Free file comparison tools

Cmp (Unix)

In computing, cmp is a command-line utility on Unix and Unix-like operating systems that compares two files of any type and writes the results to the standard output. By default, cmp is silent if the files are the same; if they differ, the byte and line number at which the first difference occurred is reported. The command is also available in the OS-9 shell. (Wikipedia).

Cmp (Unix)
Video thumbnail

Zenmap Tutorial For Beginners

Welcome to Zenmap for beginners! Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users Nm

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Nmap Tutorial For Beginners - 3 - Aggressive Scanning

Welcome to Nmap for beginners! Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. OS Compatibility: Linux,Windows & Mac( Pre-Installed in Kali linux,BlackArch & parrot OS) Commands used: ----------------------------- nmap --hel

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Nmap Tutorial For Beginners - 2 - Advanced Scanning

Welcome to Nmap for beginners! Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. OS Compatibility: Linux,Windows & Mac( Pre-Installed in Kali linux,BlackArch & parrot OS) Commands used: ----------------------------- nmap --hel

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Nmap - UDP Scanning

In this video, I demonstrate how to perform UDP scanning with Nmap, and how it differs from TCP. Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap pro

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Dissecting the AMD Platform Security Processor

The AMD Platform Security Processor (PSP) is a security subsystem in AMD CPUs comparable to the Intel ME and was introduced in 2013. It is essential for system startup – in fact, in runs before the main processor is even started – and offers runtime services to the main processor. For this

From playlist Security

Video thumbnail

Lecture 5 | Programming Paradigms (Stanford)

Lecture by Professor Jerry Cain for Programming Paradigms (CS107) in the Stanford University Computer Science department. In this lecture, Prof. Cain focuses on linear search and stack within the C programming language. Programming Paradigms (CS107) introduces several programming langu

From playlist Lecture Collection | Programming Paradigms

Video thumbnail

Nmap - Scan Timing And Performance

In this video, I demonstrate how to optimize, speed up, and slow down your Nmap scans based on the type of network environment or target you are dealing with. Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer ne

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Lec 16 | MIT 6.00 Introduction to Computer Science and Programming, Fall 2008

Lecture 16: Encapsulation, inheritance, shadowing Instructors: Prof. Eric Grimson, Prof. John Guttag View the complete course at: http://ocw.mit.edu/6-00F08 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.00 Intro to Computer Science & Programming, Fall 2008

Video thumbnail

Lec 5 | MIT 6.172 Performance Engineering of Software Systems, Fall 2010

Lecture 5: Performance Engineering with Profiling Tools Instructor: Reid Kleckner, John Dong, Saman Amarasinghe View the complete course: http://ocw.mit.edu/6-172F10 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.172 Performance Engineering of Software Systems

Video thumbnail

Lec 15 | MIT 6.00 Introduction to Computer Science and Programming, Fall 2008

Lecture 15: Abstract data types, classes and methods Instructors: Prof. Eric Grimson, Prof. John Guttag View the complete course at: http://ocw.mit.edu/6-00F08 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.00 Intro to Computer Science & Programming, Fall 2008

Video thumbnail

Live CEOing Ep 18: NetworkPacketCapture in the Wolfram Language

Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about NetworkPacketCapture in the Wolfram Language.

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Frank Verstraete: "Algorithms for continuous matrix product states"

Tensor Methods and Emerging Applications to the Physical and Data Sciences 2021 Workshop II: Tensor Network States and Applications "Algorithms for continuous matrix product states" Frank Verstraete - Ghent University Abstract: This talk will give an overview of state of the art algorith

From playlist Tensor Methods and Emerging Applications to the Physical and Data Sciences 2021

Video thumbnail

Shell Scripting - For Loops

Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr

From playlist Shell Scripting

Video thumbnail

Optogenetic Modulation of Real-time Nanoscale Dynamics of HCN Channels Using... Mini Jose

DISCUSSION MEETING : APS SATELLITE MEETING AT ICTS ORGANIZERS : Ranjini Bandyopadhyay (RRI, India), Subhro Bhattacharjee (ICTS-TIFR, India), Arindam Ghosh (IISc, India), Shobhana Narasimhan (JNCASR, India) and Sumantra Sarkar (IISc, India) DATE & TIME: 15 March 2022 to 18 March 2022 VEN

From playlist APS Satellite Meeting at ICTS-2022

Video thumbnail

Lec 2 | MIT 2.830J Control of Manufacturing Processes, S08

Lecture 2: Semiconductor process variation Instructor: Duane Boning, David Hardt View the complete course at: http://ocw.mit.edu/2-830JS08 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 2.830J, Control of Manufacturing Processes S08

Video thumbnail

Walking Robot Pattern Generation

Join Sebastian Castro and Carlos Santacruz-Rosero as they discuss the foundations of model-based walking control design for legged humanoid robots. These include the simplified linear inverted pendulum model and the concept of zero-moment point (ZMP). - Model Predictive Control Toolbox:

From playlist Modeling, Simulation and Control: MATLAB and Simulink Robotics Arena

Video thumbnail

The Green Line: The Wall that Stands Between Two Warring Factions | Real Stories

July 1974, Cyprus descends into a conflict; a decade and more of clashes between the Turkish Cypriots and the Greek Cypriots on the island had culminated in an all-out war. Within weeks, a ceasefire was agreed and a buffer zone was established to keep the warring factions apart. Shot in

From playlist Extraordinary Places

Video thumbnail

Shell Scripting - Password Generator

Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr

From playlist Shell Scripting

Related pages

Byte | Comparison of file comparison tools