✕ Clear filters
20 videos

📄 Research Papers Explained

The latest AI papers broken down — attention, RLHF, diffusion, MoE and more

Password Cracking: Can a Rainbow table reverse a hashed password?
📄 Research Papers Explained
Password Cracking: Can a Rainbow table reverse a hashed password?
David Bombal Beginner 1mo ago
Google Dorks EXPLAINED (-, +, "")
📄 Research Papers Explained
Google Dorks EXPLAINED (-, +, "")
David Bombal Beginner 2mo ago
Microsoft Recall: The Ultimate Privacy NIGHTMARE of 2025
📄 Research Papers Explained
Microsoft Recall: The Ultimate Privacy NIGHTMARE of 2025
David Bombal Beginner 4mo ago
The Cisco AI Pod Explained
📄 Research Papers Explained
The Cisco AI Pod Explained
David Bombal Beginner 4mo ago
Your Phone Number Was LEAKED (if you use WhatsApp)
📄 Research Papers Explained
Your Phone Number Was LEAKED (if you use WhatsApp)
David Bombal Beginner 4mo ago
Cloudflare Outage 2025 EXPLAINED
📄 Research Papers Explained
Cloudflare Outage 2025 EXPLAINED
David Bombal Beginner 4mo ago
The Simple Future of Cybersecurity?
📄 Research Papers Explained
The Simple Future of Cybersecurity?
David Bombal Beginner 4mo ago
Stop Giving Them Your Real E-mail Address!
📄 Research Papers Explained
Stop Giving Them Your Real E-mail Address!
David Bombal Beginner 5mo ago
Half-Petabit Router… Explained in 60s
📄 Research Papers Explained
Half-Petabit Router… Explained in 60s
David Bombal Beginner 7mo ago
How to Track the People Tracking YOU
📄 Research Papers Explained
How to Track the People Tracking YOU
David Bombal Beginner 7mo ago
Finally Understand NAT and PAT, Wireshark shows every translation
📄 Research Papers Explained
Finally Understand NAT and PAT, Wireshark shows every translation
David Bombal Beginner 8mo ago
The Bluetooth FLAW That Affects 350 Million Cars
📄 Research Papers Explained
The Bluetooth FLAW That Affects 350 Million Cars
David Bombal Beginner 8mo ago
You Use Protocol Stacks Every Day… But What Are They?
📄 Research Papers Explained
You Use Protocol Stacks Every Day… But What Are They?
David Bombal Beginner 9mo ago
Cookie Theft Demo: Bypass Two-Factor Authentication (2FA)
📄 Research Papers Explained
Cookie Theft Demo: Bypass Two-Factor Authentication (2FA)
David Bombal Beginner 11mo ago
Your Privacy and Security Nightmare: Hackers track and control cars with just license plate number 😱
📄 Research Papers Explained
Your Privacy and Security Nightmare: Hackers track and control cars with just license plate number 😱
David Bombal Beginner 1y ago
Pass or Fail? Does RAID actually work?
📄 Research Papers Explained
Pass or Fail? Does RAID actually work?
David Bombal Beginner 3y ago
Warning! This is how cars are hacked. Just like in Mr Robot.
📄 Research Papers Explained
Warning! This is how cars are hacked. Just like in Mr Robot.
David Bombal Beginner 3y ago
You are in a Cyber War. Don't be a dumb*** and try to ignore it
📄 Research Papers Explained
You are in a Cyber War. Don't be a dumb*** and try to ignore it
David Bombal Beginner 3y ago
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
📄 Research Papers Explained
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
David Bombal Beginner 3y ago
Traceroute explained // Featuring Elon Musk // Demo with Windows, Linux, macOS
📄 Research Papers Explained
Traceroute explained // Featuring Elon Musk // Demo with Windows, Linux, macOS
David Bombal Beginner 4y ago