Ducks 'A Million!
Funny Animal TV Online | 39 views | 2019-11-20
Here is an experimental found footage cartoon. It's the recovered material from a lost vacation!
Here is an experimental found footage cartoon. It's the recovered material from a lost vacation!
I figured while I was fumbling with note patterns I would upload a video of how I got swing style bass for trance music. I did not really EQ or process (much) most of it, so don't expect label-ready sound. What I was after was the actual patter...
DevSecOps today have extremely powerful tools at their hands: they design and manage all the elements that can prevent a web application from being compromised. Build environment can prevent buggy applications from even being deployed. Protective ...
I have something to put on here now! This is an overview of my FL Studio project for [Liminal Realities](https://lightwave80222.bandcamp.com/track/liminal-realities). It's a short clip of everything I have going on, and I'm mostly showcasing wh...
**CW: psychological horror, alienation and isolation, alarming music** This game is so, so good. This is a playthrough of one of the four endings, and I've since gone back to polish off the game (not streamed). Three queer kids are attending a ...
This is a very cute game by npckc (I played their game "one night, hot springs" [a few months ago](https://irrsinn.video/videos/watch/f554c562-2f5f-4e4c-ba93-999d569aa14a)). It very short and might be the most socially awkward character I've ever ...
I didn't 100% this, but I did play a couple different scenarios. "inter-view" is a game in which your answers (to interview questions) gently change the world around you. It's gorgeous and lovely and I highly recommend it. inter-view: https://m...
Docker, Jenkins, network topology, system configuration and software delivery management - all of these are the bread and butter of each DevOps team, but can be also a recipe for a disaster. Walk through the most devastating security failures in D...
I played the whooole game in a single stream! I was pretty tired by the end, so I struggled a bit to find clues in the final minutes, but I absolutely loved this game. It's a puzzle game, which is typically definitely not my jam in the slightest, ...
This was my first stream after [Exploit: Zero Day](https://exploitzeroday.com) went into open alpha, so we set it up as an AMA in case folks had questions. It was super difficult to play a new-to-me rhythm platformer while taking questions, omg, a...
Using fast-switching digital hydraulic valves to play notes.
Support Me: https://www.patreon.com/Rowlo Join the Discord: https://discord.me/rowlo YouTube: https://www.youtube.com/c/Rowlo Twitch: https://www.twitch.tv/rowl_tv Twitter: https://twitter.com/Rowl_TV Instagram: https://www.instagram.com/rowl_tv
A tutorial to create a new Rust library, compile it as a static library for iOS, and use it in an Xcode project. We then automate a convenient development workflow and explore some of the data types and callbacks that you can use to communicate be...
Users are critical part of every authentication scheme, and usability must be treated with just the same respect as cryptographic best practices. Slides are available here https://www.slideshare.net/kravietz/authenticity-and-usability Raw M...
Feature documentary by Jordan Brown **https://jore.cc/** We live in a world of screens. The average adult spends the majority of their waking hours in front of some sort of screen or device. We’re enthralled, we’re addicted to these machines. ...
Punking Punkbuster presented by Isaac Dawson at 44CON 2013 in London This presentation will cover the methods and process used while trying to understand how PunkBuster works. From writing custom tools, to coming up with novel ways of overcomin...
Security Lessons from Dictators presented by Jerry Gamblin at 44CON 2013 in London. What do the Grand Ayatollah Seyyed Ali Hosseini Khamenei, Kim Jong-un, Julius Caesar, Abraham Lincoln, Napoleon Bonaparte and Adolph Hitler have to do with netw...
A talk about (info-sec) talks presented by Haroon Meer at 44CON 2013. Last year there was an Information Security conference taking place for almost every day of the year. This translates to about 15 information security talks per day, every da...
Software Security Austerity - Software Security Debt In Modern Software Development. Ollie Whitehouse at 44CON 2012 in London.
Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.
Speakers: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercia...
Building an anonymous Internet within the Internet OnionCat manages to build a complete IP transparent VPN based on Tor's hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which ...
Hacking And Forensics On The Go. Phil Polstra at 44CON 2012.
Software Security Austerity - Software Security Debt In Modern Software Development. Ollie Whitehouse at 44CON 2012 in London.