ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,037 results

Chrome for Developers
What are source maps? #DevToolsTips

Join Jecelyn in this episode of DevTools Tips and discover how source maps can improve your debugging workflow. Learn why ...

6:26
What are source maps? #DevToolsTips

31,414 views

2 years ago

DeepSource
Detect hardcoded secrets in source code | DeepSource

Hardcoding credentials in code is never a good idea. If your source code falls into the hands of a malicious entity, they can use ...

1:12
Detect hardcoded secrets in source code | DeepSource

5,963 views

4 years ago

All Systems Go!
Microcontroller Firmware from Scratch

https://media.ccc.de/v/ASG2019-161-microcontroller-firmware-from-scratch Follow a journey of writing STM32 microcontroller ...

25:52
Microcontroller Firmware from Scratch

51,343 views

6 years ago

Richter Overtime
Explaining TF2's Biggest Leak Ever

Some crazy TF2 news today. Sorry for the horrible thumbnail. Support Richter Overtime on Patreon: ...

4:37
Explaining TF2's Biggest Leak Ever

518,706 views

3 years ago

TEDx Talks
Free software, free society: Richard Stallman at TEDxGeneva 2014

It is the first TEDx talk of the founder of Free Software movement. Stallman, RMS for short, has changed the world with his vision of ...

13:40
Free software, free society: Richard Stallman at TEDxGeneva 2014

469,923 views

11 years ago

Software Preservation Network
Episode 4: Working with Source Code and Software Licenses

In the fourth episode in our seven-part series about using the Code of Best Practices in Fair Use, you'll learn speakers explore ...

1:01:07
Episode 4: Working with Source Code and Software Licenses

83 views

6 years ago

DEFCONConference
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk

In this talk, I'll reveal my strategy for pinpointing manipulation targets in Android's source code. I will describe how I craft ...

41:59
DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk

35,638 views

2 years ago

Confreaks
RailsConf 2017: Perusing the Rails Source Code - A Beginners Guide by Alex Kitchens

RailsConf 2017: Perusing the Rails Source Code - A Beginners Guide by Alex Kitchens Open source projects like Rails are ...

38:45
RailsConf 2017: Perusing the Rails Source Code - A Beginners Guide by Alex Kitchens

8,525 views

8 years ago

Danielle Thé
What is Open Source? // your phone probably runs it! (with LEGO)

What is open source? How does it make money? What are use cases for open source? We break down how Open Source works, ...

4:00
What is Open Source? // your phone probably runs it! (with LEGO)

36,486 views

9 years ago

All Systems Go!
2017 Streamlining systemd's code and safety

https://media.ccc.de/c/asg2017/ASG2017-124-streamlining_systemd_s_code_and_safety Today, the systemd project uses a ...

26:55
2017 Streamlining systemd's code and safety

110 views

8 years ago

Soham Patil
How To View The Source Code Of Any Website

SUBSCRIBE HERE http://bit.ly/2yRGcZa VISIT MY OFFICIAL WEBSITE http://bit.ly/2xDlkDv.

5:02
How To View The Source Code Of Any Website

29 views

8 years ago

Microsoft Visual Studio
Source Generators in C#

Source Generators are a new C# feature currently in preview that runs during compilation and can inspect your program to ...

38:32
Source Generators in C#

12,786 views

5 years ago

Genetic Improvement Workshop
Generating Objected-Oriented Source Code Using Genetic Programming

Using machine learning to generate source code is an active and highly important research area. It has been shown that genetic ...

16:06
Generating Objected-Oriented Source Code Using Genetic Programming

147 views

4 years ago

Cointelegraph
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

We explain what smart contracts are and how they work. #Cointelegraph #crypto #smartcontracts Subscribe to Cointelegraph: ...

6:14
Smart contracts for beginners, explained (in 6 minutes) | Cryptopedia

72,661 views

3 years ago

Cinemation - Movie Recaps
This Man Outsmarted The Whole NSA and Released their Illegal Surveillance Techniques

Movie Title: SNOWDEN (2016) The NSA's illegal surveillance techniques are leaked to the public by one of the agency's ...

11:07
This Man Outsmarted The Whole NSA and Released their Illegal Surveillance Techniques

82 views

4 years ago

Chrome for Developers
Debugging JavaScript - Chrome DevTools 101

If you're still using console.log() to find and fix JavaScript issues, you might be spending more time debugging than you need to.

7:28
Debugging JavaScript - Chrome DevTools 101

901,809 views

8 years ago

Chrome for Developers
Source Map Explorer, Totally Tooling Tips (S3, E13)

Learn how to audit what's in your JavaScript bundles that could use some trimming using tools like Source Map Explorer in a new ...

3:26
Source Map Explorer, Totally Tooling Tips (S3, E13)

42,157 views

9 years ago

Sprouts
The Legal Systems We Live In Today

There are two main types of legal systems in the world: Common Law and Civil law. Civil Law is characterized by thinking on the ...

4:55
The Legal Systems We Live In Today

210,156 views

3 years ago

osswatch
Getting Started in Open Source Software

Scott Wilson and Mark Johnson of OSS Watch discuss how to engage with and contribute to open source projects, including ...

34:21
Getting Started in Open Source Software

3,131 views

12 years ago

Meow's Cafe
📕I failed as my target kissed the transfer—but my system died, killed by someone I never expected

Story Synopsis: Stricken with a terminal illness, I had no choice but to conquer Willow, only because I was bound to a simp system ...

44:28
📕I failed as my target kissed the transfer—but my system died, killed by someone I never expected

7,084 views

11 hours ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

This can give them access to administrator panels and malware source code, and result in the identity of threat actors being ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,137 views

2 years ago

Furkan Sarıhan
I BUILT My Game Engine, And YOU Can Too! 💪 (Part 1)

The first 500 people to use my link https://skl.sh/furkansarhan11241 will get a 1 month free trial of Skillshare premium! Welcome to ...

7:34
I BUILT My Game Engine, And YOU Can Too! 💪 (Part 1)

59,113 views

1 year ago

Jon Gjengset
Decrusting the serde crate

In this stream, we peel back the crust on the serde crate — https://github.com/serde-rs/serde/ — and explore its interface, structure, ...

1:51:21
Decrusting the serde crate

77,941 views

3 years ago