Тёмный
SecureNinjaTV
SecureNinjaTV
SecureNinjaTV
Подписаться
As technology is constantly evolving and changing, there is a huge need for information about topics such as Cybersecurity, Cyber Intelligence and Cyber Crime. Business and government entities deal with increasing threats of security attacks each year, and must constantly reassess their vulnerabilities. SecureNinjaTV's mission is to gather critical knowledge from top security professionals in various branches of the industry and to provide free and up to date information about various security issues to the tech community, business community, and government.

SecureNinjaTV covers a wide range of industry conferences, events and trade shows each year. We're committed to obtaining up to date information about the Cybersecurity world and to maintaining a permanent and recurring presence at important industry events both domestic and international.
Hacker Highschool ▶︎ WiFi Attacks
6:04
2 года назад
Комментарии
@jimmyalsado2685
@jimmyalsado2685 9 часов назад
i am 33 years old and im struggling to make a powerpoint presentation in school
@vectoralphaSec
@vectoralphaSec Месяц назад
Youre competing with criminals and the criminals dont rest, not when they are making bank money.
@MotionrunSuperSerious
@MotionrunSuperSerious Месяц назад
get this man a pineapple because hes probably using only Linux with some basic wifi things
@nkosimfinley
@nkosimfinley 2 месяца назад
🤓
@caravaz
@caravaz 3 месяца назад
Good honest review
@sirk3v
@sirk3v 3 месяца назад
cool stuff
@SecureNinjaTV
@SecureNinjaTV 3 месяца назад
Thank you!
@SomenathChakraborty
@SomenathChakraborty 6 месяцев назад
Astounding!
@SecureNinjaTV
@SecureNinjaTV 6 месяцев назад
It was great fun to have it all to ourselves!
@SomenathChakraborty
@SomenathChakraborty 6 месяцев назад
Impressive, Thank you for making this tour video of computing History.
@SecureNinjaTV
@SecureNinjaTV 6 месяцев назад
Glad you enjoyed it!
@CyberHAC100k
@CyberHAC100k 6 месяцев назад
the production is great but why so low views...youtube
@SecureNinjaTV
@SecureNinjaTV 6 месяцев назад
We appreciate you watching! Check out our archive--we've been producing content since 2011!
@ChibiKeruchan
@ChibiKeruchan 6 месяцев назад
I wish they can add a very small storage in it like an encrypted 500mb storage perfect for storing notepads.
@xelerated
@xelerated 7 месяцев назад
oh my, Ive used DNS for exfil in pen test for like nearly 15 years. and in those 15 years only 1 company made it difficult, but not impossible to do it. its a massive blind spot, so are Zero Trust network layer tools. I also use 1 in my deployed linux systems to customers internal networks. They never have to whitelist any IP or port and I have full access. Zero Trust is a sham.
@radolfrj7136
@radolfrj7136 7 месяцев назад
Hello sir/madam i'm from srilanka In srilanka my life alone life with sounds in my ears both face in srilanka famous people enter my family life and put sounds in my ears in my room president ranil wikrmasinha?singer romesh sugathapala? Singer amal perera?only mind brain use find my ears and body daily find unknown human body machine user actress harshi rasanga,actress dishni rajapaksha, singer Justin Beiber?Singer rukantha gunathilaka,singer sanuka wikrmasinha,actor randika gunathilaka ,actor mahendra perera,singer kanchana anuradhi,actress winu siriwardhana,singer dinesh tharanga Himasha h asanthika 1999.02.16
@kevinkawchak
@kevinkawchak 7 месяцев назад
Thank you
@nerajjha2875
@nerajjha2875 8 месяцев назад
Noice i loved it
@fotografm
@fotografm 8 месяцев назад
Nice video but it's a shame they didn't share his screen !
@atracamoniusvlogs
@atracamoniusvlogs 8 месяцев назад
Dubai cybersceurity al barsha south en ebuedfvtv dominicano
@buttercat4642
@buttercat4642 8 месяцев назад
womp
@RedStoneRealm_official
@RedStoneRealm_official 8 месяцев назад
One day he will be come a master of Ethical hacking system!
@StockEncoder
@StockEncoder 9 месяцев назад
Avoid . You will end up with headache among headaches and zero support.
@deidresowerby4687
@deidresowerby4687 9 месяцев назад
Still so revelant
@jvianneyjr
@jvianneyjr 9 месяцев назад
What's the Best yubikey 5 NFC or yubikey security key NFC? Whats the diference?
@momo_hit
@momo_hit 9 месяцев назад
And he is our descent. Sanatan Dharma! Bring betterment for the world. May you always be blessed.
@user-nt9mq7rt2z
@user-nt9mq7rt2z 10 месяцев назад
bro i can do more than that at age of 13
@supersu1655
@supersu1655 5 месяцев назад
Lol
@gran-roan
@gran-roan 10 месяцев назад
7 years ago. Totally missed it
@Leilasworld
@Leilasworld 10 месяцев назад
Hello, thank you for the closer look at the yubikey! I was wondering if you might be able to clarify something for me? , I have purchased some yubikeys and set them up from home for my various online accounts, what happens if I travel internationally, on vacation for example, will the keys still work if I am now logging online with my same laptop BUT from a different internet address (different ISP address)? Also, what about if I am logging online from a different internet address, in the same travel scenario above, BUT also with a different device? Thank you!
@mithunpranav9506
@mithunpranav9506 11 месяцев назад
being a kid myself this is my actual dream im nine years old by the way
@salahmimito5080
@salahmimito5080 11 месяцев назад
gooooooooooooooooooooooooooooooooooooooooooodddddddd
@SecureNinjaTV
@SecureNinjaTV 11 месяцев назад
🥷
@lee_carter
@lee_carter Год назад
What a great piece of tech.... thanks for sharing
@SecureNinjaTV
@SecureNinjaTV Год назад
Thanks for watching! Agreed, it is an elegant solution.
@WN_Byers
@WN_Byers Год назад
Interesting how they utilize the same cide names for many projects; I assume to cause confusion and muddy any trails. Example: PRISM
@my-rules
@my-rules Год назад
@apprenticebill7116
@apprenticebill7116 Год назад
how bout just not throttling the fire fighters. "customer service error" , how many jobs i would still have if all my screw ups were simply a "customer service error"
@michaelconstable8400
@michaelconstable8400 Год назад
Why is this self important woman with the big tits involved?
@roywastaken
@roywastaken Год назад
nice!
@jagathfernando934
@jagathfernando934 Год назад
Family looks like srilankans
@abhijteoebhtuji
@abhijteoebhtuji Год назад
I really like his hacking and Reuben Paul give me a cloud pet I really like it
@reylove33
@reylove33 Год назад
This guy is dark. Dangerous.
@leeduhart105
@leeduhart105 Год назад
aren't you worried about the water snake?
@KenSherman
@KenSherman Год назад
This guy's doing at a significantly young age what took professionals years, decade(s), or career(s) to do. Particularly, I can('t) imagine all the haters he's getting & would get in addition to the admirers.😅 I hope our society would continue to encourage him & others alike & I hope the very best for this bright mind! 2:17-3:05 What a very intelligent & wise response!🤓🦉
@kartikgitm
@kartikgitm Год назад
Fair play!
@EngMohammedNagieb
@EngMohammedNagieb Год назад
The types of countermeasures and safeguards used to protect against emanation attacks are known as TEMPEST countermeasures. TEMPEST was originally a government research study aimed at protecting electronic equipment from the electromagnetic pulse (EMP) emitted during nuclear explosions. It has since expanded to a general study of monitoring emanations and preventing their interception. Simply because of the kinds of electronic components from which they’re built, many computer hardware devices emit electromagnetic (EM) radiation during normal operation. The process of communicating with other machines or peripheral equipment creates emanations that can be intercepted. These emanation leaks can cause serious security issues but are generally easy to address. TEMPEST-derived technology allows the electronic emanations that devices produce (known as Van Eck radiation) to be read from a distance (this process is known as Van Eck phreaking). TEMPEST eavesdropping or Van Eck phreaking countermeasures include the following: Faraday Cage A Faraday cage is a box, mobile room, or entire building designed with an external metal skin, often a wire mesh that fully surrounds an area on all sides. This metal skin acts as an EM absorbing capacitor that prevents electromagnetic signals (emanations) from exiting or entering the area that the cage encloses. Faraday cages can be designed to block specific frequencies while allowing others-for example, blocking Wi-Fi while allowing walkie talkies and mobile phones. White Noise White noise simply means broadcasting false traffic to mask and hide the presence of real emanations. White noise can consist of a real signal from another source that is not confidential, a constant signal at a specific frequency, a randomly variable signal, or even a jam signal that causes interception equipment to fail. Although this is similar to jamming devices, the purpose is to convolute the signal only for the eavesdropper, not the authorized user, rather than stopping even valid uses of emanations. White noise describes any random sound, signal, or process that can drown out meaningful information. This can vary from audible frequencies to inaudible electronic transmissions, and it may even involve the deliberate act of creating line or traffic noise to disguise origins or disrupt listening devices.
@deadguydontcomeback
@deadguydontcomeback Год назад
But who else having electronic teddy bear?
@deadguydontcomeback
@deadguydontcomeback Год назад
Now i realised that why my teddy bear was looking at me when I was taking bath
@samueljoshuaowusu
@samueljoshuaowusu Год назад
pretty good
@VRKtaka
@VRKtaka Год назад
🙌👍👍
@elliott2971
@elliott2971 Год назад
❗ Promo SM!!
@albertma413
@albertma413 Год назад
Technically I was a hacker at 5 but who is counting lmao. When I was in preschool my parents thought I was watching too much Sesame Street so what they did was put a lock on the Light switch the kind that are used in commercial buildings. What I did was lockpicked it. Lol
@stephjackson
@stephjackson Год назад
Embarrassing for a few fishing adult males who keep telling their wives they need psychological help for this while young kids are getting ahead of mine in safety and knowledge..so embarrassing!!! I feel so bad for my children ..go on young ones educate yourself on this! Proud of them!
@johnreinermarcos
@johnreinermarcos Год назад
Ggh
@mr_trojan
@mr_trojan Год назад
how i can learn wifi hacking.
@marklampo8164
@marklampo8164 Год назад
The lore is growing like "tales of PCP and DMT!" Those "six figure jobs" quickly become 40K jobs because you're "just not worth that kind of money!" Deja Vu all over again, Yogi! A flood of "talent" into a vacuum makes for the new lore; "The more you know in this biz, the LESS you get paid! How the F did that happen?!"