLodEQVE4Lw01mtCM_LAn6e0tPNd5BfERv Subscribe to my email list and I will send you a PDF of my top 10 tools for pulling a part Malware (find the email hat on www.mickyj.com) Check out the Mickyj whitehat Merch at https://shop.spreadshirt.com.au/mickyj-whitehat Show your support by joining in this competition https://youtu.be/1fmY0SS4HKQ Also, feel free to send my video advert out to your friends. This advert gives enough detail to help the people with a keen interest join the community. https://youtu.be/Dqp_ve_aR4o Help give this channel a fighting chance ! Please share in your community, forums, user groups and blogs ! ** To help fund this adventure, here are some of the products I recommend. ** Antivirus on Amazon "TREND MICRO INTERNET SECURITY 2019 | 3 PC's | 1 Year | PC | Registration code - No CD" https://amzn.to/2TBrboR Book on Amazon "The Hacker Playbook 3: Practical Guide to Penetration Testing" https://amzn.to/2TB0Res I recommend Sonicwall firewalls and this Book on Amazon "Configuring SonicWALL Firewalls" https://amzn.to/2TEUJBT Software on Amazon "Webroot Antivirus with Spy Sweeper Personal Edition" https://amzn.to/2THS6zk Tools used - virustotal - Hybrid-analysis - HexRays /IDA - Process Hacker - Process Monitor - Wireshark - many more specific to each video ..........: About the music :.......... Music Provided by the Following Rock Intro 3 by Audionautix is licensed under a Creative Commons Attribution licence (https://creativecommons.org/licenses/) Artist: http://audionautix.com/
Views: 17897 Michael Jenkin
baXplays Room 5 of Cypher. It's an Enigma. We're doing the whole game live on Twitch. Join the fun!: www.twitch.tv/baXcast Support and Subscribe!
Views: 278 baXcast
This channel is also known as TechCashHouse. GET A Chance To WIN $100 BITCOIN EACH MONTH By 1. liking video! 2. SUBSCRIBE! 3. share! 4. COMMENT: Bitcoin Forever I'll announce a winner at the end of the month! DONATE BITCOIN AND CRYPTO BELOW! Every donation helps us a TON. Keep CRYPTO STRONG! BTC: 1C9mBcYTnCn3yQ5bJY3pQDGRrmkPSLSfY4 ETH: 0xc6e3BED82529CB4E8617BB72b48F7eB43F14a580 BCH: qz60tw39r7zewcr5uk0l2zt8hc82v436uvmj0mdc0d LTC: LVbXBQTUD34GzmkdoDfJEqiBuMzxjEU17d PayPal Donation Link: [email protected] WANT FREE STOCK? Sign Up With This Link!: https://acorns.com/invite/FE2UTU Subscribe to the TechCashHouse to learn everything you need to know about bitcoin, bitcoin news, cryptocurrencies, stocks, investing, and more! Manage your cash, and be informed. Let's grow wealthy together. Articles: #julianassange #assangebitcoin #bitcoin NEW CHANNELS: TechStockHouse: https://www.youtube.com/channel/UC8IzbdgN-IDXlWH0dNdgGag TechCryptoHouse: https://www.youtube.com/channel/UCp7Gqpl9Kqiggr_Rs03X5pA Pledge $1 and BECOME A TECHCASHHOUSE DWELLER TODAY! https://www.patreon.com/techcashhouse THE NEW TWITTER: STOCK POLLS, NEWS, ETC. https://twitter.com/TechCrackHouse_ Buy, sell, what should be done? Keep it tuned right here on the TechCashHouse for news, tips, and the best ways to invest. Please subscribe and like, it helps a lot. BECOME A CASHHOUSE DWELLER TODAY! Robinhood Download Links: IOS: https://itunes.apple.com/us/app/robinhood-free-stock-trading/id938003185?mt=8 Android: https://play.google.com/store/apps/details?id=com.robinhood.android&hl=en Robinhood Main-page: https://www.robinhood.com/ Acorns Download Links: IOS: https://itunes.apple.com/us/app/acorns-invest-spare-change/id883324671?mt=8 Android: https://play.google.com/store/apps/details?id=com.acorns.android&hl=en&gl=us Acorns Main-page: https://www.acorns.com/ I AM IN NO WAY A MARKET PROFESSIONAL; USE YOUR OWN JUDGEMENT WHEN PURCHASING STOCKS AND OTHERWISE. I AM NOT RESPONSIBLE FOR AND GAINS OR LOSSES THAT YOU MAY EXPERIENCE. THE MARKET IS INHERENTLY RISKY, AND YOU SHOULD ONLY INVEST WHAT YOU ARE COMPLETELY WILLING TO LOSE. QUOTATIONS APPEARING IN VIDEO TITLES AND OTHERWISE ARE MY OWN OPINIONS; THEY ARE IN NO WAY RELATED TO OPINIONS OF INDUSTRY EXPERTS. VIDEO TITLES ARE MY OWN OPINION AND SHOULD NOT BE TAKEN AS FACTUAL OR AT FACE VALUE. I CURRENTLY HOLD INVESTMENTS IN STOCKS, BONDS, AND CRYPTOCURRENCIES. I IN NO WAY PROMOTE ICOS. ICOS ARE HIGH RISK, SPECULATIVE INVESTMENTS THAT CAN BE PROMOTED BY BAD ACTORS. FOR THIS REASON, IT IS CRITICAL TO SEEK ADVISE FROM A LICENSED FINANCIAL PROFESSIONAL BEFORE INVESTING IN ICOS AND CRYPTO IN GENERAL. NOT DOING SO CAN PUT YOU AT FINANCIAL RISK. I AM NOT A LICENSED FINANCIAL PROFESSIONAL, I AM A PUBLIC FIGURE EXPRESSING MY OWN OPINIONS THROUGH THE YOUTUBE PLATFORM. NOTHING STATED IN VIDEOS IS ADVICE, AND SHOULD NOT BE TAKEN AS ADVICE. INVEST IN ANY ASSET AT YOUR OWN RISK, AND AS ALWAYS, ONLY INVEST WHAT YOU ARE COMPLETELY WILLING TO LOSE.
Views: 1650 TechCashHouse - Best Bitcoin, Stock News
Latest Technology news update for Thursday October 20th 2016
Views: 385 Learn Windows 10 and Computers
In her Mathematics Research Center Public Lecture, “Breaking Codes and Finding Patterns,” Professor Susan Holmes will discuss what we can learn from the master codebreakers who solved the intricacies of the Enigma encryption machine during World War II and how to leverage patterns using mathematics and statistics.
Views: 8517 Stanford
Today we crack keyGme from the website crackmes.one. This file is intentionally made to be cracked and a keygen created. Download and follow along!! keyGme Direct Link: https://crackmes.one/crackme/5c268e8333c5d41e58e00654 commands to run 32 bit app on 64 bit machine: sudo dpkg --add-architecture i386 Then: sudo apt-get update sudo apt-get install libc6:i386 libncurses5:i386 libstdc++6:i386 keyGme Python Pastebin Link: https://pastebin.com/ZUmgU4qE Thanks for watching!
Views: 6949 Sooner Bourne
Learn how To Profit From Bitcoin & Other Stocks, Click Here! https://www.tradegeniusacademy.com Take Advantage Of Their End of the month 50% off sale! PATREON LINK: https://www.patreon.com/thecommonsenseshow CHECK OUT OUR WEBSITE: https://thecommonsenseshow.com A WORD FROM OUR SPONSORS: Protect Your Information From Big Data - Click Here! http://www.hidewithdave.com Start Your Free Trial Today! Stock Up On Survival Food Today! Click Here - http://www.preparewithdave.com Protect Your Cash W/ Gold Download A Free Book How! - Click Here - https://get.noblegoldinvestments.com/gold-ira-guide/?offer_type=gold&affiliate_source=affiliate_dave_hodges Life Change Tea - Rid Your Body From Toxins! https://www.getthetea.com Manage Pain with With Denas Pain Relief! http://www.denaspainreliefstore.com/denas-pcm-6.html
Views: 1812 The Common Sense Show
Most people know the Shadow Brokers leaked (supposedly) stolen NSA cyber tools, which lead to some of the most significant cyber security incidents of 2017. But in addition to targeting NSA, the Shadow Brokers have also targeted a few individuals in our community. Hear about the history of the Shadow Brokers and the implications of their actions for infosec and DFIR from one of the group’s targets. Have something you absolutely wanted to know about this great spy vs. spy saga, but were afraid to ask? This is your chance! Jake Williams (@MalwareJake), Senior Instructor, SANS Institute When a complex cyber attack put a private equity investment of more than $700 million on hold, the stakes couldn't have been higher. But that's exactly the kind of challenge that motivates Jake Williams, a computer science and information security expert, U.S. Army veteran, certified SANS instructor and co-author of FOR526: Memory Forensics In-Depth and FOR578: Cyber Threat Intelligence. To help mitigate the attack, Jake plied his information security expertise, discovered that not one but three different attackers had compromised the firm's network, and went about countering their moves. Jake relishes the idea of meeting adversaries on the cyber battlefield. "I went into this field because I wanted a challenge," he says. "Infosec is like a game of chess to me. The attacker plays their moves and you play yours." Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. "I am immensely proud of the things I've accomplished," Jake says. "I'm positive the world is a safer place because of my work." Today, Jake runs a successful Infosec consultancy. He's been involved in high-profile public sector cases including the malware analysis for the 2015 cyber attack on the Ukraine power grid. He's also tackled a variety of cases in the private sector. In one, Jake discovered attackers compromising a custom service the client had distributed to all its endpoints. Leveraging experience and insight with advanced persistent threats helped Jake "think like the attacker" and determine the attacker's likely hiding spots.
Views: 2088 SANS Digital Forensics and Incident Response
In this video we will look at reverse engineering and hacking the firmware encryption used on Moxa industrial control gateways using Ghidra. Links: Twitter: https://twitter.com/ghidraninja Moxa W2150A: https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/wireless-device-servers/nport-w2150a-w2250a-series AES ECB: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)
Views: 30259 Ghidra Ninja
This channel is also known as TechCashHouse. GET A Chance To WIN $100 BITCOIN EACH MONTH By 1. liking video! 2. SUBSCRIBE! 3. share! 4. COMMENT: Bitcoin Forever I'll announce a winner at the end of the month! DONATE BITCOIN AND CRYPTO BELOW! Every donation helps us a TON. Keep CRYPTO STRONG! BTC: 1C9mBcYTnCn3yQ5bJY3pQDGRrmkPSLSfY4 ETH: 0xc6e3BED82529CB4E8617BB72b48F7eB43F14a580 BCH: qz60tw39r7zewcr5uk0l2zt8hc82v436uvmj0mdc0d LTC: LVbXBQTUD34GzmkdoDfJEqiBuMzxjEU17d PayPal Donation Link: [email protected] WANT FREE STOCK? Sign Up With This Link!: https://acorns.com/invite/FE2UTU Subscribe to the TechCashHouse to learn everything you need to know about bitcoin, bitcoin news, cryptocurrencies, stocks, investing, and more! Manage your cash, and be informed. Let's grow wealthy together. Articles: #bitcoin #johnmcafee #bitcoinmcafee NEW CHANNELS: TechStockHouse: https://www.youtube.com/channel/UC8IzbdgN-IDXlWH0dNdgGag TechCryptoHouse: https://www.youtube.com/channel/UCp7Gqpl9Kqiggr_Rs03X5pA Pledge $1 and BECOME A TECHCASHHOUSE DWELLER TODAY! https://www.patreon.com/techcashhouse THE NEW TWITTER: STOCK POLLS, NEWS, ETC. https://twitter.com/TechCrackHouse_ Buy, sell, what should be done? Keep it tuned right here on the TechCashHouse for news, tips, and the best ways to invest. Please subscribe and like, it helps a lot. BECOME A CASHHOUSE DWELLER TODAY! Robinhood Download Links: IOS: https://itunes.apple.com/us/app/robinhood-free-stock-trading/id938003185?mt=8 Android: https://play.google.com/store/apps/details?id=com.robinhood.android&hl=en Robinhood Main-page: https://www.robinhood.com/ Acorns Download Links: IOS: https://itunes.apple.com/us/app/acorns-invest-spare-change/id883324671?mt=8 Android: https://play.google.com/store/apps/details?id=com.acorns.android&hl=en&gl=us Acorns Main-page: https://www.acorns.com/ I AM IN NO WAY A MARKET PROFESSIONAL; USE YOUR OWN JUDGEMENT WHEN PURCHASING STOCKS AND OTHERWISE. I AM NOT RESPONSIBLE FOR AND GAINS OR LOSSES THAT YOU MAY EXPERIENCE. THE MARKET IS INHERENTLY RISKY, AND YOU SHOULD ONLY INVEST WHAT YOU ARE COMPLETELY WILLING TO LOSE. QUOTATIONS APPEARING IN VIDEO TITLES AND OTHERWISE ARE MY OWN OPINIONS; THEY ARE IN NO WAY RELATED TO OPINIONS OF INDUSTRY EXPERTS. VIDEO TITLES ARE MY OWN OPINION AND SHOULD NOT BE TAKEN AS FACTUAL OR AT FACE VALUE. I CURRENTLY HOLD INVESTMENTS IN STOCKS, BONDS, AND CRYPTOCURRENCIES. I IN NO WAY PROMOTE ICOS. ICOS ARE HIGH RISK, SPECULATIVE INVESTMENTS THAT CAN BE PROMOTED BY BAD ACTORS. FOR THIS REASON, IT IS CRITICAL TO SEEK ADVISE FROM A LICENSED FINANCIAL PROFESSIONAL BEFORE INVESTING IN ICOS AND CRYPTO IN GENERAL. NOT DOING SO CAN PUT YOU AT FINANCIAL RISK. I AM NOT A LICENSED FINANCIAL PROFESSIONAL, I AM A PUBLIC FIGURE EXPRESSING MY OWN OPINIONS THROUGH THE YOUTUBE PLATFORM. NOTHING STATED IN VIDEOS IS ADVICE, AND SHOULD NOT BE TAKEN AS ADVICE. INVEST IN ANY ASSET AT YOUR OWN RISK, AND AS ALWAYS, ONLY INVEST WHAT YOU ARE COMPLETELY WILLING TO LOSE.
Views: 3826 TechCashHouse - Best Bitcoin, Stock News
How powerful and far-reaching is the National Security Agency’s (NSA) Google-like search engine, known as XKeyscore? Alexey Yaroshevsky examines the facts from the Edward Snowden leaks and looks into how the engine is used to search for specific online communications. Find RT America in your area: http://rt.com/where-to-watch/ Or watch us online: http://rt.com/on-air/rt-america-air/ Like us on Facebook http://www.facebook.com/RTAmerica Follow us on Twitter http://twitter.com/RT_America
Views: 17067 RT America
One of the best ways to safeguard your accounts is by using something called two-factor authentication. But even that is not perfect. Kevin Mitnick, hacker and author of the book "The Art of Invisibility," explains how someone might use social engineering to get your security code and gain access to your private information. Read more: http://www.businessinsider.com/sai FACEBOOK: https://www.facebook.com/techinsider TWITTER: https://twitter.com/techinsider INSTAGRAM: https://www.instagram.com/businessinsider/ TUMBLR: http://businessinsider.tumblr.com/
Views: 397634 Tech Insider
New reports on the leaked NSA documents claim the agency exploited security flaws in mobile app stores instead of publicizing the vulnerabilities. Follow Kate Grumke: http://www.twitter.com/kgrumke See more at http://www.newsy.com Transcript: Yet another NSA program detailed in documents leaked by Edward Snowden is making headlines today. The NSA, along with spy agencies from several other countries, reportedly developed a plan to exploit weaknesses in several app stores to collect data on suspected terrorists. New documents published by CBC and The Intercept Wednesday detail a program dubbed "Irritant Horn," a combined effort from the U.S., Canada, U.K., New Zealand and Australia. The program targeted vulnerabilities in UC Browser, an incredibly popular app in China and India run by e-commerce giant Alibaba. It also sought ways to access information through Google and Samsung's servers. It doesn't appear the companies were informed of the weaknesses, which left open the possibility for hackers and criminals to exploit the same vulnerabilities, as well as other government agencies. It appears the program began after vulnerabilities in UC Browser were discovered in 2011. The documents detail what's called a "man-in-the-middle" attack to collect data and even plant spyware on some smartphones. It's a method sometimes used by hackers to commit fraud. The NSA has been accused of letting security vulnerabilities go unchecked in the past. Bloomberg published a report last year that accused the agency of knowing about the infamous "Heartbleed" security vulnerability for two years and exploiting it. For its part, the government denied that report, and the director of National Intelligence later released a statement saying, when a weakness is discovered, "it is in the national interest to responsibly disclose the vulnerability." But it did include the caveat "unless there is a clear national security or law enforcement need." A source from Alibaba told CBC the company was never contacted by any of the agencies involved about UC Browser's vulnerability and said it wasn't aware any user data had been leaked. This video includes images from Getty Images. Sources: Getty Images http://www.gettyimages.com/detail/news-photo/navy-admiral-michael-rogers-commander-of-the-u-s-cyber-news-photo/466108154 Getty Images http://www.gettyimages.com/detail/news-photo/in-this-handout-photo-provided-by-the-guardian-edward-news-photo/170248179 The Intercept https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/ CBC http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546 Getty Images http://www.gettyimages.com/detail/news-photo/participant-looks-at-lines-of-code-on-a-laptop-on-the-first-news-photo/136135707 Bloomberg http://www.bloomberg.com/news/articles/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers Getty Images http://www.gettyimages.com/detail/news-photo/director-of-national-intelligence-james-clapper-speaks-at-news-photo/464967098 Office of the Director of National Intelligence http://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news-story-that-nsa-knew Alibaba https://www.youtube.com/watch?t=21&v=X9eToqxqz7Y Image via: Getty Images / Chip Somodevilla http://www.gettyimages.com
Views: 534 Newsy Tech
Stop Google Tracking Your Phone! Defcon 26: Voting Machines Hacked, New Hotel Room Searches in Vegas, Best TVs of 2018. ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆ 00:55 Vegas Now Searches Hotel Rooms Do you travel in Vegas? There are new security policies at many hotels, that, to quote ArsTechnica, “mandated room searches when staff had not had access to rooms for over 24 hours.“ It was scary. https://arstechnica.com/tech-policy/2018/08/security-theater-meets-def-con-as-room-searches-spark-controversy/ 06:12 Defcon 26: Lots of Security Flaws Announced Millions of Android devices have flaws baked into the firmware that allow for potential exploits, such as someone listening to your microphone, take screenshots, or locking your device. Medtronic fixed flaws in some of their pacemakers, but attackers can still remotely attack other models. If your company uses Apple's Device Enrollment Program (or Mobile Device Management), you want to run High Sierra 10.13.6 or higher, Trend Micro found two dozen vulnerabilities in Crestron devices, flaws in Square, SumUp, iZettle, and Paypal mobile credit card readers were publicized by Positive Technologies, they're pretty serious and vendors are working on them. https://www.wired.com/story/android-smartphones-vulnerable-out-of-the-box/ https://www.wired.com/story/pacemaker-hack-malware-black-hat/ https://www.wired.com/story/mac-remote-hack-wifi-enterprise/ https://www.wired.com/story/crestron-touchscreens-could-spy-on-hotel-rooms-and-meetings/ https://www.wired.com/story/bugs-in-mobile-credit-card-readers-could-leave-buyers-exposed/ 11:17 Defcon 26: Voting Machine Village One team cracked a voting machine in under 15 minutes. In another hack, an 11 year old was able to change election results on a replica website in under 10 minutes. Scared? Find out what the Association of Secretaries of State said in the video. https://www.cnet.com/news/us-officials-hope-hackers-at-defcon-find-more-voting-machine-problems/ http://time.com/5366171/11-year-old-hacked-into-us-voting-system-10-minutes/ 13:51 Should I Buy This 4K TV??? Kris emailed, "Thought I'd ping you for your sage TV wisdom and advice. Any reason not to buy the LG 65 C8 for $2800?" Nope.... LG's C8 is pretty impressive (though not a huge leap over some other OLED models, we explain in the video, and discuss the best deal 4K UHD HDR TVs you can buy: TCL's 55" and 65" 6 series! https://amzn.to/2OGRHa9 https://amzn.to/2OGRrrB 17:46 Google Tracks You Like It Or Not The AP reported earlier this week that, yes, Google tracks you even if you turn off location history. Or, in their words, "many Google services on Android devices and iPhones store your location data even if you’ve used a privacy setting that says it will prevent Google from doing so." We walk you through turning it off in the video! https://www.apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not 22:08 Google Backup Codes If you have 2FA on your gmail account… make sure you have backup codes somewhere you can get to them if you lose or destroy your phone. You can pick up a cheap phone just about anywhere, but getting locked out of email sucks! https://support.google.com/accounts/answer/1187538?co=GENIE.Platform%3DDesktop&hl=en 24:15 Hak5!!! A big Thank You to Hak5 for the studio space! Check out the security and privacy podcasts at hak5.org, then check out the superior pentesting and USB automation tools over at hak5.org/gear! hak5.org 24:50 Do Something Analog Like Build A Pair of Headphones!!! Props to Patrick's friends Nick and Jude, who noticed that most gaming headsets kinda suck then starting building their own... deets in the video, head over to Vokyl.io to sign up for info about the Indiegogo! https://vokyl.io/sd/ ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆ Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn't be able to make the show for you every week! https://www.patreon.com/tekthing EMAIL US! ➳ [email protected] SUPPORT: Amazon Associates ➳ https://amzn.to/2pHgf8T Subscribe ➳ https://www.youtube.com/tekthing Website ➳ http://www.tekthing.com RSS ➳ http://feeds.feedburner.com/tekthing Patreon ➳ https://www.patreon.com/tekthing Help us with translations! ➳ http://www.youtube.com/timedtext_cs_panel?c=UC6sWaC11f4mxnizvOroOvkQ&tab=2 THANKS! HakShop ➳ https://hakshop.myshopify.com/ Dale Chase Music ➳ http://www.dalechase.com/ SOCIAL IT UP! Twitter ➳ https://twitter.com/tekthing Facebook ➳ https://www.facebook.com/TekThing Reddit ➳ https://www.reddit.com/r/tekthingers HOSTS: Shannon Morse ➳ https://www.twitter.com/snubs / https://www.youtube.com/shannonmorse Patrick Norton ➳ https://www.twitter.com/patricknorton ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
Views: 14691 TekThing
Want more? Enroll in the full course at: https://www.udemy.com/the-complete-cryptocurrency-course-more-than-5-courses-in-1/?couponCode=WB73018CCC Here are more details on the full 24 hour version of this Comprehensive COMPLETE Cryptocurrency Course! I guarantee that this is THE most thorough cryptocurrency course available ANYWHERE on the market - or your money back (30 day money back guarantee). This course and the many exercises in this course are for beginner or advanced users in any country! By an Award Winning MBA professor who is a top selling online business teacher, top selling author, former Goldman Sachs employee, Columbia MBA (finance major) and venture capitalist who has invested in and sat on the boards of cryptocurrency companies since 2013 and a hedge fund industry veteran and founder. He is also the author of the #1 best selling business course on Udemy. THIS COMPLETE CRYPTOCURRENCY COURSE is 5+ courses in 1! Cryptocurrency Investing Cryptocurrency Mining Cryptocurrency Wallets Cryptocurrency Exchanges Blockchain Creating a Diversified Portfolio & Much More! Also included in this course is a very comprehensive Excel spreadsheet that contains more than 30 Cryptocurrency exercises to help you learn everything you need to know about cryptocurrencies (whether you are a beginner or an advanced user). No prior cryptocurrency or finance or accounting or tech or Excel experience is required to take this course. We Will Cover More than 10 Cryptocurrencies in this Course (and how to buy & sell each one, what are the pros and cons of each one & how to mine each one): Bitcoin Ethereum Ripple Litecoin Monero Zcash Dash NEO Cardano Stellar ...and more (this course will constantly be updated with more cryptocurrencies) We Will Cover More than 5 Wallets in this Course (how to set one up, the pros & cons of all 5 wallet types and how to transfer money between them): QR Code Wallets Four USB Wallets (Trezor. Ledger Nano S, DigitalBitBox & KeepKey) Coinbase Electrum Blockchain ...and more (this course will constantly be updated with more wallets) We Will Cover the More than 5 Exchanges in this Course (how to transact with each one): GDAX Poloniex Kraken Bittrex Gemini Binance ...& more (this course will constantly be updated with more exchanges) Here Are Some More Topics That We Will Cover In This Course: The Future of Money & What is Blockchain? Introduction to 10+ Cryptocurrencies (Mining, Investing & Much More) Create an Investment Portfolio of Cryptocurrencies Understand What Makes a Great Cryptocurrency as A Great Long-Term Investment Introduction to 5+ Wallets to Use to Store Your Cryptocurrencies Introduction to 5+ Exchanges to Use to Buy or Sell Cryptocurrencies Introduction to Mining & Building a Mining PC from Scratch! Cryptocurrency Investment Framework (made in Excel) Watching out for Scams & Managing Risk What Are the Biggest Mistakes New Investors Make in Cryptocurrencies? How to Identify the Next Great Cryptocurrency (What to Look For & Watch Out For) When Should You Buy or Sell a Cryptocurrency? How Do You Read Charts & Look for Buy or Sell Signals What Makes a Great Wallet (What to Look For From Researching a Wallet) Introduction to ICOs + What Makes a Great ICO (What To Look For From Researching An ICO More than 100 Great Online Cryptocurrency Resources You can use the comprehensive Excel exercise document in this course on a Mac or on a PC (I recommend having Excel version 2013 or later in order to complete all of the cryptocurrency exercises in this course). This course and the included comprehensive Complete Cryptocurrency Excel dashboard exercise file is a roadmap for your personal & technical/finance cryptocurrency success. All of the tools you need to be successful with cryptocurrencies are included in this course & the entire course is based on real life Practical Knowledge and experience & not based on theory. Please click the take this course button so you can take your cryptocurrency skills to the next level. Requirements: No prior technology or cryptocurrency or finance or accounting or Excel experience is required to take this course. Please note that Excel 2013 (or a newer version) is recommended in order to complete some of the exercises in this course. The Excel exercises in this course work on the Windows and Mac versions of Excel. Who is the target audience? Anyone in ANY country interested in learning EVERYTHING about cryptocurrency can take this course as this 23+ hour COMPLETE course is 5+ courses in 1 (1: Investing, 2: Mining, 3: Wallets, 4: Blockchain , 5: Transacting, 6: Creating a Diversified Portfolio & Much More!) *** Again, I guarantee that this is THE most thorough cryptocurrency course available ANYWHERE on the market - or your money back (30 day money back guarantee). *** Enroll in the full course at: https://www.udemy.com/the-complete-cryptocurrency-course-more-than-5-courses-in-1/?couponCode=WB73018CCC Thanks, Chris Haroun
Views: 15481 Chris Haroun Ventures/Complete Business Education
Rapid Ransomware which began attacks in early January continues to encrypt your data in realtime even after completing its initial cycle of destruction. ------------------------------------------- Thanks for watching! If you like what you see, check out the links below. Patreon: https://www.patreon.com/tpsc Forum: https://forum.thepcsecuritychannel.com/ Twitter: https://twitter.com/leotpsc Facebook: https://www.facebook.com/tpscyt
Views: 12318 The PC Security Channel [TPSC]
Welcome to this sponsored interview with Christian from Opiria! The idea is that users can earn money from their data! We're discussing their project, team idea, challenges and technical solution. Write in the comments what you think about this project! https://opiria.io/static/docs/Opiria-PDATA-Whitepaper.pdf DISCLAIMER: This is NOT financial advice. This is just my opinions. I am not responsible for any investment decisions that you choose to make.
Views: 3593 Ivan on Tech
Hey guys! HackerSploit here back again with another video, in this video, I am joined by Amr Thabet, he is malware researcher. He used to work in Symantec in their Attack Investigation Team dealing with major attacks from NSA like Region and Stuxnet (he was one of the people who converted part of it to its source code) he also worked on the North Korean Attacks, the China Attacks on US corporations and much more. He was a speaker in multiple conferences including DEFCON, Virus Bulletin University of Sydney and he will be making a couple of videos with us on the channel. The purpose of this video is to give you an experts point of view so that you have a clearer picture of how it all works. Amt Thabet's Links: Maltrak: https://maltrak.com/malware_analysis_webinar LinkedIn: https://www.linkedin.com/in/amrthabet/ Twitter: https://twitter.com/Amr_Thabet 🔗 HackerSploit Website: https://hsploit.com/ ⭐Help Support HackerSploit by using the following links: 🔗 NordVPN: https://nordvpn.org/hacker Use the link above or the code below for 77% Off your order Promo Code: hacker Patreon: http://patreon.com/hackersploit I Hope you enjoy/enjoyed the video. If you have any questions or suggestions feel free to ask them in the comments section or on my social networks. 🔗 HackerSploit Website: https://hsploit.com/ 🔹 Support The Channel NordVPN Affiliate Link: https://nordvpn.org/hacker Patreon: http://patreon.com/hackersploit 🔹 Get Our Courses Get a special discount on our courses: The Complete Deep Web Course 2018: https://www.udemy.com/the-complete-deep-web-course-2017/?couponCode=DWCBP2017 🔹 SOCIAL NETWORKS - Connect With Us! ------------------------------- Facebook: https://www.facebook.com/HackerSploit/ Twitter: https://twitter.com/HackerSploit Instagram: https://www.instagram.com/hackersploit/ Patreon: http://patreon.com/hackersploit -------------------------------- Thanks for watching! Благодаря за гледането Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Grazie per la visione Gracias por ver شكرا للمشاهدة دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद #Hacking#MalwareAnalysis#CTF
Views: 6955 HackerSploit
https://media.ccc.de/v/35c3-9576-35c3_infrastructure_review Up and to the right: All the statistics about this event you could wish for 35C3 is run by teams of volunteers. In this event, they will provide some insight into the challenges they faced while building the GSM, DECT and IP networks, running video streams, or organizing ticket sales. All graphs will be pointing up and to the right. OCs of 35C3 https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9576.html
Views: 4607 media.ccc.de
The NSA "routinely" shares Americans' data with Israel, reports say... This clip from the Majority Report, live M-F at 12 noon EST and via daily podcast at http://Majority.FM Subscribe to us on YouTube: http://youtube.com/user/SamSeder
Views: 1374 The Majority Report w/ Sam Seder
🚀 Get the Apps! ★ http://cryptoyum.com ★ http://coinpuffs.com 10 Days of Bitcoin: 💯 Free Email Course! ★ http://10daysofbitcoin.com Twitter is joining the censorship party, just like Facebook and Google. // GET STARTED 🚀 Become a Cryptonaut - Support us on http://patreon.com/pub 💻 Join us at the PUB! - http://thebitcoin.pub 💰Get a Coinbase Wallet! - http://dctv.co/dctv-coinbase - Sign up! // WE DO SOCIAL 🔑 Decentralized Newsletter - https://dctv.co/dctv-news 📔 Twitter - https://dctv.co/dctv-twitter 📔 Facebook - https://dctv.co/dctv-fb 🔑 Instagram - https://dctv.co/dctv-instagram 💻 Google+ - https://dctv.co/dctv-googleplus ✏️ LinkedIn - https://dctv.co/dctv-linkedin 💻 Medium - https://dctv.co/dctv-medium Music by Charles Giovanniello, a Bitcoin Pub community member! Note: This is not financial advice as all investing is speculative. Have fun and good luck!
Views: 3618 Decentralized TV
When we heard Hack All The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure. More info at: http://Exploitee.rs Follow us at: @Exploiteers
Views: 977566 The Exploiteers
Locked Shields 2016 is the biggest and most advanced international live-fire cyber defence exercise in the world. Over 550 people and a total of 26 nations are involved in Locked Shields 2016. 20 Blue Teams representing 19 nations and NATO Computer Incident Response Capability (NCIRC) were tasked to maintain the networks and services of a fictional country, Berylia under intense pressure. This includes handling and reporting incidents, solving forensic challenges as well as responding to legal, media and scenario injects.
Views: 4935 sodurileht
👇Business Inquiries [email protected] 👉Cryptocurve https://cryptocurve.io/ is a new digital asset that plans to offer a one-stop-shop to any cryptocurrency investor. It is not the only asset trying to do something similar, bringing a new user-interface that has a multitude of capabilities. Fronted by an all-star core team I am personally interested in using this application and it seems they are only after the very serious investors with a 100 ether minimum (as far as I can see). Still, as with most other assets it looks really good. Time will tell how successful their funding campaign will be and what features get released and when - it is still very early in development. If you'd like to stay updated with Cryptocurve make sure to check out their twitter and follow any other social media platforms they use! https://twitter.com/crypto_curve Previously on CRC: European Parliament went on record today (July 3rd) generally speaking positively yet realistically about cryptocurrencies and digital assets. The positivity is surrounding their statements that blockchain technology deserves widespread recognition for the inherent benefits it brings. The realistic part is saying that cryptocurrencies fall short of replacing traditional systems (I.E FIAT!!!) due to a number of reasons (key one being volatility). In short: Do not underestimate the power this market has to revolutionize a variety of different industries, funneling big data into useful tools while increasing speed, transparency, and efficiency like nothing before it. Bitcoin (BTC) fell below $6k and $5,800 was bottom. Facts. Bitcoin (BTC) pumps beyond $6k, stable @ $6,300. Facts SEC is fully engaged in crypto. FALSE Coinbase Custody will bring $10bn of Institutional Investment. FALSE - Purely Speculative RUMOR All we can do is wait, watch, and hope & pray. Please pray, it'll make a difference :) No one knows the future, all we can do is monitor the markets. So Stay Tuned! As for the rest of the markets, earlier this week I covered: Many top analysts are talking big numbers for Bitcoins (BTC) future, while some (very few) are making the argument for a lower low from the major $6k support level we are pretty much at. The longterm fundamentals are great, but those aside Bitcoin (BTC) is seriously running the risk of bottoming out in the coming weeks. Who really knows, comment your predictions and I'll shout out someone who predicts it right in a few weeks, give a date and a price and whoever is the closest I will personally highlight it in a video :) Could Cardano (ADA) hit $1.00? Could Tron (TRX) hit $0.25? Time will tell... When will the bull run everyone's been talking about since February happen? This Year? Many Hardcore Cryptocurrency investors believe in the longevity of this market, believe that through all the ups and downs in the market, despite what the mainstream media says, and regardless of how controversial it may be, that cryptocurrency and blockchain technology are the change society has been yearning for. Recently the SEC has ruled that Bitcoin and Ethereum are not securities, and it got many discussing the rest of the cryptocurrency market and what is a security. Along with Ripple and XRP's continued distinction, and Ripple now having an executive on a Task Force for the Federal Reserve it's really looking promising for Brad Garlinghouse et al. What does that mean for XRP though? Comment below and let us know... As well as when you think another bubble will occur, or a bitcoin (BTC) trend reversal will happen, or when a cryptocurrency trend reversal will happen! 💥Thanks for watching!💥 We provide regular and up to date trending Cryptocurrency news, Bitcoin (BTC) price analysis as well as trending cryptocurrency price analysis and developments in a wide range of financial technologies. Financial technology (FinTech or fintech) is a new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services; using technology to improve activities in finance. The use of smartphones for mobile banking, investing services and cryptocurrency are examples of technologies aiming to make financial services more accessible to the general public. Financial technology companies consist of both startups and established financial and technology companies trying to replace or enhance the usage of financial services provided by existing financial companies. Have a topic you would like us to cover? Let us know in the comments! 🤑GIVEAWAY RULES 1. Subscribe + Bell Notifications 2. SMASH that Like 3. Comment something of value. Also leave your bitcoin address with the comment. *WINNER WILL BE RANDOMLY SELECTED, AND SENT THE FUNDS. WE VERIFY THAT ALL RULES HAVE BEEN FOLLOWED. *
Views: 2333 Crypto Review Central
What's your best defense against a boot CD that breaks Windows passwords in two keystrokes? Encrypting your entire hard disk. Shannon's got the details on truecrypt drive encryption while Darren brings up plausible deniability with hidden volumes. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~-
Views: 43940 Hak5
Welcome the Cryptoy. It's an app to teach children how to encrypt data. GCHQ has launched the app to encourage childern to engage in science. Investigative journalist Tony Gosling thinks the agency is trying to improve it's reputation that was severely undermined by Snowden's revelations. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 6459 RT
The NSA - is opening up, and trying to win the hearts and minds of the youngest Americans. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 10571 RT
One of my favorite basic encryption methods: the substitution cipher. Enjoy! Check out this code here: https://github.com/ebrian/engineerman/tree/master/035 Join my Discord server to chat with me: https://discord.gg/k5VcqDP Check out some code on my GitHub: https://github.com/ebrian/engineerman Tweet me something funny on Twitter: https://twitter.com/_EngineerMan Say hi over at Facebook: https://www.facebook.com/engineermanyt Sincerely, Engineer Man
Views: 12417 Engineer Man
It can take looking at a few thousand bugs, but eventually hacking feels like getting really good at telling the same joke, over and over again. It's OK, the computer still laughs, but why isn't software engineering delivering the reliability and predictability of other engineering disciplines? That's a question with an answer. It's not an easy answer, like "devs are lazy" or "tools are bad". Who are hackers to complain about either? But it's an answer I intend to explore, in true hacker fashion, by seeing traditional boundaries as mostly false, but useful for identifying what to fuzz. Why should we separate the humans that write bugs, from the tools the tools they use? Humans write tools. Why these tools in particular? Why would we separate forward and reverse engineering, dev from test? Wait, are those the same thing? Does any other field isolate the creator from the consequences of their creation? Is this going to be just some fluffy exploratory keynote? No, this is way too long a flight for that. We're going to talk about where I think software and hardware architecture is going to go, with actual code you're welcome to try to break. I'll tell you exactly where to look.
Views: 5572 DEFCONConference
On this episode we go over some of the recent random news with our awesome IRC chat. Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections: http://thehackernews.com/2016/10/nsa-crack-encryption.html BlockChain.info Domain Hijacked; Site Goes Down; 8 Million Bitcoin Wallets Inaccessible: http://feedproxy.google.com/~r/TheHackersNews/~3/jaJ5kJm-UJg/blockchain-bitcoin-website.html Encrypted communications could have an undetectable backdoor for 1024 Bit keys: http://www.pcworld.com/article/3130160/security/encrypted-communications-could-have-an-undetectable-backdoor.html http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/ https://freedom-to-tinker.com/2015/10/14/how-is-nsa-breaking-so-much-crypto/ NSA paid $10 million bribe to RSA (circa 2013): http://thehackernews.com/2013/12/nsa-paid-10-million-bribe-to-rsa.html Amazon finds cache of reused passwords: change yours now!: https://nakedsecurity.sophos.com/2016/10/11/amazon-finds-cache-of-reused-passwords-change-yours-now/ Facebook, Twitter and Instagram Share Data with Location-based Social Media Surveillance Startup: http://thehackernews.com/2016/10/social-media-monitoring-tool.html https://yro.slashdot.org/story/16/10/11/178247/facebook-instagram-twitter-block-tool-for-cops-to-surveil-you-on-social-media Amazon Music Unlimited challenges Spotify with steep discounts for Echo, Prime users: http://www.pcworld.com/article/3130121/streaming-services/amazon-music-unlimited-challenges-spotify-with-steep-discounts-for-echo-prime-users.html Samsung will 'dispose of' recalled Note 7 phones, won't repair or refurbish them: http://www.theverge.com/circuitbreaker/2016/10/12/13257504/samsung-galaxy-note-7-disposal https://gizmodo.com/how-one-outrageous-law-turned-the-samsung-phone-recall-1787659621 https://www.engadget.com/2016/10/11/samsung-ships-fire-proof-boxes-and-gloves-to-recover-note-7s/ Google and Facebook building super high-speed cable between LA and Hong Kong: http://www.theverge.com/2016/10/12/13255858/google-facebook-submarine-cable-trans-pacific StrongPity' malware infects users through illegitimate WinRAR and TrueCrypt installers: https://www.neowin.net/news/strongpity-malware-infects-users-through-legitimate-winrar-and-truecrypt-installers Get CryptoPrevent version 8 Beta: https://www.foolishit.com/cryptoprevent-beta/ KeePass overview: https://youtu.be/Y7bPHpUOmK4 Yahoo adds security event tracking to its Account Info page, but still no “delete” button: https://techcrunch.com/2016/10/12/yahoo-adds-security-event-tracking-to-its-account-info-page-but-still-no-delete-button/ Verizon wants you to know its Google Pixel phones will get immediate Android updates: https://techcrunch.com/2016/10/12/verizon-pixel/ Enterprise customers pull back on security spending, says Fortinet http://www.zdnet.com/article/enterprise-customers-pull-back-on-security-spending-says-fortinet/ will not fix their IoT security flaws allowing ALL their hardware to be compromised: http://www.avtech.com.tw/ http://news.softpedia.com/news/avtech-shuns-security-firm-and-leaves-all-products-vulnerable-without-a-patch-509223.shtml AVTECH vulnerability matrix: http://www.search-lab.hu/media/vulnerability_matrix.txt Violent Extremism is a slippery slope FBI game: https://cve.fbi.gov/whatis/?state=blameSection1 Mr. President game: https://kotaku.com/mr-president-asks-players-to-save-donald-trump-from-as-1787677514 Military looking at blockchain for nuclear weapons: https://news.slashdot.org/story/16/10/11/2045240/us-military-is-looking-at-blockchain-technology-to-secure-nuclear-weapons WD finally gets into the ssd game: https://www.engadget.com/2016/10/11/western-digital-finally-offers-a-consumer-ssd/ space vid of the day: https://youtu.be/KRlfwZLGHxs weird vid: https://vimeo.com/185891294 Court rejects major penalties for torrent damages: https://yro.slashdot.org/story/16/10/11/2044252/court-rejects-massive-torrent-damages-claim-admin-avoids-jail Comcast fined for negative option billing practices: https://news.slashdot.org/story/16/10/11/1819210/comcast-fined-23-million-by-fcc-for-negative-option-billing-practices FCC Complaints link: https://consumercomplaints.fcc.gov/hc/en-us The power of the internet at it's worst: https://gizmodo.com/is-this-horrifying-youtube-video-linked-to-the-disappea-1787682470 https://gizmodo.com/that-horrifying-hostage-video-was-just-a-twisted-misund-1787702303 Lawmakers want UK to set example on transparency in AI decision making: http://www.pcworld.com/article/3130497/lawmakers-want-uk-to-set-example-on-transparency-in-ai-decision-making.html Colorado making batteries from beer waste: https://www.engadget.com/2016/10/12/colorado-researchers-turn-beer-waste-into-battery-electrodes/
Views: 41 d7xTech
Turned out better than I expected for the first video I've ever actually edited. Please subscribe if you're interested in Linux gaming benchmarks as I will be doing more videos like this in the future! Also subscribe to Pewdiepie to help him beat T-series Important information: Kernels: Liquorix 4.18.0-16 & Xanmod 4.19.0 Liquorix 4.19.0 wasn't available while I was recording OS: Ubuntu 18.04 with Cinnamon environment GPU: GTX 1080 Ti CPU: i7 8700k Mem: 3000 MHZ 2x8gb Both were recorded right after rebooting with only OBS and Unigine running
Views: 1073 That Boi Kasai
John McAfee says his new security product is a 'f---ing game changer' john mcafee net worth john mcafee bitcoin john mcafee movie john mcafee wife john mcafee 2017 john mcafee twitter john mcafee bitcoin quote john mcafee sentinel john mcafee house john mcafee phone john mcafee john mcafee author john mcafee apps john mcafee autobiography john mcafee android app john mcafee siteadvisor john mcafee bitcoin price john mcafee brownlist john mcafee bitcoin mining john mcafee blockchain john mcafee birthday john mcafee bitcoin youtube john mcafee coin john mcafee company john mcafee cell phone john mcafee crypto john mcafee cognizant john mcafee documentary gringo john mcafee documentary trailer john mcafee dateline john mcafee debate john mcafee dimon john mcafee documentary stream john mcafee d central john mcafee ethereum john mcafee email john mcafee ethereum price john mcafee ether john mcafee e apple john mcafee funny john mcafee family john mcafee first wife john mcafee for president 2016 john mcafee gif john mcafee gringo stream john mcafee how to uninstall john mcafee height john mcafee hardware wallet john mcafee house ambergris caye john mcafee india john mcafee images john mcafee interview bitcoin john mcafee intel john mcafee in romania is john mcafee dead web bot report web bot report june 2017 webbot webbot 2017 predictions webbot alta report webbot clif high 2017 webbot ethereum
Views: 52 CryptoTweak
Hackaday built a hat for DEFCON 22 that was itself a game. Inside is hidden a WiFi router that invites you to hack in, leave your alias for the scoreboard, and push your own message to the hat. This is the only person who managed to do so during the course of the weekend. Read the entire article: http://hackaday.com/2014/08/21/hat-hash-hacking-at-defcon/
Views: 9145 HACKADAY
Before making a down payment on your dream condo, reflect on the life you’ve built − and on your future plans – to ensure that the home that has caught your eye is truly a good fit. If you’re used to life in a traditional freehold house, be aware that condominium life is different. Condos have special legal status, and are governed by rules that vary from development to development. A real estate lawyer can help you along the way.
Views: 1717 LAWPRO
Watch me and Ben rap into the new year! It’s AWESOME! Subscribe to our YouTube channel: https://www.youtube.com/user/TalkingFriends Here’s the very popular Tom’s channel: https://www.youtube.com/user/TalkingTomCat Check out Talking Angela’s channel: https://www.youtube.com/user/TalkingAngelaCat Don’t miss out on Talking Ginger YouTube channel: https://www.youtube.com/user/TalkingGingerTM Talking Shop Official: http://talkingfriends.eu/ Outfit7: http://outfit7.com/
Views: 5434035 Talking Tom and Friends
Tahera Ahmad, the Muslim woman who claimed discrimination against United Airlines following an incident where she was refused an unopened can of soda, speaks with Lindsay France about the controversy and tells her side of the story. Ahmad also talks about how her life has been impacted by the event, the death threats she has received after telling her story and the support that she is using to build bridges and create a more tolerant world. Find RT America in your area: http://rt.com/where-to-watch/ Or watch us online: http://rt.com/on-air/rt-america-air/ Like us on Facebook http://www.facebook.com/RTAmerica Follow us on Twitter http://twitter.com/RT_America
Views: 32091 RT America
Date of stream 23 Mar 2019. Live-stream chat added as Subtitles/CC - English (Twitch Chat). Stream title: porting github.com/geohot/qira to python 3, and more? | Part1 Video archive: - https://youtube.com/commaaiarchive/playlists Source files: - https://github.com/geohot/qira Follow for notifications: - https://twitch.tv/georgehotz Subscribe to support: - https://twitch.tv/products/tomcr00s3_3000 - https://twitch.tv/products/georgehotz_3000 We archive George Hotz videos for fun. Follow for notifications: - https://twitter.com/commaaiarchive We are not affiliated with comma.ai. Official communication channels: - https://comma.ai - https://twitter.com/comma_ai - https://pscp.tv/comma_ai - https://youtube.com/commaai - https://github.com/commaai - https://discord.comma.ai - https://community.comma.ai - https://comma.ai/jobs - https://comma.ai/shop
Views: 24912 commaai archive
Your eyes and brain are pretty amazing! Watch ART vs SCIENCE: https://youtu.be/6Z37JA-wmgQ Subscribe: http://bit.ly/asapsci Written by Rachel Salt, Gregory Brown and Mitchell Moffit GET THE ASAPSCIENCE BOOK: http://asapscience.com/book/ FOLLOW US! Instagram and Twitter: @whalewatchmeplz and @mitchellmoffit Clickable: http://bit.ly/16F1jeC and http://bit.ly/15J7ube AsapINSTAGRAM: https://instagram.com/asapscience/ Facebook: http://facebook.com/AsapSCIENCE Twitter: http://twitter.com/AsapSCIENCE Tumblr: http://asapscience.tumblr.com Vine: Search "AsapSCIENCE" on vine! SNAPCHAT 'whalewatchmeplz' and 'pixelmitch' Created by Mitchell Moffit (twitter @mitchellmoffit) and Gregory Brown (twitter @whalewatchmeplz). Send us stuff! ASAPSCIENCE INC. P.O. Box 93, Toronto P Toronto, ON, M5S2S6 Further Reading: Number of discernible colors for color-deficient observers estimated from the MacAdam limits https://www.osapublishing.org/josaa/abstract.cfm?uri=josaa-27-10-2106 Afterimage of Perceptually Filled-in Surface http://www.cns.atr.jp/~kmtn/pdf/ssyksnScience01.pdf The primary visual cortex fills in color http://www.pnas.org/content/101/52/18251.full Microsaccades: Small steps on a long way http://www.sciencedirect.com/science/article/pii/S0042698909003691 Molecular Genetics of Human Color Vision: The Genes Encoding Blue, Green, and Red Pigments http://www.blueconemonochromacy.org/wp-content/uploads/2011/03/Science-1986-Nathans-193-202.pdf Comparing levels of crosstalk with red/cyan, blue/yellow, and green/magenta anaglyph 3D glasses http://cmst.curtin.edu.au/wp-content/uploads/sites/4/2016/05/2010-11.pdf Spooky Science: Discovering the Eerie Colors behind Afterimages http://www.scientificamerican.com/article/bring-science-home-afterimages/ Plants and colour: Flowers and pollination http://www.sciencedirect.com/science/article/pii/S0030399208002442 The influence of pigmentation patterning on bumblebee foraging from flowers of Antirrhinum majus. http://www.ncbi.nlm.nih.gov/pubmed/23420080 Why Are So Many Bird Flowers Red? http://www.ncbi.nlm.nih.gov/pmc/articles/PMC521733/ Mighty Mutualisms: The Nature of Plant-pollinator Interactions http://www.nature.com/scitable/knowledge/library/mighty-mutualisms-the-nature-of-plant-pollinator-13235427 The number of known plants species in the world and its annual increase http://www.biotaxa.org/Phytotaxa/article/view/phytotaxa.261.3.1
Views: 4972567 AsapSCIENCE
Hey this is Rudy this video is about 2019 cicada 3 3 0 1 puzzle. For those who don't know about cicada 3 3 0 1 First let’s see what is cicada 3 3 0 1. Cicada 3 3 0 1 is a name given to an enigmatic organization that on several occasions has posted a set of puzzles to recruit highly intelligent individuals from the public. On 4th of January 2012 users browsing 4chan were greeted with a mysterious image, unlike much else really seen on that board. That says hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck 3 3 0 1. This image made internet crazy and this was the beginning of the most mysterious puzzle on the Internet. Solving a level leads to another level and it continues. Nobody knows what happens to the winners and no one knows who's behind this game, those who won the game disappeared from the internet this makes the puzzle a mystery. Some theory came up that 3 3 0 1 is an intelligence agency like CIA, MI6 or NSA or Alternate reality game, and some suggest that Cicada 3 3 0 1 is a group who is behind several internet anonymity software including Bitcoin. Initially it was thought that someone sitting in their home can be behind this puzzle and the whole thing is nothing more than a joke, but in a round participants are given with a set of co-ordinate that they have to find posters situated in those co-ordinates spreader across the globe, and this made it clear that 3 3 0 1 is an organization that is widely spread around the globe. The puzzles are focused primary on cryptography and also stenography, data security, literature, and music. After a few months, The following message was posted in a subreddit which was used in a stage. It read, Hello. We have now found the individuals we sought. Thus our month-long journey ends. For now. Thank you for your dedication and effort. If you were unable to complete the test or did not receive an email, do not despair. There will be more opportunities like this one. Thank you all. 3 3 0 1. A second puzzle began one year later on January 5, 2013, by posting an image similar to the first one on 4chan and through several stages the second puzzle ended in March 2013, But this time it didn't end with an official statement. And third round on Twitter on January 6, 2014. on a twitter account that was used while the 2013 puzzle and 2014 puzzle doesn’t have any known ending. There was no game in 2015 and In 2016 the twitter account used by cicada during 2014 tweeted a hint says to focus on ‘Liber Primus‘ which is a set of images found during 2014 puzzle. Everybody waited for a new game in 2017, but disappointingly there was no new game on 2017 January, but a message was found on 4th April 2017 on Pastebin says that “Beware false paths. Always verify PGP signature from 7A35090F” means beware of fake game, always verify the PGP signature of cicada. And there was no sign of cicada in 2018 other than a lot of fake games with no PGP signature. Let's see what is going to happen this year. 3 3 0 1 has a regular pattern I will be looking for the similar pattern and PGP signature, there is an online web app which can be used to identify the PGP signature is real 3 3 0 1 or not, I found these puzzles but all of them are fake. till this video is uploaded no puzzle with cicada’s PGP key was found, there is a lot of fake puzzles. Remember: Trust nothing, Verify everything!, I will update this video if there was an update. Keywords cicada 3301 music, cicada 3301 video, cicada 3301 song, cicada 3301, cicada 3301 solved 2016, cicada 3301 top 5, cicada 3301 conspiracy, cicada 3301 update, cicada 3301 voce sabia, cicada 3301 solved, cicada 3301 all clues, cicada 3301 anonymous, cicada 3301 april 2017, cicada this year, cicada 2018, cicada 2019, cicada 3301 explained, cicada puzzle 2019, 3301 2018, Bitcoin, Satoshi nakanoto,
Views: 9755 RUDY Labs
Rebecca Morelle looks back on the year in science – from a British astronaut blasting off into space, to efforts to halt global warming here on Earth. That’s Review 2015: The Year in Science. Subscribe to BBC News HERE http://bit.ly/1rbfUog Check out our website: http://www.bbc.com/news Facebook: http://www.facebook.com/bbcworldnews Twitter: http://www.twitter.com/bbcworld Instagram: http://instagram.com/bbcnews
Views: 79296 BBC News
Speakers: ANTHONY "DARKFLOYD" LAI SECURITY RESEARCHER, VALKYRIE-X SECURITY RESEARCH GROUP (VXRL) TONY "MT" MIU RESEARCHER, VXRL KELVIN "CAPTAIN" WONG RESEARCHER, VXRL ALAN "AVENIR" CHUNG RESEARCHER, VXRL Enterprises currently dump millions of bucks to defense against DDoS, some trading firms here are paying for fear to the DDoS attack from China about 5K to 100K USD per day and InfoSec teams believe their solutions are perfect already. Are those controls effective and unbreakable? In the first part of the presentation, we would like to show our studies and carry out over 10 types of DDoS test against various big firms and organizations to see whether their defense is effective, showing how stupid and smart they are. Various interesting case studies will be briefed :) In the second part of the presentation, we will detail our proposed defense model to against Application-Level attacks. We have already checked with other vendors and researchers about our model, it is still not yet deployed and hopefully we could put this as an open source project in the future. Hopefully, you will enjoy this fun session with us and learn whether your organization could survive even under DDoS attack. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 5948 Christiaan008
By: Dr. Steve Crocker Forty-five years ago the Arpanet came into existence, connecting computers with permanent, leased lines. Within a few years multiple networks were interconnected to form today's Internet. Billions of users, trillions of dollars of commerce and a new "flat" world emerged. Two of the less attractive consequences of the explosive growth were the myriad security problems and the wrangling over Internet governance issues. Dr. Crocker will talk a bit about the early history, particularly the creation of the Requests for Comments and the positive impact the open approach had on technology development, and then focus on current activities, both positive and negative. Security technologies such as DNSSEC and rPKI hold some promise of improving the game, but they are but a small sample of what needs to be done. Meanwhile, a variety of policy issues permeate the security arena. He'll also talk briefly about ICANN, what it does, and, perhaps more important, what it doesn't do. Dr. Crocker will close with a challenge to the Black Hat community.
Views: 1816 Black Hat
Speakers: JASON OSTROM SECURITY RESEARCHER, VIPER LAB (VOICE OVER IP EXPLOIT RESEARCH), AVAYA, INC. KARL FEINAUER VULNERABILITY RESEARCH SOFTWARE ENGINEER, VIPER LAB WILLIAM BORSKEY SENIOR SECURITY CONSULTANT, VIPER LAB The PSTN as you know it is changing. In March of 2012, the NSA announced "Project Fishbowl", a reference architecture for secure mobility VoIP usage on smartphones using WiFi or 3GPP networks. At the same time, mobile carriers in the US (seemingly) ensure that subscribers must purchase voice plans on their smartphones and can't opt for data only plans - which curtails a compelling option of purchasing a smartphone for data only usage, such as VoIP. Other mysterious clues abound. Since the mid-to-late 90s, users have been able to host their own web and email servers using open standards and DNS for advertisements, peering directly between domains and systems. At the same time, since the early 2000s, the technology and protocols have existed for enabling direct VoIP peering between enterprises, bypassing the PSTN, using DNS SRV records and ENUM - the same way we've been using DNS for HTTP and SMTP for years. But why is this seemingly attractive option for cost savings and collaboration not more widely adopted? Surely this is the way VoIP was meant to be used? Or isn't it? In this talk, we will explore the so-called market buzz of "UC Federation". Rather, we will kick this term to the bit bucket, and present an overview of how the industry is deploying these solutions technically. We will take a closer look at the security of being able to use UC between organizations, advertised using DNS, the same way that companies use UC internally for VoIP, HD Video, data sharing, IM & Presence, and collaboration applications. This talk is divided into three sections. First, we'll share our research on the state of public SIP peering using DNS SRV. Is SIP peering proliferating? How? What does it mean? Using a PoC research tool, we'll look at some initial data we've found, in order to plot the increase of peering using DNS SRV records for SIP service location advertisement. Second, we will show the audience findings from our UC "Federation" Honeypot research project. We've built a UC solution using a large commercial vendor, and have tested "Federation" with the help of the Global Federation Directory. Just to see what would happen. We've also set up a network of cloud based UC Federation honeypots using open source software, to explore attacks against UC Federation Systems. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 1627 Christiaan008