The CS Revelation
The CS Revelation
  • 47
  • 123 806
Social Engineering Explained with Examples
In this session, we delve into the fascinating world of social engineering and its profound impact on human behavior. Join us as we explore the intricate strategies and techniques used to influence, persuade, and navigate social interactions in both online and offline environments.
Throughout the lecture, you'll gain valuable insights into:
The psychology behind social engineering and how it shapes decision-making processes.
Real-world examples of social engineering in action, from persuasive advertising to sophisticated phishing schemes.
Ethical considerations and the importance of using social engineering techniques responsibly and ethically.
Practical tips and best practices for enhancing your communication skills, building rapport, and fostering positive relationships.
Whether you're a seasoned professional looking to deepen your understanding of human behavior or a curious learner eager to explore the dynamics of social influence, this lecture offers something for everyone.
Join us on this enlightening journey as we uncover the secrets of social engineering and empower ourselves to navigate the complexities of the modern world with confidence and insight.
👍 Don't forget to like, subscribe, and share your thoughts in the comments below. Your feedback fuels our mission to educate, inspire, and empower others. #SocialEngineering #Psychology #HumanBehavior
zhlédnutí: 81

Video

XOJO: Variables | Data Types | Create | Use
zhlédnutí 379Před 2 lety
This video will introduce the concept of variables. It will discuss some of the more common data types and how to use them in your code. It will also discuss some best practices for naming your variables, as well as how to assign values to them. Finally, you will build a small application to implement these concepts. Xojo is a strongly-typed programming language. This means that you must specif...
XOJO: Running and Building | First App | Hello World
zhlédnutí 405Před 2 lety
Xojo video 2: In this video you will learn how to navigate the IDE, and how to run and build your own applications.
XOJO: Getting Started | Download and Install | Setup
zhlédnutí 429Před 2 lety
Xojo is a cross-platform development tool for creating and sharing apps for multiple platforms, including the desktop (macOS, Windows, Linux), the web, iOS, and Raspberry Pi. Using Xojo, you can create native apps for your target platform using a single development environment where you can drag and drop your user interface elements and use the straight-forward, object-oriented Xojo programming...
What is Cryptography? | Introduction to Cryptography | Java and C++ implementation | Caesar Cipher
zhlédnutí 362Před 2 lety
Crypto basics, Crypto goals, Popular crypto algorithms, Java and C implementation, Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. Modern cryptography goals: Confidentiality, Data integrity, Non-repudiation, Authentication, plaintext - original message , ciphertext - coded message , cipher - algor...
SQL Database Video 9: SQL DELETE FROM | Apex Oracle
zhlédnutí 855Před 2 lety
When you need to remove rows from database tables, use the DELETE command. Compared to other commands covered in this series, the DELETE command is incredibly simple-perhaps even too simple! Other lectures: Video 1: CREATE TABLE: czcams.com/video/wCrbVA8-ru0/video.html Video 2: INSERT INTO: czcams.com/video/mB7GMnBSDfg/video.html Video 3: ALTER TABLE: czcams.com/video/51UQCQ8P8DA/video.html Vid...
OOP Practice 2 | Classes and Objects | JAVA
zhlédnutí 182Před 3 lety
Write a complete class named Crab that includes a String property named myColor and an int property named myAge. You must also include a default constructor that initializes myColor to RED and myAge to zero as well as an “other” constructor that accepts two parameters and uses them appropriately. You must also implement the getAge and setAge methods. Next - Construct a Crab CB1 object using def...
OOP Practice 1 | Classes and Objects | JAVA
zhlédnutí 255Před 3 lety
Classes and Objects Practice: • A Java program consists of one or more classes. • A class is an abstract description (blueprint) of objects. • An object is an instance of a class. • A class may have many instances. Create the java class Word and implement all of its members. *Class: Word *Properties: myWord: String *Constructors: Word() Word(String) *Methods: String getWord() - returns the Stri...
Crypto: Caesar Cipher explained | Java implementation
zhlédnutí 8KPřed 3 lety
This video explains the Caesar Cipher (cryptosystem) and walks through the process of implementing it in Java. One of the simplest examples of a substitution cipher is the Caesar cipher, which is said to have been used by Julius Caesar to communicate with his army. Caesar is considered to be one of the first persons to have ever employed encryption for the sake of securing messages. Caesar deci...
SQL Database complete dev process | Plan, Model, Create, Insert, Query | Apex Oracle | Data modeling
zhlédnutí 897Před 3 lety
In this video you will learn the complete development life cycle of a database (Requirement specification, Logical Design, Physical Design, Implementation) Plan, model, create, insert, query Other lectures: Video 1: CREATE TABLE: czcams.com/video/wCrbVA8-ru0/video.html​ Video 2: INSERT INTO: czcams.com/video/mB7GMnBSDfg/video.html​ Video 3: ALTER TABLE: czcams.com/video/ZExBH6zITNQ/video.html​ ...
SQL Joins and Subqueries | SQL multiple table queries | Apex Oracle
zhlédnutí 6KPřed 3 lety
In this video you will learn: the process of querying multiped tables using SQL joins and Subqueries. Inner join, left join, right join, full join, equijoin, union, intersect. Other lectures: Video 1: CREATE TABLE: czcams.com/video/wCrbVA8-ru0/video.html Video 2: INSERT INTO: czcams.com/video/mB7GMnBSDfg/video.html Video 3: ALTER TABLE: czcams.com/video/ZExBH6zITNQ/video.html Video 4: UPDATE TA...
Java Video 20: Inheritance | Abstract | Overloading | Overriding
zhlédnutí 401Před 3 lety
In this video you will learn what inheritance is. How to extend a class. the various types of inheritance. Abstract classes. Method overriding and overloading. Inheritance in Java allows a class developer programmer to efficiently build one class from another class. Rather than having to "re-invent the wheel", a class developer can take advantage of the methods in one class and automatically in...
Java Video 19: Classes and Objects
zhlédnutí 163Před 3 lety
In this video you will learn how to create, use and instantiate a Java class. A class is a set of methods (aka subroutines, procedures, functions, behavior) and variables (aka properties, fields, instance fields, attributes, state) that are saved to a separate file in a way that they can be imported and reused by many programs. You can think of a class as a template or definition for an object....
Java Video 18: String functions: substring() indexOf() length() charAt() | Part2
zhlédnutí 355Před 3 lety
in this video you will learn how to use String functions: substring() to return a portion from a String indexOf() to get the index of a character length() to get the number of characters in a String charAt() to return a character given an index value Other videos: Video1: How to Install NetBeans with JDK Cobundle. www.youtube.com/watch?v=ctIiu​​... Video2: First Java application: czcams.com/vid...
Java Video 17: Java Strings | Creating and Using Strings | Part1
zhlédnutí 93Před 3 lety
This video explains String variables. There is no data type that can be used to create a primitive variable that can store a string (i.e. sequence of characters such as a word or phrase). Therefore, it is useful to use objects of the String type. String is a class that is available for use in any Java program without the necessity of having to include an import statement at the top of the progr...
Java Video 16: One Dimensional Arrays
zhlédnutí 193Před 3 lety
Java Video 16: One Dimensional Arrays
Java Video 15: do while Loop
zhlédnutí 68Před 3 lety
Java Video 15: do while Loop
Java Video 14: While Loop
zhlédnutí 73Před 3 lety
Java Video 14: While Loop
Java Video 13: For Loop
zhlédnutí 127Před 3 lety
Java Video 13: For Loop
Java Project: Login and registration NetBeans with SQLite3 Database | Connect to database | Part 1
zhlédnutí 16KPřed 3 lety
Java Project: Login and registration NetBeans with SQLite3 Database | Connect to database | Part 1
Java Project: Login and registration NetBeans with SQLite3 Database | Connect to database | Part 2
zhlédnutí 5KPřed 3 lety
Java Project: Login and registration NetBeans with SQLite3 Database | Connect to database | Part 2
SQL Database Video 8: SQL STRING FUNCTIONS | Apex Oracle
zhlédnutí 590Před 3 lety
SQL Database Video 8: SQL STRING FUNCTIONS | Apex Oracle
SQL Database Video 7: SQL AGGREGATE FUNCTIONS | MIN MAX SUM AVG COUNT | Apex Oracle
zhlédnutí 882Před 3 lety
SQL Database Video 7: SQL AGGREGATE FUNCTIONS | MIN MAX SUM AVG COUNT | Apex Oracle
Java Video 12: Read and Write to a File
zhlédnutí 157Před 3 lety
Java Video 12: Read and Write to a File
Java Video 11: Decision Structures | Part2 | Switch case statement
zhlédnutí 155Před 3 lety
Java Video 11: Decision Structures | Part2 | Switch case statement
Java Video 10: Decision Structures | Part1| if and if else if statement
zhlédnutí 208Před 3 lety
Java Video 10: Decision Structures | Part1| if and if else if statement
SQL Database Video 5: SELECT FROM table statement | Apex Oracle
zhlédnutí 1,4KPřed 3 lety
SQL Database Video 5: SELECT FROM table statement | Apex Oracle
SQL Database Video 6: ORDER BY to sort rows in a SELECT statement | Apex Oracle
zhlédnutí 938Před 3 lety
SQL Database Video 6: ORDER BY to sort rows in a SELECT statement | Apex Oracle
Java Video 9: Java Methods | Create and Call | Static and Instance Methods
zhlédnutí 192Před 3 lety
Java Video 9: Java Methods | Create and Call | Static and Instance Methods
SQL Database Video 2: Insert Rows INTO Table | Apex Oracle
zhlédnutí 6KPřed 3 lety
SQL Database Video 2: Insert Rows INTO Table | Apex Oracle

Komentáře

  • @viktory49
    @viktory49 Před 2 měsíci

    Very nice tutorial. It is a pity you stopped doing them. A lot of tutorials with low quality, even those from Xojo itself. Come back!

  • @user-gp8vo4fu9c
    @user-gp8vo4fu9c Před 3 měsíci

    Why do you use a watermelon as an intro? Pls change it

  • @marcs5210
    @marcs5210 Před 3 měsíci

    *Promo sm*

  • @prabhakaraadhik7377
    @prabhakaraadhik7377 Před 3 měsíci

    thank you so much, i was strugglingfor 3 days to solve the connection problems...😇

  • @Zeb86
    @Zeb86 Před 3 měsíci

    CREATE TABLE Worksfor( E_id Number(1) REFERENCES Employee(E_ID), D_id Number(2) REFERENCES Department(D_ID) Salary Number(6), primary key (E_ID, D_ID) ); Mine keeps showing an Error. What to do, please?

  • @raghav.chawla
    @raghav.chawla Před 4 měsíci

    Is there anyway to get in contact with you regarding a coding project based off of one of your tutorials?

  • @avenist835
    @avenist835 Před 4 měsíci

    🎯 Key Takeaways for quick navigation: 00:18 *🕵️ Social engineering example story* - Illustration of social engineering through a narrative involving a job applicant and a company secretary. - The applicant exploits human vulnerability to hack into the company's system by manipulating the secretary's trust. - Demonstrates how psychological manipulation can lead to security breaches. 03:32 *🎭 Understanding social engineering* - Definition of social engineering: the use of manipulation, influence, and deception to persuade trusted insiders to comply with malicious requests. - Explanation of social engineering as the science and art of hacking the human operating system. - Overview of the historical significance and modern prevalence of social engineering in cyberattacks. 04:41 *🏛️ Historical social engineering example* - Introduction to the historical social engineering attack of the Trojan Horse from Greek mythology. - Demonstrates how social engineering has been employed throughout history to deceive and manipulate. - Highlights the timeless nature of social engineering techniques. 07:32 *🎣 Phases and common types of social engineering attacks* - Explanation of the phases of a social engineering attack: investigation, hooking, playing, and removing traces. - Overview of common types of social engineering attacks, including phishing, spear phishing, whaling, and vishing. - Emphasis on the importance of understanding and identifying social engineering attacks to mitigate risks. 09:11 *🎣 Phishing attack and detection* - Definition of phishing as a common social engineering attack aimed at redirecting victims to fake websites. - Signs of phishing attacks, including offers that seem too good to be true, a sense of urgency, hyperlinks, and attachments. - Importance of vigilance and skepticism in detecting and avoiding phishing attempts. 12:12 *🎣 Spear phishing and whaling attacks* - Distinction between spear phishing, targeting specific individuals or organizations, and whaling, targeting high-ranking executives. - Explanation of the heightened risks associated with whaling attacks due to executives' access to sensitive information. - Illustration of how social engineering tactics are tailored to exploit different levels of authority within organizations. 13:58 *📞 Vishing attacks and real-life examples* - Definition of vishing as voice phishing, involving phone calls to deceive victims into sharing personal and confidential information. - Real-life examples of vishing attacks, including impersonating legitimate companies to extract sensitive information from victims. - Highlighting the psychological manipulation tactics used in vishing attacks through personal anecdotes and video clips. 19:46 *🎣 Angler fishing and social media exploitation* - Explanation of angler fishing as the use of fake customer service accounts on social media to intercept customer queries. - Illustration of how cybercriminals exploit social media platforms to impersonate legitimate companies and deceive users. - Emphasis on the need for caution and verification when interacting with corporate accounts on social media. 21:22 *📱 Smishing attacks via SMS* - Definition of smishing as SMS-based phishing attacks, often containing links to fake websites to trick recipients into divulging personal information. - Explanation of how smishing attacks exploit the trust and curiosity of recipients to click on malicious links or reply with sensitive information. - Warning about the risks of smishing and the importance of skepticism when receiving unsolicited messages. 22:45 *🎣 Baiting techniques and examples* - Definition of baiting as a social engineering attack that lures victims into traps using false promises or physical media containing malware. - Explanation of baiting techniques, including offering free downloads, low-priced products, and compromised USB drives. - Illustration of how baiting exploits human curiosity and desire for freebies to compromise cybersecurity. 25:42 *🐟 Types of Social Engineering Attacks: Catfishing, Pretexting, and Quid Pro Quo* - Catfishing involves creating fake online identities to garner romantic attention, often for financial gain or self-esteem needs. - Pretexting relies on a series of lies to convince victims of false identities, such as pretending to be a coworker or a bank official. - Quid pro quo offers something in return for personal information, exploiting the victim's desire for a benefit or service. 27:44 *📧 Example of Quid Pro Quo Attack: Nigerian Prince Scam* - Quid pro quo attacks often involve promises of financial rewards or services in exchange for personal information. - Scammers exploit victims' trust and desire for gain, leading them to willingly disclose sensitive information. - The Nigerian Prince scam is a classic example, where victims are promised a share of a large sum of money in exchange for a small initial payment. 31:09 *⚠️ Scareware: Deceptive Pop-up Alerts* - Scareware utilizes fake pop-up alerts warning users of non-existent threats, urging them to download malware-disguised software. - Victims, often less tech-savvy individuals, may fall prey to these deceptive tactics, unknowingly installing malware on their systems. - Once installed, malware grants attackers access to victims' systems, enabling further exploitation or integration into botnets. 32:46 *🚪 Tailgating: Physical Security Breach* - Tailgating involves impersonating an authorized individual to gain unauthorized access to restricted areas, exploiting human trust. - Attackers capitalize on the courtesy of legitimate employees, who hold doors open, allowing unauthorized entry. - This physical security breach highlights the importance of vigilance and stringent access control measures to prevent unauthorized entry. 33:52 *♻️ Dumpster Diving: Extracting Information from Trash* - Dumpster diving entails searching through discarded materials for personal or confidential information that can be exploited for malicious purposes. - Attackers may retrieve sensitive data from improperly disposed documents, posing a significant threat to personal and business security. - Proper disposal procedures and shredding documents can mitigate the risk of information leakage through dumpster diving. Made with HARPA AI

  • @noofalsalmi5121
    @noofalsalmi5121 Před 7 měsíci

    Thank you your videos are very helpful 🙏🏻🩷

  • @caitlinsmith9074
    @caitlinsmith9074 Před 8 měsíci

    I know this is an older video, but did you open a script to add tables to, or is this a new script?

  • @user-uc6el1qu1u
    @user-uc6el1qu1u Před rokem

    Your Apex Oracle videos are TOP NOTCH! This one on joins is fantastic. Thank you!!

  • @protprot3267
    @protprot3267 Před rokem

    where can you check relations between these tables?

  • @thrinadha6391
    @thrinadha6391 Před rokem

    Excellent, thank you

  • @faisal.enayat
    @faisal.enayat Před rokem

    These are wonderful videos!!!

  • @alexandregames99xandi

    i cant find, page not found

  • @malisa1133
    @malisa1133 Před rokem

    Thank you so much

  • @bayareamountainbiker

    how do you keep the case of the letter and codify it as the same time?

  • @LovepreetKaur-bk3yz

    THANKYOU SO MUCH. THE VIDEO WAS SOOOO SOOO HELPFULL . I HAVE REALLY GOOD UNDERSTANDING OF THE TOPIC NO NOW> I WAS SO CONFUSED BEFORE !

  • @patellavya
    @patellavya Před rokem

    love you sir

  • @ElvisSoto-vk2qo
    @ElvisSoto-vk2qo Před rokem

    I like this guy

  • @JoellaAzar
    @JoellaAzar Před rokem

    Best Teacher Ever!!!!

  • @JoellaAzar
    @JoellaAzar Před rokem

    Amazing Video👍🏾👍🏾

  • @josephrivera705
    @josephrivera705 Před rokem

    Thank you for a helpful tutorial.

  • @JJJJ-gl2uf
    @JJJJ-gl2uf Před rokem

    Good explanation. This can be a confusing aspect of learning Java for beginners . . . .

  • @pavansandhu8763
    @pavansandhu8763 Před rokem

    my decoding doesn't work. It returns a single character multiple times.

  • @GoodDeedsLeadTo
    @GoodDeedsLeadTo Před rokem

    Please guide me to SQL normalization examples video? Thanks

  • @ezekieljohndecipulo4061

    23:57 then this is the result how can i fix it ? Connection Failed java.lang.ClassNotFoundException: org.sqlite.JBDC i already installed the mysqlite jbdc

  • @mehdimehido2294
    @mehdimehido2294 Před rokem

    thank you sir

  • @matthewcastro4571
    @matthewcastro4571 Před rokem

    How do you put decimal? For example 1500.00 and still have the decimal value shown

  • @karolinemoraes7298
    @karolinemoraes7298 Před rokem

    Thanks for this series! All the videos are super helpful

  • @Richmsy90
    @Richmsy90 Před rokem

    Thanks so much for this video - I am struggling to figure out SQL in my class and these videos really assisted in my understanding.

  • @elijahayodele173
    @elijahayodele173 Před rokem

    I'm grateful for this. Its working without any errors.

  • @nuhjama3005
    @nuhjama3005 Před 2 lety

    Is (% 26) really necessary in decoding method?. (charIndex - Key) will never be greater than 26 and you have the if-statement that will fix if newIndex is negative number.

  • @ernestobcoa2009
    @ernestobcoa2009 Před 2 lety

    Hello everyone, Thanks a lot for this lesson!! I updated the encryption part a little, because we have to consider the cases regarding uppercase letters and special characters. So, without to convert the plainText string in lowercase, this is the new encryption part (tested with success in HackerRank): public static String caesarCipher(String plainText, int shift) { String alphabet = "abcdefghijklmnopqrstuvwxyz"; String encryptedText = ""; for (int i = 0; i < plainText.length(); i++) { if (Character.isLetter(plainText.charAt(i))) { if (Character.isUpperCase(plainText.charAt(i))) { int charIndex = alphabet.indexOf(Character.toLowerCase(plainText.charAt(i))); int newIndex = (charIndex + shift) % 26; char encryptedChar = Character.toUpperCase(alphabet.charAt(newIndex)); encryptedText += encryptedChar; } else { int charIndex = alphabet.indexOf(plainText.charAt(i)); int newIndex = (charIndex + shift) % 26; char encryptedChar = alphabet.charAt(newIndex); encryptedText += encryptedChar; } } else { encryptedText += plainText.charAt(i); } } return encryptedText; } Hoping to be useful for everyone.

  • @jeanwill69
    @jeanwill69 Před 2 lety

    Thank you very much.

  • @iliasmehdi6647
    @iliasmehdi6647 Před 2 lety

    thnks

  • @peternjenga7234
    @peternjenga7234 Před 2 lety

    Hi I am using intelij IDEA to run the code and it is showing no values for the cipher text and decoded message. What can be the problem.

  • @FriedrichBoettger
    @FriedrichBoettger Před 2 lety

    Thanks very much for this enlightening tutorial. I've tried this a few different ways but this is the simplest and by far the most foolproof.

  • @destu5007
    @destu5007 Před 2 lety

    it says database locked, what could be causing this error

  • @pradeepraj4470
    @pradeepraj4470 Před 2 lety

    How to get only column names

  • @md.jaberhossain6702
    @md.jaberhossain6702 Před 2 lety

    What is the problem ? I typed exactly what you had typed. But error occurs every time. CREATE TABLE Worksfor ( E_ID Number(1) REFERENCES(E_ID), D_ID Number(2) REFERENCES(D_ID), Salary Number(6), Primary key(E_ID,D_ID) );

    • @ridwanmugdha7623
      @ridwanmugdha7623 Před 2 lety

      Same for me...Always showing error... And another thing, ORACLE is the Worst.

    • @thecsrevelation
      @thecsrevelation Před 2 lety

      You are missing the table name in your references lines

    • @md.jaberhossain6702
      @md.jaberhossain6702 Před 2 lety

      @@thecsrevelation Ok got it. Thank you.

  • @joelmck
    @joelmck Před 2 lety

    This is brilliant. Exactly the tutorial I was looking for - thank you.

  • @mahmoodcse
    @mahmoodcse Před 2 lety

    Its very useful dear. would you please shjow us video tutorial 3. its really same with 4.

  • @ohhhhhm
    @ohhhhhm Před 2 lety

    i want to rename a specific name in my table what will be the command for that?

    • @thecsrevelation
      @thecsrevelation Před 2 lety

      To rename a column : ALTER TABLE tableName RENAME COLUMN oldCol TO newCol

  • @AlbertNabiev
    @AlbertNabiev Před 2 lety

    Very well explained!!! Thank you!

  • @LuqmanHakim-mc4wz
    @LuqmanHakim-mc4wz Před 2 lety

    Hi Sir , your reference link for ALTER table is same with the link for update table

  • @jzhmd007
    @jzhmd007 Před 2 lety

    u are wonderful. keep it up.

  • @salmanshaik4014
    @salmanshaik4014 Před 2 lety

    Best video I've watcted about Joins, thank you so much.

  • @mohamedredha9586
    @mohamedredha9586 Před 2 lety

    sir everything is fine except the log in , it doesn't work but there is no error message ( the exit button is working , the connection to the data base is working too except the log in)

  • @humifogs
    @humifogs Před 2 lety

    thank you very much !!! you helped me a lot thanks

  • @aarushi740
    @aarushi740 Před 2 lety

    Hi, i tried to run the same code on bluej and each time I enter a string and a key, it gives a string out of bounds exception, why is that happening?

    • @thecsrevelation
      @thecsrevelation Před 2 lety

      package caesarcrypto; import java.util.Scanner; public class CaesarCrypto { static String alphabet = "abcdefghijklmnopqrstuvwxyz"; public static String encoding(String pText, int Key){ pText = pText.toLowerCase(); String cText =""; for(int i = 0; i<pText.length(); i++){ int charIndex = alphabet.indexOf(pText.charAt(i)); int newIndex = (charIndex + Key) %26; char cipherChar = alphabet.charAt(newIndex); cText = cText+cipherChar; } return cText; } public static String decoding(String cText, int Key){ cText = cText.toLowerCase(); String pText=""; for(int i = 0; i<cText.length(); i++){ int charIndex = alphabet.indexOf(cText.charAt(i)); int newIndex = (charIndex - Key) %26; if (newIndex <0){ newIndex = alphabet.length()+newIndex; } char plainChar = alphabet.charAt(newIndex); pText = pText + plainChar; } return pText; } public static void main(String[] args) { Scanner scan = new Scanner(System.in); System.out.print("Enter plain Text: "); String plain = scan.nextLine(); System.out.print("Enter Key: "); int Key = scan.nextInt(); String cipherText = encoding(plain, Key); System.out.println(" The Cipher Text is: "+cipherText); System.out.println(" The Plain Text is: "+decoding(cipherText,Key)); } }