ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

88 results

RM Tech Linux AI
Linux Phone Security Exposed: Why “Unhackable” Mobile OS Is a Dangerous Myth

opensource #linux #operatingsystem #linux2025 #linuxdesktop Linux phones are often praised as the most secure and ...

10:55
Linux Phone Security Exposed: Why “Unhackable” Mobile OS Is a Dangerous Myth

0 views

18 hours ago

Terminal Tilt
The Windows Exodus Has Begun. (And the Data Proves It)

For decades, “The Year of the Linux Desktop” was treated as a tech world punchline. But as we enter 2026, the data shows the ...

6:22
The Windows Exodus Has Begun. (And the Data Proves It)

4,491 views

17 hours ago

Ethical Explorers
Penelope: The Ultimate Netcat Replacement? 🐚 (Ethical Hacking Guide)

Are you still struggling with unstable "dumb" shells during your penetration tests? In today's video, we are breaking down ...

10:46
Penelope: The Ultimate Netcat Replacement? 🐚 (Ethical Hacking Guide)

4 views

19 minutes ago

ASK Linux
Modernize Linux Mint Cinnamon: Fast, Clean & Custom

Give your Cinnamon desktop a 2026 makeover — modern visuals, smoother workflows, and tiny tweaks that make Mint feel new ...

4:25
Modernize Linux Mint Cinnamon: Fast, Clean & Custom

115 views

8 hours ago

SnerfBox
Extended Security Updates: The $30 Million Scam Microsoft Doesn't Mention

Three months after the "critical" October 14th deadline, your Windows 10 PC still works perfectly. Why? Because the panic was ...

10:53
Extended Security Updates: The $30 Million Scam Microsoft Doesn't Mention

0 views

6 hours ago

Red Hat Enterprise Linux
How to configure Red Hat Enterprise Linux as a LDAP client using System Security Services Daemon

Learn how to configure a Red Hat Enterprise Linux (RHEL) system as an LDAP client using System Security Services Daemon ...

6:29
How to configure Red Hat Enterprise Linux as a LDAP client using System Security Services Daemon

0 views

10 hours ago

TechNovaAI
Debian vs Arch Linux Pros & Cons Explained

Debian and Arch Linux are two of the most influential Linux distributions, but they represent completely different philosophies.

8:06
Debian vs Arch Linux Pros & Cons Explained

0 views

4 hours ago

TWiT Tech Podcast Network
Project Papermoon: The 1st Linux-for-Space Standard

Project Papermoon wants to make a standard Linux toolkit for space! Learn how open source is powering satellites, rockets, and ...

5:00
Project Papermoon: The 1st Linux-for-Space Standard

0 views

6 hours ago

HackersArsenal
2026 Your Hacking Roadmap Everything You Need to Know (No Fluff, No BS)

Hacking in 2026 isn't about flashy tools or fake guru advice — it's about fundamentals, mindset, and real-world skills that actually ...

8:21
2026 Your Hacking Roadmap Everything You Need to Know (No Fluff, No BS)

1,482 views

16 hours ago

Vulnerable Technology
Cybersecurity Roadmap || No Coding Needed

Complete Cybersecurity Roadmap for 2026, from beginner to advanced level. Learn cybersecurity fundamentals, the CIA Triad, ...

18:18
Cybersecurity Roadmap || No Coding Needed

6 views

12 hours ago

bandit sec
How to get a companies emails for a pentest

... infosec, exploit modules metasploit, payloads kali linux, hacking for beginners, CTF learning, cybersecurity skills, linux security, ...

8:11
How to get a companies emails for a pentest

10 views

10 hours ago

Brian0day
Linux Essentials For Hackers #4 - Mastering Linux Permissions

File permissions are at the core of Linux security. In this video, you'll understand how permissions work, how hackers abuse ...

19:58
Linux Essentials For Hackers #4 - Mastering Linux Permissions

13 views

11 hours ago

Microsoft Security Response Center (MSRC)
BlueHat Asia 2025: Hotfix without the fix: Runtime security with "Shimit"

In this talk, security engineer Vertika Sharma presents Shimit, a research project focused on runtime mitigation of select Linux ...

19:37
BlueHat Asia 2025: Hotfix without the fix: Runtime security with "Shimit"

6 views

51 minutes ago

Symoné B. Tech
Trump's New US Tech Force Program - Is It Worth It? (Honest Breakdown)

New US Tech Force Program - Is It Worth It? (Honest Breakdown) Want to START your tech career, sign up for my free live Tech ...

9:08
Trump's New US Tech Force Program - Is It Worth It? (Honest Breakdown)

3,736 views

9 hours ago

aied online ★☰
Rotina clássica na vida de um especialista em Security: Procurar vazamento de dados

"#aiedonline no odysee.com" Curso Hacker, entre a luz e as trevas LIVRO LINUX ...

8:24
Rotina clássica na vida de um especialista em Security: Procurar vazamento de dados

0 views

8 hours ago

Network Kings
The Top Tech Free Courses & Roadmap in 2026 | Get First IT Job

Free IT 360° Pass - https://ott.nwkings.com/learn/Free-Courses Enroll In Full IT 360 Pass ...

18:05
The Top Tech Free Courses & Roadmap in 2026 | Get First IT Job

347 views

6 hours ago

Bhurtel Cyber Tutorial
How to Install Tenable Nessus 10.11.1 on Kali Linux 2026 | Full Setup & Configuration Tutorial

Tenable Nessus 10.11.1 Installation & Configuration on Kali Linux 2026 – Complete Step-by-Step Guide! Want to install and ...

12:32
How to Install Tenable Nessus 10.11.1 on Kali Linux 2026 | Full Setup & Configuration Tutorial

2 views

2 hours ago

La Oficina De Sistemas
How to install Docker on Kali Linux?

In this video, I'll show you how to install Docker on Kali Linux step by step. You'll see how to set up Docker from scratch ...

9:47
How to install Docker on Kali Linux?

0 views

11 minutes ago

TutsKGR OS
Installing Zorin OS 18 🐧 looking around

Thanks for watching. Any thoughts? Write a comment. If you liked the video, Like and Subscribe. It helps to create more videos!

4:34
Installing Zorin OS 18 🐧 looking around

0 views

22 hours ago

DevCyberSecurity | Dev Cyber Security
Ethical Hacking 2.0 Full Course in 6 Months | Learn Hacking from Zero to Expert | DevCyberSecurity |

WhatsApp Group Link:-https://chat.whatsapp.com/Geg2spF3mXNLNMFhIBIs1Q Ethical Hacking 2.0 Full Course in 6 Months | Learn ...

4:13
Ethical Hacking 2.0 Full Course in 6 Months | Learn Hacking from Zero to Expert | DevCyberSecurity |

48 views

10 hours ago