Unblock YouTube Videos - Free YouTube Web Proxy Site, Free YouTube Proxy | Tubeunblock
Skip to main content

Computers & Technology

Featuring two television programs popular in the 1980's and 1990's: Computer Chronicles and Net Café, this library showcases videos about computing and technology. Collection topics include BBS, the Open Source movement, and Internet governance.



rss RSS

130,237
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
OpenSecurityTraining.info
OpenSecurityTraining.info
collection
279
ITEMS
1.5M
VIEWS
collection

eye 1.5M

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community. We highly encourage people who already know these topic areas to take the provided material and pursue paid and...
Topics: Open Security Training, computer security
G4 Video Grabs
G4 Video Grabs
collection
74,857
ITEMS
6M
VIEWS
collection

eye 6M

G4, also known as G4 TV, is an American television network, originally geared primarily toward young male adult viewers, originally based on the world of video games. The channel now has a focus on male-oriented programming, although video games are still represented by the channel. Launched on April 24, 2002, G4 is headquartered in Los Angeles, California, United States, and owned by G4 Media, which is owned by NBCUniversal/Comcast. On April 22, 2013, the network is scheduled to be re-branded...
Giant Bomb Archive
Giant Bomb Archive
collection
23,588
ITEMS
73,808
VIEWS
collection

eye 73,808

A museum-quality collection. For an archive of Giant Bomb audio podcasts, click here .
Topic: Giant Bomb Archive
Computer Chronicles
Computer Chronicles
collection
576
ITEMS
3.8M
VIEWS
by Internet Archive
collection

eye 3.8M

Hosted by Stewart Cheifet, Computer Chronicles was the world's most popular television program on personal technology during the height of the personal computer revolution. It was broadcast for twenty years from 1983 - 2002. The program was seen on more than 300 television stations in the United States and in over 100 countries worldwide, with translations into French, Spanish, Chinese, and Arabic. The series had a weekly television broadcast audience of over two million viewers. The series has...
Topic: Moving Images
Public Resource's Internet Events
Public Resource's Internet Events
collection
391
ITEMS
679,558
VIEWS
by Carl Malamud
collection

eye 679,558

This collection contains videos, texts, and other materials uploaded by Carl Malamud, formerly of the Internet Multicasting Service and now President of Public.Resource.Org.
Topic: Internet Governance
Hacking and InfoSec stuff
Hacking and InfoSec stuff
collection
1,123
ITEMS
179,784
VIEWS
collection

eye 179,784

ISOC Live
ISOC Live
collection
402
ITEMS
89,560
VIEWS
collection

eye 89,560

Internet Society Livestreaming archive
Topic: Internet Society
Multicasting! The Voice of Public Resource
Multicasting! The Voice of Public Resource
collection
78
ITEMS
149,648
VIEWS
by Public Resource
collection

eye 149,648

Topic: Public Resource
NPTEL Lectures
NPTEL Lectures
collection
189
ITEMS
141,752
VIEWS
collection

eye 141,752

Lectures from the National Programme on Technology Enhanced Learning (NPTEL) - https://nptel.ac.in
Topics: video, lectures, india, nptel, mooc, course, education
Tweakers
Tweakers
collection
7,479
ITEMS
349,442
VIEWS
collection

eye 349,442

Tweakers.net (often abbreviated as T.net) is a Dutch website featuring news and information about hardware, software and the Internet. The website was founded in 1998 by Femme Taken, a computer enthusiast, under the name World of Tweaking as a student's hobby project to offer a Dutch alternative to hardware review sites like Tom's Hardware Guide. The verb "tweaking" in the title refers to the process of tweaking the hardware of a computer, as a form of optimisation. Thus, the site's...
Topic: tweakers
Attack of the Show
Attack of the Show
collection
671
ITEMS
438,628
VIEWS
collection

eye 438,628

Attack of the Show! (AOTS) was an American live television program shown weeknights on G4, G4 Canada and Fuel TV in Australia. At the end of its run, the program was hosted by Candace Bailey and Sara Underwood. Attack of the Show! reviewed new technological items, parodies, pop culture, and general daily news, and gives previews of video games, movies, and digital media. On October 26, 2012, G4 announced that the show would be canceled after 2012. on December 19th 2012 the final Live episode...
PyVideo.org
PyVideo.org
collection
1,008
ITEMS
163,439
VIEWS
collection

eye 163,439

PyVideo.org is an index of Python related media.
Topics: pyvideo, python
Multicasting! The Voice of Public Resource
by Public Resource
movies

eye 95,590

favorite 142

comment 6

Welcome to the General Index The General Index consists of 3 tables derived from 107,233,728 journal articles. A table of n-grams, ranging from unigrams to 5-grams, is extracted using SpaCy. Each  of the 355,279,820,087 rows of the n-gram table consists of an n-gram coupled with a journal article id. A second table is constructed using Yake and consists of 19,740,906,314 rows, each with a keywords and an article id. A third table associates an article id with metadata.  The metadata, readme,...
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
Topics: Access to Knowledge, Text and Data Mining, Temples of Knowledge, General Index
BBS: The Documentary Archive
BBS: The Documentary Archive
collection
152
ITEMS
179,118
VIEWS
by Jason Scott (TEXTFILES.COM)
collection

eye 179,118

The BBS Documentary Video Collection is a varied set of video items collected by Jason Scott, curator of TEXTFILES.COM. These are recordings about and from the era of the domination of ASCII and Dial-up Bulletin Board Systems (roughly the 1970s through the 1990s, with examples far before and after that). Over 250 hours of interviews were conducted for a project called "BBS: The Documentary" (website at bbsdocumentary.com ). The questions centered around the history of Dial-up BBSes...
Call for Help Canada
Call for Help Canada
collection
315
ITEMS
20,471
VIEWS
collection

eye 20,471

Call for Help, also known as CFH, was a computer-themed television program that first aired exclusively on TechTV (formerly ZDTV), a cable and satellite television network focused on technology, and then aired on G4techTV Canada and the HOW TO Channel in Australia. The final taped episode aired on February 26, 2007, but because the episodes were taped out of order, a number of other episodes taped during the same shooting week aired through April 6, 2007. A spin-off called The Lab with Leo...
Computer Chronicles
movies

eye 97,336

favorite 48

comment 16

A profile on computer pioneer Gary Kildall and the important contributions he made to the PC industry including the true story on how IBM ended up using MS-DOS rather than CP/M. Kildall developed CP/M, the first personal computer operating system. He was also a co-host on the early Computer Chronicles series. Includes comments by Gordon Eubanks, Symantec; Tom Rolander, DRI; Tim Bajarin, Creative Strategies; Lee Lorenzen, DRI; Jacqui Morby, TA Associates; Alan Cooper, CP/M applications...
favoritefavoritefavoritefavoritefavorite ( 16 reviews )
Topics: Episode year: 2001, Episode year: 1995, Operating systems: CP/M, the first operating system,...
Computerphile
Computerphile
collection
457
ITEMS
52,891
VIEWS
collection

eye 52,891

Microsoft Research Video
Microsoft Research Video
collection
2,836
ITEMS
158,906
VIEWS
collection

eye 158,906

More than 1,100 brilliant scientists and engineers push the boundaries of computing in multiple research areas and include contributions to Kinect for Xbox 360, work to develop an HIV vaccine, and advancing education techniques in rural communities.
Dr. Murphy's Lectures
Dr. Murphy's Lectures
collection
172
ITEMS
20,560
VIEWS
collection

eye 20,560

Computing sciences educational videos
Topics: computer science, computer information systems, information technology
Net Cafe
Net Cafe
collection
128
ITEMS
1.8M
VIEWS
by Internet Archive
collection

eye 1.8M

Net Cafe was the world's most widely distributed television series covering the Internet revolution during the height of the dot com boom. The series was broadcast throughout the United States and in more than one hundred other countries for six years, from 1996 through 2002. It was hosted by Stewart Cheifet, Jane Wither, and Andrew deVries. The weekly program went behind the scenes of the World Wide Web to meet the people and explore the culture of the new "wired" generation. The...
Topic: Moving Images
The Totally Rad Show
The Totally Rad Show
collection
760
ITEMS
134,845
VIEWS
by Revision 3
collection

eye 134,845

THE TOTALLY RAD SHOW. Hosted by Alex Albrecht, Dan Trachtenberg and Jeff Cannata. The Totally Rad Show is the summer blockbuster of geek news shows. Every week, hosts Alex Albrecht, Dan Trachtenberg, and Jeff Cannata rip into the world of movies, video games, tv, comics, and more and pull out what's rad.
Video Guides for using Computer Applications
collection
3,988
ITEMS
54,913
VIEWS
collection

eye 54,913

Public Resource's Internet Events
by U.S. District Court for the District of Columbia
texts

eye 87,757

favorite 3

comment 0

Click here to see available docket information and document downloads for this case. If you need the complete docket, you should consult PACER directly. AMERICAN SOCIETY FOR TESTING AND MATERIALS et al v. PUBLIC.RESOURCE.ORG, INC. Assigned to: Judge Tanya S. Chutkan Case: 1:14-cv-00857-TSC Cause: 17:501 Copyright Infringement Date Filed: 08/06/2013 Jury Demand: Defendant Nature of Suit: 820 Copyright Jurisdiction: Federal Question
NSFW Show
NSFW Show
collection
219
ITEMS
42,652
VIEWS
collection

eye 42,652

Magician and scam artist Brian Brushwood teams with sidekick Justin Robert Young for a weekly irreverent fun fest featuring unusual guests, bizarre games, and strange and wonderful tales.
Makani Power
Makani Power
collection
123
ITEMS
32,940
VIEWS
by Makani Technologies LLC
collection

eye 32,940

Makani spent 13 years designing and building kites to harness energy from the wind with the goal of creating a new way to bring wind power to more people around the globe. Founded by kitesurfers in 2006, the team started testing their airborne wind power concept with soft kites and iterated through eight models of rigid kite, culminating in the M600 energy kite, a prototype utility-scale system. The videos and photos in this collection are intended for technical audiences actively involved in...
Topic: wind power, airborne wind energy, makani
G4 Video Grabs
by G4TV.com
movies

eye 13,314

favorite 4

comment 0

There are no greater fans than the fans of adult movies and we have gone all over the country to see what the fans will go through and what they expect when they finally get to meet these lovely ladies that they lust after on their computers.
Topic: G4TV.com videos
The Screen Savers
The Screen Savers
collection
99
ITEMS
36,977
VIEWS
collection

eye 36,977

The Screen Savers was an American TV show on TechTV. The show launched concurrently with the channel ZDTV (later known as TechTV) on May 11, 1998. The Screen Savers originally centered around computers, new technologies, and their adaptations in the world. However, after it was taken over by G4, the show became more general-interest oriented and focused somewhat less on technology. The final episode of The Screen Savers aired on March 18, 2005. Repeat episodes continued to air until March 25,...
Technical Instructional Videos
Technical Instructional Videos
collection
1,722
ITEMS
22,544
VIEWS
collection

eye 22,544

A miscellaneous collection of uploaded instructional videos related to technical subjects. As collections asset themselves, videos will move out of these collections into others.
The Digital Tipping Point
The Digital Tipping Point
collection
1,241
ITEMS
456,640
VIEWS
by Christian Einfeldt
collection

eye 456,640

Welcome to the The Digital Tipping Point (DTP) collection. The DTP crew describes their project as a Point-of-View (POV) documentary film about the rapidly growing global shift to open source software, and the effects that massive wave of technological change will have on literacy, art, and culture around the world. The DTP crew says their project will be the first feature length documentary about free open source software to be built in an open source fashion out of video submitted to the...
Hak5 Show
Hak5 Show
collection
377
ITEMS
47,919
VIEWS
collection

eye 47,919

Hak5 isn't your typical tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust.
OpenSecurityTraining.info
movies

eye 13,463

favorite 3

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
BBS: The Documentary Archive
by Jason Scott Sadofsky
movies

eye 7,704

favorite 2

comment 1

Deth Veggie has been a close friend for over a decade, and his position in the Cult of the Dead Cow came around in the early years of knowing him. Founded in 1985, the group went from textfile-writing to world-wide media mavens to security pundits. Along the way, they found themselves in a great and unique position as "hacker celebrities". As the image grew somewhere out of control, I knew many of the members as friends, and saw both sides of the story. This interview has a unique...
favoritefavorite ( 1 reviews )
OpenSecurityTraining.info
movies

eye 45,771

favorite 24

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Computers & Technology
by DEF CON Communications
movies

eye 10,951

favorite 8

comment 0

DEFCON is the world's largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEFCON 20, a documentary crew was allowed full access to the event. The film follows the four days of the conference, the events and people (attendees and staff), and covers history and philosophy behind DEFCON's success and unique experience.
Topics: defcon, hackers, convention, documentary
OpenSecurityTraining.info
movies

eye 7,511

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
G4 Video Grabs
movies

eye 2,437

favorite 0

comment 0

Fashion worlds collide to create exclusive hats, sneakers and uniforms with these awesome collaborations between different labels, like tokidoki's partnership with Sanrio and Marvel for their line of cute superheroes and more.
Topic: G4TV.com videos
OpenSecurityTraining.info
movies

eye 9,003

favorite 0

comment 0

Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Computers & Technology
by WGBH
movies

eye 12,186

favorite 31

comment 0

Title: The KGB, the Computer and Me Summary: In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between ... Directed by: Robin Bates Production Company: WGBH Release Date: TV Movie 3 October 1990 In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent...
Topic: Documentary
PyVideo.org
movies

eye 8,307

favorite 2

comment 0

OpenSecurityTraining.info
movies

eye 15,492

favorite 3

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 7,785

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 13,870

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 7,389

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 8,389

favorite 1

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 7,378

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,924

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,914

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 9,355

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 9,500

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 7,307

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 8,426

favorite 1

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,399

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 16,343

favorite 3

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Computer Chronicles
movies

eye 39,285

favorite 38

comment 10

AT&T's computer operating system is threatening to take over IBM's MS-DOS dominance. Guests: John Mashey, Bell Labs; Mark Sobell, Author; Bill Joy, Sun Microsystems; Doug Hartman, Hewlett Packard; Mike Denney, Basis; Gary Kildall, DRI Products/Demos: File It, HP Integral PC, UNIX. Copyright 1985 Stewart Cheifet Productions.
favoritefavoritefavoritefavoritefavorite ( 10 reviews )
Topic: Episode year: 1985
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 15,296

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 7,429

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 10,598

favorite 3

comment 0

Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Tweakers
movies

eye 7,345

favorite 2

comment 0

<p>Nieuwste animatietitel van de Blender Institute.</p>
Topics: tweakers, 6325, &lt, p&gt, Nieuwste animatietitel van de Blender Institute.&lt,...
OpenSecurityTraining.info
movies

eye 8,279

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 8,379

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 21,735

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 7,997

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,826

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,344

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,847

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
X-Play on G4
X-Play on G4
collection
146
ITEMS
132,511
VIEWS
collection

eye 132,511

X-Play (previously GameSpot TV and Extended Play) was a TV program about video games, known for its reviews and comedy skits. The program aired on G4 in the United States, G4 Canada in Canada, FUEL TV in Australia, Ego in Israel, GXT in Italy, MTV Россия in Russia and Solar Sports in the Philippines. On October 26, 2012, it was announced that the show (along with Attack of the Show) would cease production after 2012. The show in its final incarnation was hosted by Morgan Webb and Blair...
The EuroPython Society
The EuroPython Society
collection
1,026
ITEMS
42,291
VIEWS
collection

eye 42,291

The EuroPython Society (EPS) is a Swedish non-profit organization which holds the rights to the EuroPython conference series and trademarks. It coordinates with local organizers to run EuroPython conferences. The EPS was formed in 2004 with the mission to turn EuroPython into a successful Python conference series for the years to come. http://www.europython-society.org
Topic: EuroPython
OpenSecurityTraining.info
movies

eye 7,773

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 8,163

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
by Veronica Kovah
movies

eye 7,320

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
KansasFest
KansasFest
collection
232
ITEMS
51,907
VIEWS
collection

eye 51,907

An annual Apple II computer convention held every July in Kansas City, Missouri. http://www.kansasfest.org/ KansasFest is the world's only annual convention dedicated to the Apple II computer that revolutionized the personal computing industry. Held every year in Kansas City, Missouri, KansasFest invites hobbyists, retrocomputing enthusiasts, and diehard aficionados to gather from all corners of the world. Hackers, programmers, users, gamers, and curious observers come from Hawaii,...
Topics: Apple II, Kansas City
OpenSecurityTraining.info
movies

eye 14,105

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...