ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,810,790 results

TED-Ed
The method that can "prove" almost anything - James A. Smith

Explore the data analysis method known as p-hacking, where data is misrepresented as statistically significant. -- In 2011, a group ...

5:06
The method that can "prove" almost anything - James A. Smith

866,225 views

4 years ago

StatQuest with Josh Starmer
p-hacking: What it is and how to avoid it!

p-hacking is the misuse and abuse of p-values and results in being fooled by false positives. Some forms of p-hacking are obvious ...

13:45
p-hacking: What it is and how to avoid it!

172,455 views

5 years ago

N N Taleb's Probability Questions
MINI LESSON 7: P-Values and P-Value Hacking: a simplified lecture.

We saw that 1) many metrics are stochastic, 2) what is stochastic can be hacked. This is the simplification of my work showing that ...

9:26
MINI LESSON 7: P-Values and P-Value Hacking: a simplified lecture.

32,431 views

4 years ago

The Value Hacker
What is Value Hacking?

How do I define Value? What's a Value Hacker? Basically, its someone who wants to get a better price or deal than the 'normal' ...

3:22
What is Value Hacking?

25 views

9 years ago

Tech Unleashed
How Hackers Shop Product For Very Low Prices || Data Tampering || Burp Suite || Testing

I don't support any kinds of ha*k because its completely illegal.....i just tested the vulnerability of that website.

0:59
How Hackers Shop Product For Very Low Prices || Data Tampering || Burp Suite || Testing

66,936 views

4 years ago

Blackfiles
The Man Who Stole America’s Most Valued Secret

In 2014, law enforcement agencies arrested Su Bin and found hundreds of thousands of stolen Boeing and Lockheed files, ...

30:51
The Man Who Stole America’s Most Valued Secret

403,035 views

3 months ago

pyGuru
Price Tampering in Bug Bounty Programs | Burp Suite | Ethical Hacking Tutorial

This video is for educational purpose only. Price Tampering may lead you to legal trouble so please avoid it on real websites and ...

22:24
Price Tampering in Bug Bounty Programs | Burp Suite | Ethical Hacking Tutorial

8,548 views

1 year ago

CrashCourse
P-Hacking: Crash Course Statistics #30

Today we're going to talk about p-hacking (also called data dredging or data fishing). P-hacking is when data is analyzed to find ...

11:02
P-Hacking: Crash Course Statistics #30

156,540 views

7 years ago

Privacy Matters
basics of HACKING In 8 Minutes

How to hack. How to Become a Pro Hacker Step-by-Step Guide Are you ready to dive into the world of hacking and become a pro ...

8:34
basics of HACKING In 8 Minutes

444,556 views

1 year ago

codingwithcash
How to Build Kernel Drivers (and how to prevent memory stealing)!

Top 9 Game Hacking Techniques! In this video, we explore the Top 6 Game Hacking Techniques that are essential for anyone ...

7:09
How to Build Kernel Drivers (and how to prevent memory stealing)!

109,244 views

1 year ago

Cybernews
Where People Go When They Want to Hack You

What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that ...

34:40
Where People Go When They Want to Hack You

3,903,039 views

1 year ago

KiraTV
The Hackers Who Stole $523,000,000 and Escaped(for now)

Imagine just finding $1000000000 of bitcoin just sitting there, forgotten from one of cryptocurrency's biggest hacks. Science direct ...

18:39
The Hackers Who Stole $523,000,000 and Escaped(for now)

825,144 views

1 year ago

Intigriti
Cheat Engine: Code Finder (tutorial 5) - Game Hacking Series

Learn the basics of Game Hacking. In this video, we'll run through tutorial step 5 (code finder) in Cheat Engine 7.4. If you missed ...

14:43
Cheat Engine: Code Finder (tutorial 5) - Game Hacking Series

36,713 views

2 years ago

Veritasium
Is Most Published Research Wrong?

Mounting evidence suggests a lot of published research is false. Check out Audible: http://bit.ly/AudibleVe Support Veritasium on ...

12:22
Is Most Published Research Wrong?

6,154,844 views

9 years ago

PBD Podcast
“Security Is An Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers

Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and ...

2:04:53
“Security Is An Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers

1,933,657 views

1 year ago

Loi Liang Yang
Watch How Hackers Checkout Products For Free On Any Website And Learn To Defend Against Hackers!

Membership // Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into ...

3:29
Watch How Hackers Checkout Products For Free On Any Website And Learn To Defend Against Hackers!

688,497 views

5 years ago

Seth Chandler
P Value Hacking. Video 23.

This is one in a series of videos produced by Professor Seth J. Chandler at the University of Houston Law Center for the course ...

34:28
P Value Hacking. Video 23.

61 views

4 years ago

Inspiral Hacks
Value Proposition and the Art of Value Hacking

At Inspiral Growth, we believe in the power of transformation. Our coaching practice is dedicated to helping individuals and ...

0:59
Value Proposition and the Art of Value Hacking

20,796 views

2 years ago

UnixGuy | Cyber Security
Ethical Hacking Certs Better than OSCP (Updated 2025)

Use code 'UNIXGUY' at http://nordpass.com/unixguy to get NordPass Business with a 20% off! The coupon applies to all new ...

17:12
Ethical Hacking Certs Better than OSCP (Updated 2025)

49,179 views

1 year ago

DEFCONConference
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...

45:05
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

419,934 views

2 years ago