- 208
- 639 662
David Bombal Clips
Registrace 5. 05. 2022
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Linux, Python, Ethical Hacking, Networking, CCNA, Virtualization and other IT related topics.
This CZcams channel has new videos uploaded every week! Subscribe for technical, detailed, no fluff content.
All the best!
David
On this channel, I discuss Linux, Python, Ethical Hacking, Networking, CCNA, Virtualization and other IT related topics.
This CZcams channel has new videos uploaded every week! Subscribe for technical, detailed, no fluff content.
All the best!
David
Recreating Python's Core in C: Lists, Strings, and Dictionaries
Imagine being in 1978, looking forward and thinking object-oriented programming is cool. How would you build C++ if you were in C? And how would you build Python and object-oriented Python from C? In this video, we explore this fascinating journey, implementing the core data structures of Python-lists, strings, and dictionaries-in C.
We'll dive into the storytelling approach of teaching programming, making complex concepts understandable and engaging. Additionally, hear about the unique experience of digitizing a classic 1978 programming book, dealing with legal challenges, and eventually getting approval from the original authors and publishers.
🔗 Watch the original full video: czcams.com/video/6uqgiFhW0Fs/video.htmlsi=IvhS0ILBYOkaO3is
We'll dive into the storytelling approach of teaching programming, making complex concepts understandable and engaging. Additionally, hear about the unique experience of digitizing a classic 1978 programming book, dealing with legal challenges, and eventually getting approval from the original authors and publishers.
🔗 Watch the original full video: czcams.com/video/6uqgiFhW0Fs/video.htmlsi=IvhS0ILBYOkaO3is
zhlédnutí: 2 156
Video
Beyond Cats and Dogs: Real-World Object-Oriented Programming Explained
zhlédnutí 296Před měsícem
Understanding object-oriented programming (OOP) is crucial for any aspiring professional programmer. In this video, we dive into why OOP is considered one of the most difficult concepts in all of programming and explore the shortcomings of traditional teaching methods. Forget the typical "animal, cat, and dog" examples; real-world OOP is about solving complex problems by isolating and implement...
Exploring the Frontier of Radio Signal Hacking with HackRF
zhlédnutí 705Před měsícem
Venture into the next frontier of hacking with an in-depth look at radio signal hacking, featuring the HackRF as a powerful tool in this emerging field. This video tutorial delves into the capabilities of the HackRF, a transceiver that enables enthusiasts and professionals alike to explore the vast possibilities of radio hacking. From intercepting and transmitting radio signals to tapping into ...
Unveiling Ghidra: NSA's Free Tool for Reverse Engineering Mastery
zhlédnutí 1,5KPřed měsícem
Discover Ghidra, the groundbreaking reverse engineering tool developed by the NSA, now available for free to cybersecurity professionals and ethical hackers. This video tutorial offers a comprehensive look into Ghidra, showcasing its capabilities for analyzing and understanding malware, including notorious examples like WannaCry. Previously, tools of this caliber, such as Ida Pro, came with a h...
Exploring Aircrack-ng: The Ultimate Wi-Fi Hacking Toolkit
zhlédnutí 2,1KPřed měsícem
Dive into the world of Wi-Fi security with Aircrack-ng, the granddaddy of Wi-Fi hacking tools. This comprehensive video tutorial introduces you to the capabilities and functionalities of Aircrack-ng, a toolset designed for Wi-Fi network security assessment and penetration testing. Learn how to use Aircrack-ng to crack WEP and WPA/WPA2 passwords, understand the importance of having an Aircrack-c...
Unlocking Nessus: The Premier Vulnerability Scanner for Cybersecurity
zhlédnutí 912Před 2 měsíci
Explore the power of Nessus, the leading vulnerability scanner in the cybersecurity realm, brought to you by Tenable. From its origins as an open-source project to becoming a cornerstone tool for security professionals, Nessus offers comprehensive scanning capabilities to identify potential vulnerabilities across your network. This video tutorial delves into the features and functionalities of ...
Mastering Snort: The Essential Guide to Intrusion Detection Systems
zhlédnutí 3,7KPřed 2 měsíci
Dive into the world of Snort, the leading open-source Intrusion Detection System (IDS) that has revolutionized cybersecurity defenses. Owned by Cisco, Snort is not a hacking tool but a robust defensive tool designed to identify and alert on potential threats targeting your systems. This video tutorial will guide you through the basics of Snort, demonstrating its setup, configuration, and operat...
Unleashing Metasploit: The Comprehensive Toolkit for Ethical Hacking
zhlédnutí 7KPřed 2 měsíci
Embark on a journey into the world of ethical hacking with Metasploit, the comprehensive toolkit that consolidates a wide range of exploits, payloads, and auxiliary modules into one powerful framework. This video tutorial offers a deep dive into Metasploit, showcasing its capability to streamline the hacking process by providing thousands of modules for various purposes, from exploiting vulnera...
Mastering Burp Suite: The Ultimate Web Application Hacking Tool
zhlédnutí 5KPřed 2 měsíci
Unlock the secrets of web application hacking with Burp Suite, the indispensable tool for cybersecurity professionals and ethical hackers. This video introduces you to Burp Suite, available in both a community edition for free and a paid version, integrated into Kali Linux. Burp Suite is essential for anyone interested in web app hacking, offering the ability to intercept, analyze, and manipula...
Exploring Shodan: The Search Engine for Security Experts and Hackers
zhlédnutí 61KPřed 3 měsíci
Dive into the world of Shodan, the powerful search engine designed by John Matherly that scans and indexes devices connected to the internet. With over a decade of innovation, Shodan provides an unparalleled view of the global internet landscape, capturing banners from over 4.3 billion IP addresses and countless ports. This video tutorial introduces Shodan's capabilities, demonstrating how it c...
NMAP Mastery: Unleashing the Power of Network Scanning for Security and Hacking!
zhlédnutí 3KPřed 3 měsíci
Dive deep into the world of NMAP, the quintessential network scanning tool that has been at the forefront of cybersecurity and ethical hacking for over 25 years. In this video, we unravel the complexities of NMAP, showcasing its simplicity and powerful capabilities in uncovering the online status of target systems, identifying open ports, and determining running services. Perfect for beginners ...
Augmented Intelligence: Empowering Human Potential with AI
zhlédnutí 180Před 3 měsíci
oin us as we delve into an enlightening discussion with Daniel, who shares his transformative journey of integrating AI into his daily life and work processes, achieving unprecedented levels of productivity and creativity. Discover how AI can serve as a powerful augmentation tool, much like the leap from having no mobile phone to owning a smartphone, providing individuals and professionals with...
AI-Enhanced Productivity: Revolutionizing Content Creation and Cybersecurity Analysis
zhlédnutí 216Před 4 měsíci
Discover how Daniel leverages AI to dramatically improve his productivity, especially in curating content for his popular newsletter, 'Unsupervised Learning'. In this detailed walkthrough, Daniel demonstrates how AI integration in his daily workflow saves him a massive amount of time by summarizing news articles, categorizing content, and even preparing portions of his newsletter automatically....
Mastering Wireshark: Essential Tool for IT, Cybersecurity, and Ethical Hacking Explained!
zhlédnutí 3,9KPřed 4 měsíci
Unlock the power of Wireshark, the indispensable tool for professionals in IT, cybersecurity, and hacking. Whether you're a beginner or an expert, this video provides a comprehensive walkthrough on using Wireshark efficiently in a Linux environment, from basic operations to advanced packet analysis. Discover how Wireshark, often referred to as a network or protocol analyzer, can aid in network ...
Unleashing AI's Potential: Transform Information into Insight with Custom AI Tools!
zhlédnutí 169Před 4 měsíci
Embark on a fascinating journey with us as we unveil how Daniel, an innovator at the intersection of technology and humanity, leverages custom AI tools to enhance his understanding and interaction with the world. In this video, discover how Daniel created a suite of custom APIs, integrating them into a powerful system that analyzes, synthesizes, and evaluates content across various media. From ...
Revolutionizing Productivity: Master AI to Automate Your Digital Life!
zhlédnutí 206Před 4 měsíci
Revolutionizing Productivity: Master AI to Automate Your Digital Life!
AI for Cybersecurity: Harnessing Custom AI to Analyze Security Incidents and Enhance RPG Gaming
zhlédnutí 37Před 4 měsíci
AI for Cybersecurity: Harnessing Custom AI to Analyze Security Incidents and Enhance RPG Gaming
Supercharging Your Life with AI: Become an Augmented Human!
zhlédnutí 281Před 4 měsíci
Supercharging Your Life with AI: Become an Augmented Human!
Integrating AI into Everyday Life: The Future of Augmented Humanity
zhlédnutí 253Před 5 měsíci
Integrating AI into Everyday Life: The Future of Augmented Humanity
Mastering OWASP Testing Guide 4.2: Elevate Your Web Application Security
zhlédnutí 518Před 5 měsíci
Mastering OWASP Testing Guide 4.2: Elevate Your Web Application Security
Essential Cybersecurity Insights: Expert Advice & Timeless Resources
zhlédnutí 207Před 5 měsíci
Essential Cybersecurity Insights: Expert Advice & Timeless Resources
AI Evolution: Exploring Breakthroughs and Domain-Specific Applications
zhlédnutí 157Před 5 měsíci
AI Evolution: Exploring Breakthroughs and Domain-Specific Applications
AI Simplified: Harnessing Machine Learning & PyTorch for Beginners
zhlédnutí 213Před 6 měsíci
AI Simplified: Harnessing Machine Learning & PyTorch for Beginners
AI Unveiled: Starting Your Journey in Machine Learning with Python
zhlédnutí 191Před 6 měsíci
AI Unveiled: Starting Your Journey in Machine Learning with Python
AI for Everyone: Breaking Down the Future of Accessible Tech in 2024
zhlédnutí 203Před 6 měsíci
AI for Everyone: Breaking Down the Future of Accessible Tech in 2024
AI Revolution: Navigating the Future of Work, Creativity, and Ethics
zhlédnutí 157Před 6 měsíci
AI Revolution: Navigating the Future of Work, Creativity, and Ethics
Wireshark Deep Dive: Setting Up TCP Conversation Filters
zhlédnutí 197Před 7 měsíci
Wireshark Deep Dive: Setting Up TCP Conversation Filters
Wireshark Advanced Filtering: Mastering Port Number Analysis
zhlédnutí 272Před 7 měsíci
Wireshark Advanced Filtering: Mastering Port Number Analysis
Wireshark Simplified: Creating and Using Subnet Filters
zhlédnutí 223Před 7 měsíci
Wireshark Simplified: Creating and Using Subnet Filters
Mastering Wireshark: IP Address Filtering Techniques and Tips
zhlédnutí 724Před 7 měsíci
Mastering Wireshark: IP Address Filtering Techniques and Tips
I used a decade old Dell to bring down critical infrastructure in an entire nation
this is very inspiring as this is sorta what I feel as I am a qualified electrician and looking to go into the networking field, and a have pretty good knowledge of IT and feel I could do more just unsure on the pathway to take 😂
How to 5ghz Wi-Fi network jamer
great video
You both are great story tellers!!.... can't wait to get a copy.... had a used original version on a wishlist on amazon for some time. Back in the early 1990s there were text based dungeon and dragon games that were hosted at certain collages what were awsome fun to play and drive down your GPA LOL..... they were all coded in C . You get to where you can read incredibly fast playing them and you can code areas straight out of a comic book or movie /tv shows... and not really worry about copyrights. Cause every thing was just text and with your imagination you conjure up the spectacular battles scenes in your head.
so stupid, why hack a car? you have to have access to the car, in that case if you want to do some damage you just place a bomb or something, this is totally useless knowledge
Full video ?
The browser doesnt work ever help pls
can u teach us how to hack wifi using kali linux without a external wifi adptor plzzzzzz my rewuest from india only u are our hope now
You can use your internal wifi card, in all videos he does just set the video to your wifi interface
My headcanon is that the editor was just as worried about asking for a copy so they could use it to reprint the book. Probably saved them so much work 🤣
no course on this Sir ?
Dr. C
Hi David!!!💙
👍👍!
Corgi you mean? lol cori B? Am i wrong here?
how about for a phone number?
This was a great watch !
Hi, ¿Does the Alfa Tube-U model support monitor mode?
Professor Severance is one of the most *committed* teachers of this craft. He is The Man, The Myth, The Legend.
Thanks!
oh I appriciate the courses of this guy I m taking his python prog thanks to u david thinks
I like Dr. Chuck
Increíble libro, lamentablemente no es tan accesible , yo llevo mucho tiempo buscándolo y todos cuestan dinero, no me canso de manifestar para que este tipo de contenido salga de las academias y llegue a lugares como este , en serio quiero que se encuentre gratis. Más por autores como usted 😊😊
wow dude you added so much by making this video your own thanks for that
Rob Braxman knows a hell of lot more about computer / internet privacy issues than the author of the video -
Love it. Going to dig into this.
M3 Max here. Running Parallels 19 effortless. Insane machine!
I like the Palestine necklace.
He's always been great with bringing new content
nice
Is this a subset of malware analyst ?.
It will massively help.
U don’t need to do all this guys 😭
Do you need OSCP to get started in pentesting or cybersecurity?
Arch linux or black arch linux are the best in my opinion but they are really hard to understand/use
Arch is easier and more flexible than other linux distros in my opinion
where is the link for the long video?! what we should even ask for something like that!
Look at you, Hacker. A pathetic creature of meat and bone. Panting and sweating as you run through my corridors. How can you challange a perfect, immortal machine?
I used this maybe 15 years ago. This is what I'm used to, putting in the info. Putting your alpha adapter in monitor mode, get your packets deauth, its been a while man. But not going to lie, since WPA ever came out I never cracked anything sense.... I know there are many other methods. not sure if this even works anymore. I never liked the guess part. It's funny the same Alpha adaptor from years ago is still recommend until this day. Crazy.
did you try again on wpa did you get any luck ?
@@monkeytrident still works.
Two votes for DragonOS. It’s not just for hackers thought, it has a lot of tools for amateur radio operators too.
Oh yeah Dragon is cool. I just played around with it on my buddy’s PC for the first time and it was enjoyable.
On a daily basis I use a very small number of the tools available in Kali or Parrot. So I use vanilla Debian and install the pen testing tools I want to it.
Me over here using Kali linux for a few days then just going back to Ubuntu and installing the tools I need.
Just WHERE was pwned or pwn mentioned in this clip?
Free only 7 days :( multiaccounts he said? XD
very informative
👍
👍
⭐️👍⭐️
All of this content is 100% 2016. Actually it looks like a conversation I had with my friends by then.
Cybersecurity tool developers Try not to pick a stupid name challenge
Hello Mr. David Bompal. Currently more wifi routers are updated to wifi 5 and 6. So which wifi adapter is best for kali linux?
thank you for mentioning the m1 and m2 but m3 is even worse a absolute nightmare everything is broke from what i can tell vms barely work
Can this tell us the amount of windows users vs Mac OS?