// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Learn more about artificial intelligence β†’ https://ibm.biz/BdaHAm

Meta releases Llama 3.2! In Episode 22 of Mixture of Experts, host Tim Hwang is joined by Maryam Ashoori, Skyler Speakman, and Shobhit Varshney to debrief an exciting week of AI news. First, Meta is back with the release of Llama 3.2, and lightweight (1B/3B) models. Next, it’s Climate Week NYC, we chat the use of gen AI in achieving sustainable development goals. Specifically, IBM and NASA’s AI model for weather and climate. Finally, the book version of β€œAI Snake Oil” officially dropped and the authors claim they will be wrong in 2.5 years. What do our experts think? Tune-in today to find out!

0:00 – Intro
1:08 – Llama 3.2
12:32 – AI Snake Oil
22:54 – Generative AI and sustainability

Subscribe for AI updates β†’ https://ibm.biz/BdaHAK
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Read More

What idea are you sitting on? Just make it: https://hostinger.com/networkchuck10 Use code: networkchuck for an extra 10% off

We created 24 websites in 24 hours. Some are dumb….some are kind of amazing.

Contest Terms and Conditions: https://github.com/theNetworkChuck/contests/blob/main/24_websites_t_c

πŸ”₯πŸ”₯Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Hostinger

SUPPORT NETWORKCHUCK
—————————————————
➑️NetworkChuck membership: https://ntck.co/Premium
β˜•β˜• COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

πŸ†˜πŸ†˜NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

#websites #ai

Read More

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Want to play with the technology yourself? Explore our interactive demo β†’ https://ibm.biz/BdK5Un
Learn more about the technologyΒ β†’ https://ibm.biz/BdK5Ue

Unlock the power of Recurrent Neural Networks (RNN) Whether you’re a beginner or looking to refresh your knowledge, this video will provide a clear and concise overview of RNNs, including their architecture, applications, and how they differ from other neural networks.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdK5Ub

#Recurrent Neural Networks #RNN #Deep Learning #Neural Networks

Read More

Download Docker Desktop: https://dockr.ly/3QpUF56
Docker Scout: https://dockr.ly/4b21qlO
Get started with Docker: https://dockr.ly/44siM8X

πŸš€ In this video, I dive deep into my Docker addiction and reveal 18 unconventional and powerful ways I use Docker every day. From running full GUI browsers in containers to setting up isolated hacking labs, these tips will transform how you think about Docker. Let’s get started!

πŸ”₯πŸ”₯Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Docker

SUPPORT NETWORKCHUCK
—————————————————
➑️NetworkChuck membership: https://ntck.co/Premium
β˜•β˜• COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

πŸ†˜πŸ†˜NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

18 Innovative Ways to Use Docker Daily
Running GUI Applications in Docker Containers
How to Run a Web Browser Inside Docker
Using Obsidian Note-Taking App via Docker
LibreOffice in Docker: Open-Source Office Suite Containerized
Contribute to Science: Folding@Home with Docker
Effortless Docker Management with Docker Desktop and Portainer
Secure Document Handling Using Dangerzone and Docker
Containerizing CLI Tools for a Clean System
Enhance Docker Security with Docker Scout
Set Up an Isolated Hacking Lab with Docker and Kali Linux
Master Docker Networks for Container Isolation
Automate Your Docker Workflows with Docker Compose
Explore New Operating Systems Using Docker Containers
Running macOS in a Docker Container (Educational Purposes)
How to Run Raspberry Pi OS via Docker
Access a Suite of IT Tools Inside a Docker Container
Using Docker to Containerize AI Tools like Fabric
Safely Test Applications with Docker Containers
Building Custom Docker Images from Scratch
Unconventional Docker Use Cases You Need to Know
Daily Docker Tips and Tricks for Enhanced Productivity
Beginner’s Guide to Advanced Docker Techniques
Boost Your IT Workflow with These Docker Hacks
Docker for Everyday Tasks: Beyond Development

#docker #containers #linux

Read More

To perform effective triage analysis, it is important to understand what your tools are telling – and what they aren’t. Since a large amount of malware is delivered in the PE file format, it’s even more important to understand common tools used to explore these files, along with important characteristics of the underlying file format. In this stream, we’ll discuss popular PE parsing and analysis tools such as Detect-It-Easy, PEStudio and Malcat, along with spending time in a hex-editor to understand the basic structure of these files.

πŸ”₯ Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

PODCAST: https://breakingthepod.com

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
0:00 0 – Intro
0:08 1 – MacOS Sequoia Breaks Security
01:21 2 – Arc’s First Security Incident
02:13 3 – Telegram to Comply
02:58 4 – Kaspersky Disperskies
04:27 5 – Outro

LINKS
πŸ”— Story 1: MacOS Sequoia Breaks Security
https://support.eset.com/en/alert8723-network-connection-lost-after-upgrading-to-macos-15-with-eset-macos-product-v6?ref=esf
https://infosec.exchange/@wdormann/113165768137802771
https://infosec.exchange/@wdormann/113149199491406975
https://waclaw.blog/macos-firewall-blocking-web-browsing-after-upgrading-to-sequoia/
https://forums.appleinsider.com/discussion/237698/macos-sequoia-causing-issues-with-third-party-security-tools-and-web-browsers
https://support.anydesk.com/knowledge/anydesk-on-macos
https://hackread.com/apples-macos-sequoia-update-breaks-security-tools/

πŸ”— Story 2: Arc’s First Security Incident
https://arc.net/blog/CVE-2024-45489-incident-response

πŸ”— Story 3: Telegram to Comply
https://www.404media.co/telegram-changes-policy-says-it-will-provide-user-data-to-authorities/

πŸ”— Story 4: Kaspersky Disperskies
https://forum.kaspersky.com/topic/kav-ultraav-software-no-notification-automatically-installs-and-cant-remove-it-50628/?page=2#comment-187103
https://www.bleepingcomputer.com/news/security/kaspersky-deletes-itself-installs-ultraav-antivirus-without-warning/?utm_content=buffer2fc99&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Follow me down the rabbit hole into the wonderful world of IT security.

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Related Videos:
https://www.youtube.com/watch?v=866olNIzbrk
https://www.youtube.com/watch?v=lKzsNp4AveY

Tweets:
https://twitter.com/LiveOverflow/status/1720734431659376995
https://twitter.com/LiveOverflow/status/1720799912181284864
https://twitter.com/LiveOverflow/status/1721493232310214910

Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf

Chapters:
00:00 – Intro
00:40 – Security Terminology
01:38 – Direct Database Access
03:40 – Introducing a Security Boundary
05:36 – Typical Web Security Vulnerabilities
07:03 – Clear-text Passwords in Database
09:28 – Security Weakness vs. Vulnerability
11:05 – Effective Mitigations
13:03 – Useless Mitigations
16:37 – Summary: Vulnerability vs. Weakness
19:00 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

A new technique to turn pictures of a scene into a 3D model is quick, easy and doesn’t require that much compute power! Dr Mike Pound and PhD student Lewis Stuart demo and explain.

Lewis used this Particle simulation in Unity: GitHub – keijiro/SplatVFX: https://github.com/keijiro/SplatVFX

NeRFStudio is here : https://docs.nerf.studio/index.html

Previous (nerf) video: https://youtu.be/wKsoGiENBHU

https://www.facebook.com/computerphile
https://twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: https://bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Thank you to Jane Street for their support of this channel. Learn more: https://www.janestreet.com

Read More

Download the guide: Realize the full value of your hybrid cloud for AIΒ β†’ https://ibm.biz/BdKUWy
Learn more about the technologyΒ β†’ https://ibm.biz/BdKUWM

Join Jamil Spain as he explores the different components of cloud architecture, including front-end, back-end, networking, and cloud delivery models. Dive into the details of SaaS (Software as a Service) and IaaS (Infrastructure as a Service), and find the benefits and trade-offs of public, private, and hybrid cloud models. Whether you’re a seasoned professional or just starting out, learn how to create a cloud architecture that drives success.

Sign up for a monthly newsletter for Cloud updates from IBM β†’ https://ibm.biz/BdKUWS

Read More

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Want to play with the technology yourself? Explore our interactive demo for watsonx.ai β†’ https://ibm.biz/Bdvu3f

Welcome to IBM Tech Now, a bi-weekly series bringing you the latest and greatest IBM technology news and announcements.

This week we’re covering the following topics:
(00:19) 1. IBM and Salesforce partnership: https://ibm.biz/itn-ibm-salesforce
(01:38) 2. Custom foundation models on watsonx.ai: https://ibm.biz/itn-custom-foundation-model
(02:44): 3. https://ibm.biz/itn-mixture-of-experts

Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes β†’ http://ibm.biz/subscribe-now

AI news moves fast. Sign up for the weekly Think newsletter β†’ https://ibm.biz/tech-now-think-newsletter

Read More