Genetic algorithms | Artificial life
The weasel program or Dawkins' weasel is a thought experiment and a variety of computer simulations illustrating it. Their aim is to demonstrate that the process that drives evolutionary systems—random variation combined with non-random cumulative selection—is different from pure chance. The thought experiment was formulated by Richard Dawkins, and the first simulation written by him; various other implementations of the program have been written by others. (Wikipedia).
Wireshark Tutorial for Beginners - Overview of the environment
Wireshark Tutorial for Beginners, become an advanced Wireshark user today! How to scan for packets in wireshhark and how to customize the layout in Wireshark. Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications
From playlist Wireshark
An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org
From playlist The Internet
Netcat Tutorial - The Swiss Army Knife Of Networking - Reverse Shell
Netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. Netcat is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature
From playlist Ethical Hacking & Penetration Testing - Complete Course
The Wolfram Compiler is a long-term project for the compilation of Wolfram Language programs. It converts Wolfram Language into native machine code and provides a faster execution path as well as many opportunities for innovative programming features. It is used for an increasing amount of
From playlist Wolfram Technology Conference 2021
Shell Scripting - Ping Sweep Script
Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr
From playlist Shell Scripting
The Wolfram Compiler converts Wolfram Language code into native machine instructions that run directly on the machine hardware. It offers a powerful way to speed up programs and provides many opportunities for innovative programming features such as building connections to external librari
From playlist Wolfram Technology Conference 2022
Hacker Simulator Walkthrough - Episode 2 - Leveling Up
Become a hacker and build your online reputation to the top by discovering a simplified and enjoyable version of real-life hacking methods. Complete contracts, buy new programs, upgrade your computer, crack networks and infiltrate people's or companies online systems. //LINKS Steam Link:
From playlist Hacker Simulator
Mountain Men: Tom’s Big Trap is Unleashed! (Season 10) | History
Tom checks on his traps to see if an unexpected opportunity has paid off. Meanwhile, Nancy works on homemade goods, in this clip from Season 10, "Coyote Showdown." New Season Thursday, June 3rd at 8/7c Watch all new episodes of Mountain Men, Thursdays at 8/7c, and stay up to date on all
From playlist Mountain Men: Season 10 | New Episodes Thursdays at 10/9c | History
The Wild Weasels - When Electronic Warfare Became Real
https://brilliant.org/CuriousDroid In many ways the story of the Wild Weasels is the story of the beginnings of electronic warfare between the radar crew on the ground and the weasels in the air. This was also the first time that electronics had been used to find targets actively during a
From playlist Weapons
Mountain Men: HOW TO CATCH A BLACK BEAR (Season 11)
Tom gives a lesson in weasel hunting. Meanwhile, the Youren brothers are on a mission to track down a back bear, in this clip from Season 11, "Bear Lair." Love Mountain Men? Stay up to date on all of your favorite The HISTORY Channel shows at history.com/schedule. #MountainMen Subscribe
From playlist Mountain Men: Season 11 | New Episodes Thursdays at 10/9c | History
Wangwriter Pt.3 – It Runs Zork!
This is bananas, I thought it would be months before we had something usable happening with the Wangwriter, but 256byteram is an absolute legend and got some really special stuff cooked up for us in this episode! But, there’s a few things we gotta fix first, so let’s hop into and get this
From playlist Wangwriter
Mountain Men: Tom FIGHTS for Survival in BRUTAL Conditions *Season 10 Marathon*
Tom braves the harsh winter and fights to eke out a profit - and continue a way of life, in this Season 10 Marathon. Love Mountain Men? Stay up to date on all of your favorite The HISTORY Channel shows at history.com/schedule. #MountainMen Subscribe for more from Mountain Men and other
From playlist Mountain Men: Season 10 | New Episodes Thursdays at 10/9c | History
Shell Scripting - If & If/else
Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr
From playlist Shell Scripting
Hare Hair & Fuzzy Bunnies | SciShow Talk Show
Dr. Scott Mills joins Hank to talk about studying color changing fur and evolutionary conservation. Scott and graduate student Lindsey Barnard bring a snowshoe hare and Jessi from Animal Wonders brings two Netherland Dwarf rabbits. Scott's Website: http://www.umt.edu/research/millslab/ An
From playlist SciShow Talk Show
Mountain Men: Tom Battles the Start of the Season Alone (Season 10) | History
Tom begins setting his first traps of the season in the rugged Northern Rockies, but he has to head out alone due to the pandemic forcing him to work smarter, not harder, in this clip from Season 10, "Hunt to Survive." #MountainMen Subscribe for more from Mountain Men and other great The
From playlist Mountain Men: Season 10 | New Episodes Thursdays at 10/9c | History
Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr
From playlist Shell Scripting
Black Hat USA 2010: Hacker Court part2 2/5
MyTwitFace is a social networking service. Militant head of security buys Ambiguous Manage monitoring software for the company to monitor every employee's laptop, but the software is exploitable (similar to Lower Marion school software, Absolute Manage). Coder on open source competitor ha
From playlist BH USA 2010 - SPECIAL EVENTS
DEFCON 19: Economics of Password Cracking in the GPU Era
Speaker: Robert "Hackajar" Imhoff-Dousharm SanDisk Corporation As this shift to "General Computing" and working in the cloud has accelerated in the last 4 years, so has the ability to take advantage of these technologies from an Information Security vantage point. This could not be more a
From playlist DEFCON 19
Visualize air pressure | Wiggle Pressure - Science Snack Activity
Visualize air pressure with the help of a wiggling, wobbling, self-rolling pet toy. Air molecules are too small to see, so it can be hard to imagine how they can apply forces and create pressure. Self-rolling pet toys can wiggle around erratically, pushing and moving objects a lot like ai
From playlist Science Snacks | Exploratorium
Advanced Programming with the Wolfram Compiler
The Wolfram Compiler is a long-term project for the compilation of Wolfram Language programs. It converts Wolfram Language into native machine code and provides a faster execution path as well as many opportunities for innovative programming features. It is used for an increasing amount of
From playlist Wolfram Technology Conference 2021