All Videos

  1. Student Work(Assessment) DIG5127 MySQL-Powered Library Management System| Birmingham City University

    Student Work(Assessment) DIG5127 MySQL-Powered Library Management System| Birmingham City University

    4
  2. Student Work(Project Proposal)UA92-332 Optimizing Inventory with System Design|University Academy 92

    Student Work(Project Proposal)UA92-332 Optimizing Inventory with System Design|University Academy 92

    27
  3. Ticketmaster confirms data breach

    Ticketmaster confirms data breach

    17
  4. File Upload Vulnerabilities | Are Your File Uploads Hackable? | Hacksplaining

    File Upload Vulnerabilities | Are Your File Uploads Hackable? | Hacksplaining

    3
  5. What are Open Redirects? | Hacksplaining

    What are Open Redirects? | Hacksplaining

    3
  6. Command Execution | Can Hackers Execute Commands on Your Server? | Hacksplaining

    Command Execution | Can Hackers Execute Commands on Your Server? | Hacksplaining

    9
  7. What is SQL Injection? | HackSplaining

    What is SQL Injection? | HackSplaining

    17
  8. Unencrypted communication | Why is HTTPS Important? | Hacksplaining

    Unencrypted communication | Why is HTTPS Important? | Hacksplaining

    9
  9. Password Management | Hacksplaining

    Password Management | Hacksplaining

    14
  10. Reflected XSS | Hacksplaining

    Reflected XSS | Hacksplaining

    9
  11. User Enumeration | Can Hackers Enumerate Your Users? | Hacksplaining

    User Enumeration | Can Hackers Enumerate Your Users? | Hacksplaining

    26
Rumble logo