David Bombal Clips
David Bombal Clips
  • 208
  • 639 662
Recreating Python's Core in C: Lists, Strings, and Dictionaries
Imagine being in 1978, looking forward and thinking object-oriented programming is cool. How would you build C++ if you were in C? And how would you build Python and object-oriented Python from C? In this video, we explore this fascinating journey, implementing the core data structures of Python-lists, strings, and dictionaries-in C.
We'll dive into the storytelling approach of teaching programming, making complex concepts understandable and engaging. Additionally, hear about the unique experience of digitizing a classic 1978 programming book, dealing with legal challenges, and eventually getting approval from the original authors and publishers.
🔗 Watch the original full video: czcams.com/video/6uqgiFhW0Fs/video.htmlsi=IvhS0ILBYOkaO3is
zhlédnutí: 2 156

Video

Beyond Cats and Dogs: Real-World Object-Oriented Programming Explained
zhlédnutí 296Před měsícem
Understanding object-oriented programming (OOP) is crucial for any aspiring professional programmer. In this video, we dive into why OOP is considered one of the most difficult concepts in all of programming and explore the shortcomings of traditional teaching methods. Forget the typical "animal, cat, and dog" examples; real-world OOP is about solving complex problems by isolating and implement...
Exploring the Frontier of Radio Signal Hacking with HackRF
zhlédnutí 705Před měsícem
Venture into the next frontier of hacking with an in-depth look at radio signal hacking, featuring the HackRF as a powerful tool in this emerging field. This video tutorial delves into the capabilities of the HackRF, a transceiver that enables enthusiasts and professionals alike to explore the vast possibilities of radio hacking. From intercepting and transmitting radio signals to tapping into ...
Unveiling Ghidra: NSA's Free Tool for Reverse Engineering Mastery
zhlédnutí 1,5KPřed měsícem
Discover Ghidra, the groundbreaking reverse engineering tool developed by the NSA, now available for free to cybersecurity professionals and ethical hackers. This video tutorial offers a comprehensive look into Ghidra, showcasing its capabilities for analyzing and understanding malware, including notorious examples like WannaCry. Previously, tools of this caliber, such as Ida Pro, came with a h...
Exploring Aircrack-ng: The Ultimate Wi-Fi Hacking Toolkit
zhlédnutí 2,1KPřed měsícem
Dive into the world of Wi-Fi security with Aircrack-ng, the granddaddy of Wi-Fi hacking tools. This comprehensive video tutorial introduces you to the capabilities and functionalities of Aircrack-ng, a toolset designed for Wi-Fi network security assessment and penetration testing. Learn how to use Aircrack-ng to crack WEP and WPA/WPA2 passwords, understand the importance of having an Aircrack-c...
Unlocking Nessus: The Premier Vulnerability Scanner for Cybersecurity
zhlédnutí 912Před 2 měsíci
Explore the power of Nessus, the leading vulnerability scanner in the cybersecurity realm, brought to you by Tenable. From its origins as an open-source project to becoming a cornerstone tool for security professionals, Nessus offers comprehensive scanning capabilities to identify potential vulnerabilities across your network. This video tutorial delves into the features and functionalities of ...
Mastering Snort: The Essential Guide to Intrusion Detection Systems
zhlédnutí 3,7KPřed 2 měsíci
Dive into the world of Snort, the leading open-source Intrusion Detection System (IDS) that has revolutionized cybersecurity defenses. Owned by Cisco, Snort is not a hacking tool but a robust defensive tool designed to identify and alert on potential threats targeting your systems. This video tutorial will guide you through the basics of Snort, demonstrating its setup, configuration, and operat...
Unleashing Metasploit: The Comprehensive Toolkit for Ethical Hacking
zhlédnutí 7KPřed 2 měsíci
Embark on a journey into the world of ethical hacking with Metasploit, the comprehensive toolkit that consolidates a wide range of exploits, payloads, and auxiliary modules into one powerful framework. This video tutorial offers a deep dive into Metasploit, showcasing its capability to streamline the hacking process by providing thousands of modules for various purposes, from exploiting vulnera...
Mastering Burp Suite: The Ultimate Web Application Hacking Tool
zhlédnutí 5KPřed 2 měsíci
Unlock the secrets of web application hacking with Burp Suite, the indispensable tool for cybersecurity professionals and ethical hackers. This video introduces you to Burp Suite, available in both a community edition for free and a paid version, integrated into Kali Linux. Burp Suite is essential for anyone interested in web app hacking, offering the ability to intercept, analyze, and manipula...
Exploring Shodan: The Search Engine for Security Experts and Hackers
zhlédnutí 61KPřed 3 měsíci
Dive into the world of Shodan, the powerful search engine designed by John Matherly that scans and indexes devices connected to the internet. With over a decade of innovation, Shodan provides an unparalleled view of the global internet landscape, capturing banners from over 4.3 billion IP addresses and countless ports. This video tutorial introduces Shodan's capabilities, demonstrating how it c...
NMAP Mastery: Unleashing the Power of Network Scanning for Security and Hacking!
zhlédnutí 3KPřed 3 měsíci
Dive deep into the world of NMAP, the quintessential network scanning tool that has been at the forefront of cybersecurity and ethical hacking for over 25 years. In this video, we unravel the complexities of NMAP, showcasing its simplicity and powerful capabilities in uncovering the online status of target systems, identifying open ports, and determining running services. Perfect for beginners ...
Augmented Intelligence: Empowering Human Potential with AI
zhlédnutí 180Před 3 měsíci
oin us as we delve into an enlightening discussion with Daniel, who shares his transformative journey of integrating AI into his daily life and work processes, achieving unprecedented levels of productivity and creativity. Discover how AI can serve as a powerful augmentation tool, much like the leap from having no mobile phone to owning a smartphone, providing individuals and professionals with...
AI-Enhanced Productivity: Revolutionizing Content Creation and Cybersecurity Analysis
zhlédnutí 216Před 4 měsíci
Discover how Daniel leverages AI to dramatically improve his productivity, especially in curating content for his popular newsletter, 'Unsupervised Learning'. In this detailed walkthrough, Daniel demonstrates how AI integration in his daily workflow saves him a massive amount of time by summarizing news articles, categorizing content, and even preparing portions of his newsletter automatically....
Mastering Wireshark: Essential Tool for IT, Cybersecurity, and Ethical Hacking Explained!
zhlédnutí 3,9KPřed 4 měsíci
Unlock the power of Wireshark, the indispensable tool for professionals in IT, cybersecurity, and hacking. Whether you're a beginner or an expert, this video provides a comprehensive walkthrough on using Wireshark efficiently in a Linux environment, from basic operations to advanced packet analysis. Discover how Wireshark, often referred to as a network or protocol analyzer, can aid in network ...
Unleashing AI's Potential: Transform Information into Insight with Custom AI Tools!
zhlédnutí 169Před 4 měsíci
Embark on a fascinating journey with us as we unveil how Daniel, an innovator at the intersection of technology and humanity, leverages custom AI tools to enhance his understanding and interaction with the world. In this video, discover how Daniel created a suite of custom APIs, integrating them into a powerful system that analyzes, synthesizes, and evaluates content across various media. From ...
Revolutionizing Productivity: Master AI to Automate Your Digital Life!
zhlédnutí 206Před 4 měsíci
Revolutionizing Productivity: Master AI to Automate Your Digital Life!
AI for Cybersecurity: Harnessing Custom AI to Analyze Security Incidents and Enhance RPG Gaming
zhlédnutí 37Před 4 měsíci
AI for Cybersecurity: Harnessing Custom AI to Analyze Security Incidents and Enhance RPG Gaming
Supercharging Your Life with AI: Become an Augmented Human!
zhlédnutí 281Před 4 měsíci
Supercharging Your Life with AI: Become an Augmented Human!
Integrating AI into Everyday Life: The Future of Augmented Humanity
zhlédnutí 253Před 5 měsíci
Integrating AI into Everyday Life: The Future of Augmented Humanity
Mastering OWASP Testing Guide 4.2: Elevate Your Web Application Security
zhlédnutí 518Před 5 měsíci
Mastering OWASP Testing Guide 4.2: Elevate Your Web Application Security
Essential Cybersecurity Insights: Expert Advice & Timeless Resources
zhlédnutí 207Před 5 měsíci
Essential Cybersecurity Insights: Expert Advice & Timeless Resources
AI Evolution: Exploring Breakthroughs and Domain-Specific Applications
zhlédnutí 157Před 5 měsíci
AI Evolution: Exploring Breakthroughs and Domain-Specific Applications
AI Simplified: Harnessing Machine Learning & PyTorch for Beginners
zhlédnutí 213Před 6 měsíci
AI Simplified: Harnessing Machine Learning & PyTorch for Beginners
AI Unveiled: Starting Your Journey in Machine Learning with Python
zhlédnutí 191Před 6 měsíci
AI Unveiled: Starting Your Journey in Machine Learning with Python
AI for Everyone: Breaking Down the Future of Accessible Tech in 2024
zhlédnutí 203Před 6 měsíci
AI for Everyone: Breaking Down the Future of Accessible Tech in 2024
AI Revolution: Navigating the Future of Work, Creativity, and Ethics
zhlédnutí 157Před 6 měsíci
AI Revolution: Navigating the Future of Work, Creativity, and Ethics
Wireshark Deep Dive: Setting Up TCP Conversation Filters
zhlédnutí 197Před 7 měsíci
Wireshark Deep Dive: Setting Up TCP Conversation Filters
Wireshark Advanced Filtering: Mastering Port Number Analysis
zhlédnutí 272Před 7 měsíci
Wireshark Advanced Filtering: Mastering Port Number Analysis
Wireshark Simplified: Creating and Using Subnet Filters
zhlédnutí 223Před 7 měsíci
Wireshark Simplified: Creating and Using Subnet Filters
Mastering Wireshark: IP Address Filtering Techniques and Tips
zhlédnutí 724Před 7 měsíci
Mastering Wireshark: IP Address Filtering Techniques and Tips

Komentáře

  • @AnonymousQwerty
    @AnonymousQwerty Před 6 dny

    I used a decade old Dell to bring down critical infrastructure in an entire nation

  • @aronsilburn4720
    @aronsilburn4720 Před 10 dny

    this is very inspiring as this is sorta what I feel as I am a qualified electrician and looking to go into the networking field, and a have pretty good knowledge of IT and feel I could do more just unsure on the pathway to take 😂

  • @ShaistaParveen-gj6cj
    @ShaistaParveen-gj6cj Před 15 dny

    How to 5ghz Wi-Fi network jamer

  • @GilligansTravels
    @GilligansTravels Před 17 dny

    great video

  • @coderjo6944
    @coderjo6944 Před 18 dny

    You both are great story tellers!!.... can't wait to get a copy.... had a used original version on a wishlist on amazon for some time. Back in the early 1990s there were text based dungeon and dragon games that were hosted at certain collages what were awsome fun to play and drive down your GPA LOL..... they were all coded in C . You get to where you can read incredibly fast playing them and you can code areas straight out of a comic book or movie /tv shows... and not really worry about copyrights. Cause every thing was just text and with your imagination you conjure up the spectacular battles scenes in your head.

  • @rezah336
    @rezah336 Před 29 dny

    so stupid, why hack a car? you have to have access to the car, in that case if you want to do some damage you just place a bomb or something, this is totally useless knowledge

  • @AggelosStavrou-km9nd
    @AggelosStavrou-km9nd Před měsícem

    Full video ?

  • @cameronrich2536
    @cameronrich2536 Před měsícem

    The browser doesnt work ever help pls

  • @MANASWali
    @MANASWali Před měsícem

    can u teach us how to hack wifi using kali linux without a external wifi adptor plzzzzzz my rewuest from india only u are our hope now

    • @DWmudskipper
      @DWmudskipper Před měsícem

      You can use your internal wifi card, in all videos he does just set the video to your wifi interface

  • @jamesdavis1239
    @jamesdavis1239 Před měsícem

    My headcanon is that the editor was just as worried about asking for a copy so they could use it to reprint the book. Probably saved them so much work 🤣

  • @Steve168xyz
    @Steve168xyz Před měsícem

    no course on this Sir ?

  • @Gigi-zy1kx
    @Gigi-zy1kx Před měsícem

    Dr. C

  • @cyberdevil657
    @cyberdevil657 Před měsícem

    Hi David!!!💙

  • @guilherme5094
    @guilherme5094 Před měsícem

    👍👍!

  • @darknscary
    @darknscary Před měsícem

    Corgi you mean? lol cori B? Am i wrong here?

  • @HookedGoneSunk
    @HookedGoneSunk Před měsícem

    how about for a phone number?

  • @BrandonLang-tw7qb
    @BrandonLang-tw7qb Před měsícem

    This was a great watch !

  • @wilsontavarez
    @wilsontavarez Před měsícem

    Hi, ¿Does the Alfa Tube-U model support monitor mode?

  • @Adivasi7777
    @Adivasi7777 Před měsícem

    Professor Severance is one of the most *committed* teachers of this craft. He is The Man, The Myth, The Legend.

  • @guilherme5094
    @guilherme5094 Před měsícem

    Thanks!

  • @majiddehbi9186
    @majiddehbi9186 Před měsícem

    oh I appriciate the courses of this guy I m taking his python prog thanks to u david thinks

  • @Gigi-zy1kx
    @Gigi-zy1kx Před měsícem

    I like Dr. Chuck

  • @EDGARCALEBBENITEZHERNANDEZ

    Increíble libro, lamentablemente no es tan accesible , yo llevo mucho tiempo buscándolo y todos cuestan dinero, no me canso de manifestar para que este tipo de contenido salga de las academias y llegue a lugares como este , en serio quiero que se encuentre gratis. Más por autores como usted 😊😊

  • @nagabilchampa
    @nagabilchampa Před měsícem

    wow dude you added so much by making this video your own thanks for that

  • @scotthullinger4684
    @scotthullinger4684 Před měsícem

    Rob Braxman knows a hell of lot more about computer / internet privacy issues than the author of the video -

  • @kevinwillis4089
    @kevinwillis4089 Před měsícem

    Love it. Going to dig into this.

  • @killalldotpy
    @killalldotpy Před měsícem

    M3 Max here. Running Parallels 19 effortless. Insane machine!

  • @ShamseddineHireche
    @ShamseddineHireche Před měsícem

    I like the Palestine necklace.

  • @VardhanMaheshwari-h9c
    @VardhanMaheshwari-h9c Před měsícem

    He's always been great with bringing new content

  • @Gigi-zy1kx
    @Gigi-zy1kx Před měsícem

    nice

  • @Rantofthings.
    @Rantofthings. Před měsícem

    Is this a subset of malware analyst ?.

  • @rylandkeith3727
    @rylandkeith3727 Před měsícem

    U don’t need to do all this guys 😭

  • @Rantofthings.
    @Rantofthings. Před měsícem

    Do you need OSCP to get started in pentesting or cybersecurity?

  • @sazzy94
    @sazzy94 Před měsícem

    Arch linux or black arch linux are the best in my opinion but they are really hard to understand/use

    • @pomo93
      @pomo93 Před měsícem

      Arch is easier and more flexible than other linux distros in my opinion

  • @ibrahemtaha8177
    @ibrahemtaha8177 Před měsícem

    where is the link for the long video?! what we should even ask for something like that!

  • @theJellyjoker
    @theJellyjoker Před měsícem

    Look at you, Hacker. A pathetic creature of meat and bone. Panting and sweating as you run through my corridors. How can you challange a perfect, immortal machine?

  • @bigdeadlykicksandkickflips
    @bigdeadlykicksandkickflips Před 2 měsíci

    I used this maybe 15 years ago. This is what I'm used to, putting in the info. Putting your alpha adapter in monitor mode, get your packets deauth, its been a while man. But not going to lie, since WPA ever came out I never cracked anything sense.... I know there are many other methods. not sure if this even works anymore. I never liked the guess part. It's funny the same Alpha adaptor from years ago is still recommend until this day. Crazy.

    • @monkeytrident
      @monkeytrident Před 14 dny

      did you try again on wpa did you get any luck ?

    • @doop00
      @doop00 Před dnem

      @@monkeytrident still works.

  • @x316RiotMakerx
    @x316RiotMakerx Před 2 měsíci

    Two votes for DragonOS. It’s not just for hackers thought, it has a lot of tools for amateur radio operators too.

    • @zaccampa4055
      @zaccampa4055 Před 29 dny

      Oh yeah Dragon is cool. I just played around with it on my buddy’s PC for the first time and it was enjoyable.

  • @x316RiotMakerx
    @x316RiotMakerx Před 2 měsíci

    On a daily basis I use a very small number of the tools available in Kali or Parrot. So I use vanilla Debian and install the pen testing tools I want to it.

    • @unique-ad-555
      @unique-ad-555 Před 12 dny

      Me over here using Kali linux for a few days then just going back to Ubuntu and installing the tools I need.

  • @CaptChang
    @CaptChang Před 2 měsíci

    Just WHERE was pwned or pwn mentioned in this clip?

  • @tigreonice2339
    @tigreonice2339 Před 2 měsíci

    Free only 7 days :( multiaccounts he said? XD

  • @majiddehbi9186
    @majiddehbi9186 Před 2 měsíci

    very informative

  • @leJ226
    @leJ226 Před 2 měsíci

    👍

  • @guilherme5094
    @guilherme5094 Před 2 měsíci

    👍

  • @tonyruiz2046
    @tonyruiz2046 Před 2 měsíci

    ⭐️👍⭐️

  • @ignacionr
    @ignacionr Před 2 měsíci

    All of this content is 100% 2016. Actually it looks like a conversation I had with my friends by then.

  • @waffen9894
    @waffen9894 Před 2 měsíci

    Cybersecurity tool developers Try not to pick a stupid name challenge

  • @hkr37
    @hkr37 Před 2 měsíci

    Hello Mr. David Bompal. Currently more wifi routers are updated to wifi 5 and 6. So which wifi adapter is best for kali linux?

  • @SeniorScriptKitty
    @SeniorScriptKitty Před 2 měsíci

    thank you for mentioning the m1 and m2 but m3 is even worse a absolute nightmare everything is broke from what i can tell vms barely work

  • @X4Y7Z0
    @X4Y7Z0 Před 2 měsíci

    Can this tell us the amount of windows users vs Mac OS?