i am 33 years old and im struggling to make a powerpoint presentation in school
@vectoralphaSecАй бұрын
Youre competing with criminals and the criminals dont rest, not when they are making bank money.
@MotionrunSuperSeriousАй бұрын
get this man a pineapple because hes probably using only Linux with some basic wifi things
@nkosimfinley2 ай бұрын
🤓
@caravaz3 ай бұрын
Good honest review
@sirk3v3 ай бұрын
cool stuff
@SecureNinjaTV3 ай бұрын
Thank you!
@SomenathChakraborty6 ай бұрын
Astounding!
@SecureNinjaTV6 ай бұрын
It was great fun to have it all to ourselves!
@SomenathChakraborty6 ай бұрын
Impressive, Thank you for making this tour video of computing History.
@SecureNinjaTV6 ай бұрын
Glad you enjoyed it!
@CyberHAC100k6 ай бұрын
the production is great but why so low views...youtube
@SecureNinjaTV6 ай бұрын
We appreciate you watching! Check out our archive--we've been producing content since 2011!
@ChibiKeruchan6 ай бұрын
I wish they can add a very small storage in it like an encrypted 500mb storage perfect for storing notepads.
@xelerated7 ай бұрын
oh my, Ive used DNS for exfil in pen test for like nearly 15 years. and in those 15 years only 1 company made it difficult, but not impossible to do it. its a massive blind spot, so are Zero Trust network layer tools. I also use 1 in my deployed linux systems to customers internal networks. They never have to whitelist any IP or port and I have full access. Zero Trust is a sham.
@radolfrj71367 ай бұрын
Hello sir/madam i'm from srilanka In srilanka my life alone life with sounds in my ears both face in srilanka famous people enter my family life and put sounds in my ears in my room president ranil wikrmasinha?singer romesh sugathapala? Singer amal perera?only mind brain use find my ears and body daily find unknown human body machine user actress harshi rasanga,actress dishni rajapaksha, singer Justin Beiber?Singer rukantha gunathilaka,singer sanuka wikrmasinha,actor randika gunathilaka ,actor mahendra perera,singer kanchana anuradhi,actress winu siriwardhana,singer dinesh tharanga Himasha h asanthika 1999.02.16
@kevinkawchak8 ай бұрын
Thank you
@nerajjha28758 ай бұрын
Noice i loved it
@fotografm8 ай бұрын
Nice video but it's a shame they didn't share his screen !
@atracamoniusvlogs8 ай бұрын
Dubai cybersceurity al barsha south en ebuedfvtv dominicano
@buttercat46428 ай бұрын
womp
@RedStoneRealm_official9 ай бұрын
One day he will be come a master of Ethical hacking system!
@StockEncoder9 ай бұрын
Avoid . You will end up with headache among headaches and zero support.
@deidresowerby46879 ай бұрын
Still so revelant
@jvianneyjr9 ай бұрын
What's the Best yubikey 5 NFC or yubikey security key NFC? Whats the diference?
@momo_hit9 ай бұрын
And he is our descent. Sanatan Dharma! Bring betterment for the world. May you always be blessed.
@user-nt9mq7rt2z10 ай бұрын
bro i can do more than that at age of 13
@supersu16555 ай бұрын
Lol
@gran-roan10 ай бұрын
7 years ago. Totally missed it
@Leilasworld10 ай бұрын
Hello, thank you for the closer look at the yubikey! I was wondering if you might be able to clarify something for me? , I have purchased some yubikeys and set them up from home for my various online accounts, what happens if I travel internationally, on vacation for example, will the keys still work if I am now logging online with my same laptop BUT from a different internet address (different ISP address)? Also, what about if I am logging online from a different internet address, in the same travel scenario above, BUT also with a different device? Thank you!
@mithunpranav950611 ай бұрын
being a kid myself this is my actual dream im nine years old by the way
Thanks for watching! Agreed, it is an elegant solution.
@WN_Byers Жыл бұрын
Interesting how they utilize the same cide names for many projects; I assume to cause confusion and muddy any trails. Example: PRISM
@my-rules Жыл бұрын
@apprenticebill7116 Жыл бұрын
how bout just not throttling the fire fighters. "customer service error" , how many jobs i would still have if all my screw ups were simply a "customer service error"
@michaelconstable8400 Жыл бұрын
Why is this self important woman with the big tits involved?
@roywastaken Жыл бұрын
nice!
@jagathfernando934 Жыл бұрын
Family looks like srilankans
@abhijteoebhtuji Жыл бұрын
I really like his hacking and Reuben Paul give me a cloud pet I really like it
@reylove33 Жыл бұрын
This guy is dark. Dangerous.
@leeduhart105 Жыл бұрын
aren't you worried about the water snake?
@KenSherman Жыл бұрын
This guy's doing at a significantly young age what took professionals years, decade(s), or career(s) to do. Particularly, I can('t) imagine all the haters he's getting & would get in addition to the admirers.😅 I hope our society would continue to encourage him & others alike & I hope the very best for this bright mind! 2:17-3:05 What a very intelligent & wise response!🤓🦉
@kartikgitm Жыл бұрын
Fair play!
@EngMohammedNagieb Жыл бұрын
The types of countermeasures and safeguards used to protect against emanation attacks are known as TEMPEST countermeasures. TEMPEST was originally a government research study aimed at protecting electronic equipment from the electromagnetic pulse (EMP) emitted during nuclear explosions. It has since expanded to a general study of monitoring emanations and preventing their interception. Simply because of the kinds of electronic components from which they’re built, many computer hardware devices emit electromagnetic (EM) radiation during normal operation. The process of communicating with other machines or peripheral equipment creates emanations that can be intercepted. These emanation leaks can cause serious security issues but are generally easy to address. TEMPEST-derived technology allows the electronic emanations that devices produce (known as Van Eck radiation) to be read from a distance (this process is known as Van Eck phreaking). TEMPEST eavesdropping or Van Eck phreaking countermeasures include the following: Faraday Cage A Faraday cage is a box, mobile room, or entire building designed with an external metal skin, often a wire mesh that fully surrounds an area on all sides. This metal skin acts as an EM absorbing capacitor that prevents electromagnetic signals (emanations) from exiting or entering the area that the cage encloses. Faraday cages can be designed to block specific frequencies while allowing others-for example, blocking Wi-Fi while allowing walkie talkies and mobile phones. White Noise White noise simply means broadcasting false traffic to mask and hide the presence of real emanations. White noise can consist of a real signal from another source that is not confidential, a constant signal at a specific frequency, a randomly variable signal, or even a jam signal that causes interception equipment to fail. Although this is similar to jamming devices, the purpose is to convolute the signal only for the eavesdropper, not the authorized user, rather than stopping even valid uses of emanations. White noise describes any random sound, signal, or process that can drown out meaningful information. This can vary from audible frequencies to inaudible electronic transmissions, and it may even involve the deliberate act of creating line or traffic noise to disguise origins or disrupt listening devices.
@deadguydontcomeback Жыл бұрын
But who else having electronic teddy bear?
@deadguydontcomeback Жыл бұрын
Now i realised that why my teddy bear was looking at me when I was taking bath
@samueljoshuaowusu Жыл бұрын
pretty good
@VRKtaka Жыл бұрын
🙌👍👍
@elliott2971 Жыл бұрын
❗ Promo SM!!
@albertma413 Жыл бұрын
Technically I was a hacker at 5 but who is counting lmao. When I was in preschool my parents thought I was watching too much Sesame Street so what they did was put a lock on the Light switch the kind that are used in commercial buildings. What I did was lockpicked it. Lol
@stephjackson Жыл бұрын
Embarrassing for a few fishing adult males who keep telling their wives they need psychological help for this while young kids are getting ahead of mine in safety and knowledge..so embarrassing!!! I feel so bad for my children ..go on young ones educate yourself on this! Proud of them!
@johnreinermarcos Жыл бұрын
Ggh
@mr_trojan Жыл бұрын
how i can learn wifi hacking.
@marklampo8164 Жыл бұрын
The lore is growing like "tales of PCP and DMT!" Those "six figure jobs" quickly become 40K jobs because you're "just not worth that kind of money!" Deja Vu all over again, Yogi! A flood of "talent" into a vacuum makes for the new lore; "The more you know in this biz, the LESS you get paid! How the F did that happen?!"