![Cybersecurity Guy](/img/default-banner.jpg)
- 354
- 315 441
Cybersecurity Guy
India
Registrace 1. 06. 2011
Hi everyone, here we try to give you the best cyber security, quantum mechanics and networking videos. So, enjoy, and share the content we upload to our CZcams channel. And subscribe to the channel 😊
Top 5 Cybersecurity Trends in 2024
In this video we gonna discuss the top 5 cybersecurity trends in 2024. Hope you enjoy this video :)
Now you can support me here-
ko-fi.com/cybersecurityguy674
I appreciate your support.
Now you can support me here-
ko-fi.com/cybersecurityguy674
I appreciate your support.
zhlédnutí: 521
Video
History of ENIAC | ENIAC
zhlédnutí 150Před 6 měsíci
ENIAC or Electronic Numerical Integrator and Computer was the first programmable, electronic, general-purpose digital computer, completed in 1945. In this video, we will discuss ENIAC key features and its role in making first hydrogen bomb. Hope you enjoy this video. Image credit: Image credit:- 1. Wikipedia A.ENIAC Penn1 Attribution-ShareAlike 3.0 Unported B. Teller-Ulam device Attribution-Sha...
Y2K Bug | Millennium Bug
zhlédnutí 163Před 6 měsíci
On 31 December 1999, a very popular bug called Millennium Bug or Y2K Bug came out. Hope you enjoy this video :) Image credit:- 1. Wikipedia A. DEC PDP-10 (DECsystem 10) mainframe computer system Attribution-ShareAlike 3.0 Unported B. Dialysis machine Attribution-ShareAlike 4.0 International
Virtual Machines
zhlédnutí 61Před 6 měsíci
In this video, we will discuss what is a virtual machine and its advantages. I hope you enjoy this video :)
What is BGP? | Border Gateway Protocol
zhlédnutí 236Před 6 měsíci
This video is about BGP. Border Gateway Protocol is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. Hope you enjoy this video :)
Photoelectric Effect Explained
zhlédnutí 105Před 7 měsíci
In this video, we gonna discuss about Photoelectric Effect and its application. Hope you enjoy this video :) Image credit:- 1. Wikipedia Albert Einstein Image Attribution-ShareAlike 4.0 International
Top 5 Cybersecurity headlines of 2023
zhlédnutí 40Před 7 měsíci
In this video, we will discuss the top 5 cybersecurity headlines of 2023 in detail. Hope you enjoy this video :) Image credit:- 1. Wikipedia T-Mobile shop, The Hague (2021) Attribution-ShareAlike 4.0 International
Types of Computer Network | Computer Networks
zhlédnutí 123Před 7 měsíci
In this video, we gonna discuss types of Computer Networks. Hope you enjoy this video :) Image credit:- 1. Wikipedia Metropolitan Area Network Attribution-ShareAlike 4.0 International
Introduction to Image and Image processing | Image Processing
zhlédnutí 104Před 7 měsíci
Digital image processing uses a digital computer to process digital images through a computer algorithm. Hope you enjoy this video. If you enjoy watching this video, give it a thumbs up, share it with your friends and don't forget to subscribe to the channel. Image credit- 1. Wikipedia (Perspective projection of cube above the plane.) Attribution-ShareAlike 4.0 International
Failures of Classical Mechanics | Classical Mechanics
zhlédnutí 946Před 7 měsíci
In this video, we will discuss the failure of classical mechanics which alternatively lead us to the discovery of quantum mechanics. Hope you enjoy this video. If you enjoy this video, give it a thumbs up, share it with your friends and don't subscribe to the channel :)
What is Data Warehouse | Why do we need data warehouse?
zhlédnutí 49Před 7 měsíci
Data warehouses are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that is used for creating analytical reports for workers throughout the enterprise. This is beneficial for companies as it enables them to interrogate and draw insights from their data and make decisions. Hope you enjoy this video and I appre...
What is NFC? | NFC Explained
zhlédnutí 45Před 7 měsíci
In this video, we will try to understand what NFC is and its top applications. Hope you enjoy this video. :)
IP Address Explained
zhlédnutí 93Před 7 měsíci
This video explains IP Address and different types of IP addresses. I hope you enjoy this video :)
Default Gateway Explained
zhlédnutí 801Před 7 měsíci
In this video, we will discuss about default gateway in networking. Hope you enjoy this video.
Theory of Everything #physics #toe #alberteinstein
zhlédnutí 132Před 7 měsíci
Theory of Everything #physics #toe #alberteinstein
What is Cyber KIll Chain? #cybersecurity #tech
zhlédnutí 80Před 8 měsíci
What is Cyber KIll Chain? #cybersecurity #tech
Cloud Security and its key aspects #cybersecurity #cloudsecurity #cloud
zhlédnutí 36Před 9 měsíci
Cloud Security and its key aspects #cybersecurity #cloudsecurity #cloud
Capabilities and function of TFTP and FTP #shorts #shortvideo
zhlédnutí 88Před rokem
Capabilities and function of TFTP and FTP #shorts #shortvideo
Top 5 Networking Protocols that we use everyday | Network Protocols
zhlédnutí 859Před rokem
Top 5 Networking Protocols that we use everyday | Network Protocols
Processes in Operating System | Operating System
zhlédnutí 176Před rokem
Processes in Operating System | Operating System
Secure Software Development Life Cycle | SSDLC #sdlc
zhlédnutí 1,4KPřed rokem
Secure Software Development Life Cycle | SSDLC #sdlc
Parallel Computing and its types | Parallel Computers #computerscience
zhlédnutí 2,1KPřed rokem
Parallel Computing and its types | Parallel Computers #computerscience
Bitcoin ATM Heist | Cryptocurrency heist | Zero Day
zhlédnutí 148Před rokem
Bitcoin ATM Heist | Cryptocurrency heist | Zero Day
Crypto scam | Cryptocurrency scam in United States
zhlédnutí 528Před rokem
Crypto scam | Cryptocurrency scam in United States
35 Malware apps on Android Phones report 🔥 🔥🔥
zhlédnutí 227Před rokem
35 Malware apps on Android Phones report 🔥 🔥🔥
thanks to banatao
❤❤❤
Goodvilog
❤
2/3 are false
We need to go back to r² and the three dimensional physics of the Inverse Square Law. Even back to the spherical 4πr² geometry Huygens’ Principle of 1670. That is what my TOE is based upon. A single geometrical process squares ψ², t², e², c², v² everything.
Metaherah
bro thi ai voice is getting me mad
How can detect android rootkits?
How can detect android rootkits?
Thanks for the video it's helpful
✌👊👊💪
We gonna..?
Sogovidio
Wow❤
Sobitifulvidio❤
Goodone
So , how is it removed :) I need halp.
RAT is hard to detect, let alone remove. But here is a blog which describes the step-by-step procedures if your computer is infected- www.systweak.com/blogs/how-to-detect-and-remove-remote-access-trojan/
Goodqueslity
you can help by providing full details about topics and good content, thank you
🎉😮
❤
I thought GPS had to do with relativity. And I thought quantum physics and relativity didn't get along.
Mostly yes but not with your device.
Goodvideo
👍🙏💝💝
G❤
Hackers are learning to use AI tools too.
Berygood
Goid video
Wow
Furst computer
👍💥💝
you learn something new every day
Nice info
Wow
Good
Good video
Good
Sogood
Good
❤❤❤❤❤
Goood
Good video
Verygood
Superb
Thanks