Пікірлер
@jimmyalsado2685
@jimmyalsado2685 4 күн бұрын
i am 33 years old and im struggling to make a powerpoint presentation in school
@vectoralphaSec
@vectoralphaSec Ай бұрын
Youre competing with criminals and the criminals dont rest, not when they are making bank money.
@MotionrunSuperSerious
@MotionrunSuperSerious Ай бұрын
get this man a pineapple because hes probably using only Linux with some basic wifi things
@nkosimfinley
@nkosimfinley 2 ай бұрын
🤓
@caravaz
@caravaz 3 ай бұрын
Good honest review
@sirk3v
@sirk3v 3 ай бұрын
cool stuff
@SecureNinjaTV
@SecureNinjaTV 3 ай бұрын
Thank you!
@SomenathChakraborty
@SomenathChakraborty 6 ай бұрын
Astounding!
@SecureNinjaTV
@SecureNinjaTV 6 ай бұрын
It was great fun to have it all to ourselves!
@SomenathChakraborty
@SomenathChakraborty 6 ай бұрын
Impressive, Thank you for making this tour video of computing History.
@SecureNinjaTV
@SecureNinjaTV 6 ай бұрын
Glad you enjoyed it!
@CyberHAC100k
@CyberHAC100k 6 ай бұрын
the production is great but why so low views...youtube
@SecureNinjaTV
@SecureNinjaTV 6 ай бұрын
We appreciate you watching! Check out our archive--we've been producing content since 2011!
@ChibiKeruchan
@ChibiKeruchan 6 ай бұрын
I wish they can add a very small storage in it like an encrypted 500mb storage perfect for storing notepads.
@xelerated
@xelerated 7 ай бұрын
oh my, Ive used DNS for exfil in pen test for like nearly 15 years. and in those 15 years only 1 company made it difficult, but not impossible to do it. its a massive blind spot, so are Zero Trust network layer tools. I also use 1 in my deployed linux systems to customers internal networks. They never have to whitelist any IP or port and I have full access. Zero Trust is a sham.
@radolfrj7136
@radolfrj7136 7 ай бұрын
Hello sir/madam i'm from srilanka In srilanka my life alone life with sounds in my ears both face in srilanka famous people enter my family life and put sounds in my ears in my room president ranil wikrmasinha?singer romesh sugathapala? Singer amal perera?only mind brain use find my ears and body daily find unknown human body machine user actress harshi rasanga,actress dishni rajapaksha, singer Justin Beiber?Singer rukantha gunathilaka,singer sanuka wikrmasinha,actor randika gunathilaka ,actor mahendra perera,singer kanchana anuradhi,actress winu siriwardhana,singer dinesh tharanga Himasha h asanthika 1999.02.16
@kevinkawchak
@kevinkawchak 8 ай бұрын
Thank you
@nerajjha2875
@nerajjha2875 8 ай бұрын
Noice i loved it
@fotografm
@fotografm 8 ай бұрын
Nice video but it's a shame they didn't share his screen !
@atracamoniusvlogs
@atracamoniusvlogs 8 ай бұрын
Dubai cybersceurity al barsha south en ebuedfvtv dominicano
@buttercat4642
@buttercat4642 8 ай бұрын
womp
@RedStoneRealm_official
@RedStoneRealm_official 9 ай бұрын
One day he will be come a master of Ethical hacking system!
@StockEncoder
@StockEncoder 9 ай бұрын
Avoid . You will end up with headache among headaches and zero support.
@deidresowerby4687
@deidresowerby4687 9 ай бұрын
Still so revelant
@jvianneyjr
@jvianneyjr 9 ай бұрын
What's the Best yubikey 5 NFC or yubikey security key NFC? Whats the diference?
@momo_hit
@momo_hit 9 ай бұрын
And he is our descent. Sanatan Dharma! Bring betterment for the world. May you always be blessed.
@user-nt9mq7rt2z
@user-nt9mq7rt2z 10 ай бұрын
bro i can do more than that at age of 13
@supersu1655
@supersu1655 5 ай бұрын
Lol
@gran-roan
@gran-roan 10 ай бұрын
7 years ago. Totally missed it
@Leilasworld
@Leilasworld 10 ай бұрын
Hello, thank you for the closer look at the yubikey! I was wondering if you might be able to clarify something for me? , I have purchased some yubikeys and set them up from home for my various online accounts, what happens if I travel internationally, on vacation for example, will the keys still work if I am now logging online with my same laptop BUT from a different internet address (different ISP address)? Also, what about if I am logging online from a different internet address, in the same travel scenario above, BUT also with a different device? Thank you!
@mithunpranav9506
@mithunpranav9506 11 ай бұрын
being a kid myself this is my actual dream im nine years old by the way
@salahmimito5080
@salahmimito5080 11 ай бұрын
gooooooooooooooooooooooooooooooooooooooooooodddddddd
@SecureNinjaTV
@SecureNinjaTV 11 ай бұрын
🥷
@lee_carter
@lee_carter Жыл бұрын
What a great piece of tech.... thanks for sharing
@SecureNinjaTV
@SecureNinjaTV Жыл бұрын
Thanks for watching! Agreed, it is an elegant solution.
@WN_Byers
@WN_Byers Жыл бұрын
Interesting how they utilize the same cide names for many projects; I assume to cause confusion and muddy any trails. Example: PRISM
@my-rules
@my-rules Жыл бұрын
@apprenticebill7116
@apprenticebill7116 Жыл бұрын
how bout just not throttling the fire fighters. "customer service error" , how many jobs i would still have if all my screw ups were simply a "customer service error"
@michaelconstable8400
@michaelconstable8400 Жыл бұрын
Why is this self important woman with the big tits involved?
@roywastaken
@roywastaken Жыл бұрын
nice!
@jagathfernando934
@jagathfernando934 Жыл бұрын
Family looks like srilankans
@abhijteoebhtuji
@abhijteoebhtuji Жыл бұрын
I really like his hacking and Reuben Paul give me a cloud pet I really like it
@reylove33
@reylove33 Жыл бұрын
This guy is dark. Dangerous.
@leeduhart105
@leeduhart105 Жыл бұрын
aren't you worried about the water snake?
@KenSherman
@KenSherman Жыл бұрын
This guy's doing at a significantly young age what took professionals years, decade(s), or career(s) to do. Particularly, I can('t) imagine all the haters he's getting & would get in addition to the admirers.😅 I hope our society would continue to encourage him & others alike & I hope the very best for this bright mind! 2:17-3:05 What a very intelligent & wise response!🤓🦉
@kartikgitm
@kartikgitm Жыл бұрын
Fair play!
@EngMohammedNagieb
@EngMohammedNagieb Жыл бұрын
The types of countermeasures and safeguards used to protect against emanation attacks are known as TEMPEST countermeasures. TEMPEST was originally a government research study aimed at protecting electronic equipment from the electromagnetic pulse (EMP) emitted during nuclear explosions. It has since expanded to a general study of monitoring emanations and preventing their interception. Simply because of the kinds of electronic components from which they’re built, many computer hardware devices emit electromagnetic (EM) radiation during normal operation. The process of communicating with other machines or peripheral equipment creates emanations that can be intercepted. These emanation leaks can cause serious security issues but are generally easy to address. TEMPEST-derived technology allows the electronic emanations that devices produce (known as Van Eck radiation) to be read from a distance (this process is known as Van Eck phreaking). TEMPEST eavesdropping or Van Eck phreaking countermeasures include the following: Faraday Cage A Faraday cage is a box, mobile room, or entire building designed with an external metal skin, often a wire mesh that fully surrounds an area on all sides. This metal skin acts as an EM absorbing capacitor that prevents electromagnetic signals (emanations) from exiting or entering the area that the cage encloses. Faraday cages can be designed to block specific frequencies while allowing others-for example, blocking Wi-Fi while allowing walkie talkies and mobile phones. White Noise White noise simply means broadcasting false traffic to mask and hide the presence of real emanations. White noise can consist of a real signal from another source that is not confidential, a constant signal at a specific frequency, a randomly variable signal, or even a jam signal that causes interception equipment to fail. Although this is similar to jamming devices, the purpose is to convolute the signal only for the eavesdropper, not the authorized user, rather than stopping even valid uses of emanations. White noise describes any random sound, signal, or process that can drown out meaningful information. This can vary from audible frequencies to inaudible electronic transmissions, and it may even involve the deliberate act of creating line or traffic noise to disguise origins or disrupt listening devices.
@deadguydontcomeback
@deadguydontcomeback Жыл бұрын
But who else having electronic teddy bear?
@deadguydontcomeback
@deadguydontcomeback Жыл бұрын
Now i realised that why my teddy bear was looking at me when I was taking bath
@samueljoshuaowusu
@samueljoshuaowusu Жыл бұрын
pretty good
@VRKtaka
@VRKtaka Жыл бұрын
🙌👍👍
@elliott2971
@elliott2971 Жыл бұрын
❗ Promo SM!!
@albertma413
@albertma413 Жыл бұрын
Technically I was a hacker at 5 but who is counting lmao. When I was in preschool my parents thought I was watching too much Sesame Street so what they did was put a lock on the Light switch the kind that are used in commercial buildings. What I did was lockpicked it. Lol
@stephjackson
@stephjackson Жыл бұрын
Embarrassing for a few fishing adult males who keep telling their wives they need psychological help for this while young kids are getting ahead of mine in safety and knowledge..so embarrassing!!! I feel so bad for my children ..go on young ones educate yourself on this! Proud of them!
@johnreinermarcos
@johnreinermarcos Жыл бұрын
Ggh
@mr_trojan
@mr_trojan Жыл бұрын
how i can learn wifi hacking.
@marklampo8164
@marklampo8164 Жыл бұрын
The lore is growing like "tales of PCP and DMT!" Those "six figure jobs" quickly become 40K jobs because you're "just not worth that kind of money!" Deja Vu all over again, Yogi! A flood of "talent" into a vacuum makes for the new lore; "The more you know in this biz, the LESS you get paid! How the F did that happen?!"