GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's PGP cryptographic software suite. The software is compliant with RFC 4880, the IETF standards-track specification of OpenPGP. Modern versions of PGP are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is part of the GNU Project and received major funding from the German government in 1999. (Wikipedia).
Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.
From playlist Network Security
Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.
From playlist Network Security
Best Linux Distributions For Penetration Testing
Hey Guys! HackerSploit here back again with another video, in this video, i am going to be showing you the best Linux Distros For Ethical hacking. A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer ne
From playlist Linux
How to protect your computer from malware and hackers 2017 | Malware protection tutorial
Please watch: "How Facebook targeted advertisements track you online, offline and where they sell your private data" https://www.youtube.com/watch?v=9sFl2qGedFQ -~-~~-~~~-~~-~- How to protect your computer from malware and hackers in 2017? Protection against malware and viruses is often
From playlist TUTORIALS & HOW TO's
Staysafe.org: Protect your computer
The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer
From playlist awareness
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to use PGP on Windows and Linux with Gpg4win and GnuPG. Links Used In Video: gpg4win: https://www.gpg4win.org HACKERSPLOIT WEBSITE: https://hsploit.com/ ⭐SUPPORT HACKERSPLOIT BY USING THE
From playlist Ethical Hacking & Penetration Testing - Complete Course
What do we mean by device security? Why should we care about this?
Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.
From playlist Internet Safety
GRCon21 - Keynote: Future Interference Management, Future Spectrum Monitoring
Presented by John Chapin at GNU Radio Conference 2021
From playlist GRCon 2021
Shell Scripting - File Encrypter/Decrypter
Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr
From playlist Shell Scripting
29C3: The Tor software ecosystem (EN)
Speakers: Roger Dingledine | Jacob Appelbaum At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of projects -- browser extensions to patch Firefox and Thunderbird's privacy
From playlist 29C3: Not my department
Black Hat USA 2010: Attacking Phone Privacy 1/5
Speaker: Karsten Nohl Our most popular phone technologies use decade-old proprietary cryptography. GSM's 64bit A5/1 cipher, for instance, is vulnerable to time memory trade-offs but commercial cracking hardware costs hundreds of thousands of dollars. We discuss how cryptographic improveme
From playlist BH USA 2010 - PRIVACY
How to use Facebook anonymously | Stop Facebook tracking | Protect yourself from hackers and doxxing
Do you know how to use Facebook anonymously? Facebook tracks you all over the web and to regain your online privacy, you need stop Facebook tracking mechanisms. In this video, you'll learn how to stop Facebook tracking. How much Facebook knows about you? Everything: https://youtu.be/9sFl
From playlist TUTORIALS & HOW TO's
Privacy: The Next Frontier - Ari Gesher
From OSCON 2015 in Amsterdam: Open Source technologies – from GNU, to Linux, Apache, Hadoop, and Spark – have played a role in democratizing access to capabilities and transforming how the world views and solves whole classes of problems. In our increasingly networked and recorded world,
From playlist OSCON - Amsterdam 2015
Facebook: Adjusting Your Privacy Settings
In this video, you’ll learn more about adjusting your privacy settings in Facebook. Visit https://www.gcflearnfree.org/facebook101/adjusting-your-privacy-settings/1/ for our text-based lesson. This video includes information on: • Using Facebook's privacy settings • Blocking unwanted comm
From playlist Facebook
How to stop Twitter from tracking you for censorship | Security by compartmentalization tutorial
Twitter announced that it will track its users browsing history and spy on their activity outside of Twitter, so that they can better censor opinions and people they disagree with. This is Twitter's official censorship and surveillance campaign. I present you with an easy solution that wil
From playlist TUTORIALS & HOW TO's
F-Droid - All Of Android Free (and Open Source) Software in One Place
F-Droid is a repository of Free and Open Source apps for Android. It's your first step on the journey to improve your smartphone privacy and security. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC1w
From playlist TUTORIALS & HOW TO's
070 - Solubility In this video Paul Andersen explains how the dissolution of a solute in a solution can be explained as a reversible reaction. Bonds in the solid solute are broken and the ions are dissolved in a solution. The Ksp (or solubility product constant) can be used to explain t
From playlist AP Chemistry Video Essentials
Shmoocon 2010: GSM: SRSLY? 1/6
Clip 1/6 Speakers: Chris Paget and Karsten Nohl The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM's security hasn't received the scrutiny it deserves given its popularity. This bothere
From playlist ShmooCon 2010
Cloud Security Tutorial - Cloud Encryption Services
Learn best practices for keeping your data in the cloud safe and secure. Explore more Cloud Security courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/cloud-security?u=0?trk=sme-youtube_M136048R124-15-06_learning&src=yt-other This is an excerpt
From playlist IT Security