1. Microsoft Engineer Discovers "Smart Thermostat" In Georgia Tabulation Room Reporting Votes To China

    Microsoft Engineer Discovers "Smart Thermostat" In Georgia Tabulation Room Reporting Votes To China

    81
    0
    740
    3
  2. What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    128
  3. How to install Parrot 5.0 Home Edition.

    How to install Parrot 5.0 Home Edition.

    29
    6
    44
  4. Parrot 5.0 Home Edition overview | designed for developers and everyday users.

    Parrot 5.0 Home Edition overview | designed for developers and everyday users.

    13
    3
    34
  5. How to install Parrot 5.1 Security Edition

    How to install Parrot 5.1 Security Edition

    31
  6. Parrot 5.1 Security Edition overview | designed for Penetration Testing and Red Team operations.

    Parrot 5.1 Security Edition overview | designed for Penetration Testing and Red Team operations.

    30
  7. Professor Norman Fenton questions vaccine data analysis - 28 July 2022

    Professor Norman Fenton questions vaccine data analysis - 28 July 2022

    4
    0
    190
  8. Student Work(Assignment) DV1457Unix File Handling & Permissions| Blekinge Institute of Technology

    Student Work(Assignment) DV1457Unix File Handling & Permissions| Blekinge Institute of Technology

    34
    1
  9. Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

    Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

    2
    0
    280
  10. Parrot 6.0 Home Edition overview | designed for developers and everyday users.

    Parrot 6.0 Home Edition overview | designed for developers and everyday users.

    7
  11. How to install Parrot 6.0 Home Edition

    How to install Parrot 6.0 Home Edition

    7
  12. What is Sniffing? | Types of Sniffing | Sniffing Techniques

    What is Sniffing? | Types of Sniffing | Sniffing Techniques

    173
  13. What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

    What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

    2
    0
    112
  14. What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

    What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

    209
  15. How to install Kali Linux Xfce 2022.4

    How to install Kali Linux Xfce 2022.4

    60
  16. Kali Linux Xfce 2022.4 overview | The most advanced Penetration Testing Distribution.

    Kali Linux Xfce 2022.4 overview | The most advanced Penetration Testing Distribution.

    2
    0
    83
  17. What is Nmap and How will it Work? | Banner Grabbing | Scan Beyond IDS and Firewall

    What is Nmap and How will it Work? | Banner Grabbing | Scan Beyond IDS and Firewall

    95
  18. What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

    What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

    199
  19. Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

    Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

    385
  20. Become a MASTER Ethical Hacker in 2024

    Become a MASTER Ethical Hacker in 2024

    53