Search:

Found 199 videos

Building a Small Form Factor Storage Server (NAS) by Main djsumdog channel
04:39

Building a Small Form Factor Storage Server (NAS)

Main djsumdog channel   |   19 views   |   2020-09-30

Build video for my custom Network Accessible Storage (NAS) Server Blog Post: https://battlepenguin.com/tech/video/build-a-small-form-factor-storage-server-nas/ YouTube: https://www.youtube.com/watch?v=s8Zed0qJKW4&t=91s

Upgrading the SSD on an MSI GS60 Laptop by Main djsumdog channel
06:46

Upgrading the SSD on an MSI GS60 Laptop

Main djsumdog channel   |   173 views   |   2020-08-11

This video is about my teardown of an MSI GS60 laptop, replacing the two internal solid state drives (SSDs) and the trouble I had with backing up and restoring Windows on it. Blog Post: https://battlepenguin.com/tech/video/upgrading-the-ssd-on...

LtSense - Using Embedded Python for Sensor Networks by Main djsumdog channel
40:19

LtSense - Using Embedded Python for Sensor Networks

Main djsumdog channel   |   11 views   |   2020-07-27

Blog post: https://battlepenguin.com/tech/video/ltsense-using-embedded-python-for-sensor-networks-wellington-python-user-group/ YouTube Mirror: https://www.youtube.com/watchv=Xs7KVfHfoIE

Big Sense: REST in Scala - Wellington Java User Group by Main djsumdog channel
58:33

Big Sense: REST in Scala - Wellington Java User Group

Main djsumdog channel   |   9 views   |   2020-07-27

Blog Post: https://battlepenguin.com/tech/video/big-sense-rest-web-services-in-scala-for-sensor-networks-wellington-java-user-group/ YouTube Mirror: https://www.youtube.com/watch?v=S9Gr_LeruWI

Start Collaborating on Write.as by Write.as Updates
05:03

Start Collaborating on Write.as

Write.as Updates   |   26 views   |   2020-07-14

Learn how to start collaborating on Write.as with our newest feature, Teams. This will walk you through creating a team, starting a shared blog, and inviting collaborators.

Coming Soon: Team Roles by Write.as Updates
03:07

Coming Soon: Team Roles

Write.as Updates   |   14 views   |   2020-07-09

Preview the user role system to be launched with Write.as Teams. Includes these options: * **Admin** -- Has full access to the team and all shared blogs. * **Editor** -- Can see every team member, and has full access to all shared blogs. * **Auth...

Viewing Mastodon from the Epaper Terminal by Main dheadshot channel
16:03

Viewing Mastodon from the Epaper Terminal

Main dheadshot channel   |   23 views   |   2020-04-17

I thought I'd do an extra video showing that you can actually view Mastodon and Toot from this, though it is a bit buggy.

E-Paper Terminal Update: Images on the web by Main dheadshot channel
03:10

E-Paper Terminal Update: Images on the web

Main dheadshot channel   |   24 views   |   2020-04-16

Update on my Epaper terminal project. The goal of this project is to be able to build a portable computer with an epaper screen for primarily terminal work that can be used outside in strong sunlight. In the update toot I sent out about a week a...

Surviving the 0-day – Reducing the Window of Exposure by Main 44con channel
40:14

Surviving the 0-day – Reducing the Window of Exposure

Main 44con channel   |   1 views   |   2019-11-28

According to the NIST National Vulnerability Database, 1772 software vulnerabilities with a CVSS score of 7 or higher were disclosed in 2012, and 2013 is so far (at the time of writing) not looking any better. A lot of times the window of e...

Building Antibodies - The Phishing program at Twitter by Main 44con channel
40:34

Building Antibodies - The Phishing program at Twitter

Main 44con channel   |   14 views   |   2019-11-28

I run the internal phishing program at Twitter. It was built from scratch and uses open source tools. It’s custom tailored to our organization. This talk will describe the objective of running an internal phishing program at your organization, wha...

Pawel Krawczyk - Top DevOps Security Failures (DevOps Stage Ukraine 2019) by Main kravietz channel
49:15

Pawel Krawczyk - Top DevOps Security Failures (DevOps Stage Ukraine 2019)

Main kravietz channel   |   17 views   |   2019-11-08

Docker, Jenkins, network topology, system configuration and software delivery management - all of these are the bread and butter of each DevOps team, but can be also a recipe for a disaster. Walk through the most devastating security failures in D...

DDPlayer by Main s1512783 channel
00:44

DDPlayer

Main s1512783 channel   |   62 views   |   2019-10-02

Using fast-switching digital hydraulic valves to play notes.

Use Rust in iOS Apps by Dodgy Coding
55:31

Use Rust in iOS Apps

Dodgy Coding   |   39 views   |   2019-09-05

A tutorial to create a new Rust library, compile it as a static library for iOS, and use it in an Xcode project. We then automate a convenient development workflow and explore some of the data types and callbacks that you can use to communicate be...

Authenticity and Usability - Pawel Krawczyk - IDM 2018 by Main kravietz channel
16:03

Authenticity and Usability - Pawel Krawczyk - IDM 2018

Main kravietz channel   |   19 views   |   2019-09-04

Users are critical part of every authentication scheme, and usability must be treated with just the same respect as cryptographic best practices. Slides are available here https://www.slideshare.net/kravietz/authenticity-and-usability Raw M...

Punking Punkbuster. by Main 44con channel
40:17

Punking Punkbuster.

Main 44con channel   |   11 views   |   2019-08-06

Punking Punkbuster presented by Isaac Dawson at 44CON 2013 in London This presentation will cover the methods and process used while trying to understand how PunkBuster works. From writing custom tools, to coming up with novel ways of overcomin...

Security Lessons from Dictators by Main 44con channel
33:26

Security Lessons from Dictators

Main 44con channel   |   12 views   |   2019-08-06

Security Lessons from Dictators presented by Jerry Gamblin at 44CON 2013 in London. What do the Grand Ayatollah Seyyed Ali Hosseini Khamenei, Kim Jong-un, Julius Caesar, Abraham Lincoln, Napoleon Bonaparte and Adolph Hitler have to do with netw...

A talk about (info-sec) talks. by Main 44con channel
45:30

A talk about (info-sec) talks.

Main 44con channel   |   1 views   |   2019-08-06

A talk about (info-sec) talks presented by Haroon Meer at 44CON 2013. Last year there was an Information Security conference taking place for almost every day of the year. This translates to about 15 information security talks per day, every da...

Modern Post-Exploitation Strategies by Main 44con channel
01:06:40

Modern Post-Exploitation Strategies

Main 44con channel   |   11 views   |   2019-08-06

Modern Post-Exploitation Strategies. Rich Smith at 44CON 2012 in London.

25C3 Full Disk Encryption Crash Course by Main ccc_import channel
48:15

25C3 Full Disk Encryption Crash Course

Main ccc_import channel   |   2 views   |   2019-08-04

Speakers: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercia...

 25c3: OnionCat -- A Tor-based Anonymous VPN by Main ccc_import channel
44:06

25c3: OnionCat -- A Tor-based Anonymous VPN

Main ccc_import channel   |   4 views   |   2019-08-04

Building an anonymous Internet within the Internet OnionCat manages to build a complete IP transparent VPN based on Tor's hidden services, provides a simple well-known interface and has the potential to create an anonymous global network which ...