ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

105 results

Esraa Codes
Secure Notes App in Python 🔐 | AES-256 Encryption | Cybersecurity Project

In this video, I present a Secure Notes desktop application built with Python and AES-256 encryption. This project demonstrates ...

8:16
Secure Notes App in Python 🔐 | AES-256 Encryption | Cybersecurity Project

39 views

4 days ago

Analyze-Adapt-Data
Python is all you need - secrets

secrets module is used to generate tokens, otps, etc which are cryptographically secure. #python3 #pythonprogramming ...

1:20
Python is all you need - secrets

0 views

5 days ago

Esraa Codes
Secure Login & Encrypted Notes in Python 🔐 | AES-256 Cybersecurity Project

This reel demonstrates a secure login system where user notes are encrypted immediately after saving. The application uses ...

0:16
Secure Login & Encrypted Notes in Python 🔐 | AES-256 Cybersecurity Project

1,195 views

3 days ago

LaserHelix
POV: You Learn Web Security For Fun

In this video we take a look at the FOSS game that teaches web security, NATAS from Overthewire, and complete levels 0-9!

9:01
POV: You Learn Web Security For Fun

36,308 views

3 days ago

Ashish[NIT-Rourkela]
Day 12 (qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #cryptography

Day 12 (qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #cryptography.

12:14
Day 12 (qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #cryptography

33 views

6 days ago

CyberTodd
Public Key Cryptography Basics | Task 7 - PGP and GPG

Path: Cyber Security 101 Room: Public Key Cryptography Basics Discover how public key ciphers such as RSA work and explore ...

5:31
Public Key Cryptography Basics | Task 7 - PGP and GPG

60 views

5 days ago

Be Practical And Techy
How to create AI Agent for Crypto? #shorts #cryptocurrency #aishorts #artificialintelligence

Build your first AI agent for Trading Cryptocurrencies like bitcoin, ethereum solana etc. Improve your software development skill ...

0:25
How to create AI Agent for Crypto? #shorts #cryptocurrency #aishorts #artificialintelligence

170 views

1 day ago

Ashish[NIT-Rourkela]
DAY 12( qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #phyiscs #qunut

DAY 12( qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #phyiscs #qunut.

1:48
DAY 12( qc) cryptography in python #learnquantumcomputing #quantummechanics #ai #ml #phyiscs #qunut

61 views

6 days ago

TyrannoFlow
FastMCP HTTP Deployment Patterns and ASGI Integration - Part 17/17

Full Video: https://www.youtube.com/watch?v=W9n5kOq9Tvc ASGI integration patterns for FastMCP HTTP deployment with ...

1:10
FastMCP HTTP Deployment Patterns and ASGI Integration - Part 17/17

0 views

6 days ago

CyberTodd
Public Key Cryptography Basics | Task 6 - Digital Signatures and Certificates

Path: Cyber Security 101 Room: Public Key Cryptography Basics Discover how public key ciphers such as RSA work and explore ...

5:50
Public Key Cryptography Basics | Task 6 - Digital Signatures and Certificates

21 views

6 days ago

Uplatz
Quantum Computing: Principles, Architectures, and Cryptographic Transitions | Uplatz

Quantum computing is no longer just a theoretical breakthrough—it is a systems-level shift with deep implications for computation, ...

6:18
Quantum Computing: Principles, Architectures, and Cryptographic Transitions | Uplatz

0 views

1 day ago

TyrannoFlow
FastMCP HTTP Deployment Patterns and ASGI Integration - Part 17/17

Configure production-grade OAuth authentication in FastMCP using Redis-backed session storage with Fernet encryption.

9:50
FastMCP HTTP Deployment Patterns and ASGI Integration - Part 17/17

0 views

6 days ago

CyberTodd
Public Key Cryptography Basics | Task 5 - SSH

Path: Cyber Security 101 Room: Public Key Cryptography Basics Discover how public key ciphers such as RSA work and explore ...

9:54
Public Key Cryptography Basics | Task 5 - SSH

6 views

7 days ago

CyberTodd
Public Key Cryptography Basics | Task 8 - Conclusion

Path: Cyber Security 101 Room: Public Key Cryptography Basics Discover how public key ciphers such as RSA work and explore ...

1:45
Public Key Cryptography Basics | Task 8 - Conclusion

33 views

4 days ago

Esraa Codes
Encrypted JSON Storage & Secure Decryption 🔑 | Secure Notes Manager

This reel shows how encrypted notes are stored securely inside a JSON file and decrypted only after authentication. It highlights ...

0:16
Encrypted JSON Storage & Secure Decryption 🔑 | Secure Notes Manager

0 views

3 days ago

Uplatz
The Post-Quantum Imperative: A Strategic Roadmap for Cryptographic Resilience | Uplatz

Quantum computing is transforming cryptography from a purely technical concern into a long-term strategic risk.

7:47
The Post-Quantum Imperative: A Strategic Roadmap for Cryptographic Resilience | Uplatz

0 views

1 day ago

Uplatz
The Capital Shield - Economic Finality and Blockchain Security | Uplatz

Blockchain security is not enforced by code alone—it is enforced by capital at risk. The Capital Shield explores how economic ...

7:48
The Capital Shield - Economic Finality and Blockchain Security | Uplatz

0 views

2 days ago

RubberDuckLearning
AcademiChain - Demo

This is the demo of the AcademiChain (MVP)

55:59
AcademiChain - Demo

14 views

6 days ago

Mike's Cloud Solutions
Build an Async SSH KeyGen Service on GCP | Pub/Sub + Cloud Functions

GCP #PubSub #CloudFunctions #Firestore #Terraform #InfrastructureAsCode #Serverless Build a Serverless SSH KeyGen API ...

7:39
Build an Async SSH KeyGen Service on GCP | Pub/Sub + Cloud Functions

68 views

1 day ago

NullSyntax
Why "Random" numbers are actually fixed 🛑  #coding #codeeditor #computerscience #funny #memes

We think computers generate random numbers. They don't. Computers are "Deterministic" machines. Input A always equals ...

0:41
Why "Random" numbers are actually fixed 🛑 #coding #codeeditor #computerscience #funny #memes

314 views

4 days ago