1. Seducción


    from Matt Blum / Added

    447K Plays / / 26 Comments

    model: Jade Bryce video: Matt Blum (www.MattBlum.net) music: Latin Playboys "Manifold de Armour"

    + More details
    • Ubisoft Montreal_Watch Dogs "Blackout"


      from Patrick Clair / Added

      114K Plays / / 71 Comments

      Created with the talented team from Ubisoft Montreal. Design and Direction by Patrick Clair Antibody Film Lab www.antibodyfilmlab.net Watch Dogs is currently in production.

      + More details
      • extrawelt - BREEDLE (Official Video)


        from denial of service / Added

        110K Plays / / 57 Comments

        this took four months of formula experimentations and over 1000 hours of combined rendering via open source raytracers to complete. also check out its sibling for the-side track "THE INKLING" at https://vimeo.com/76123151 audio by EXTRAWELT video by denial.of.service Traum Schallplatten V168 © 2013 http://www.facebook.com/dof.service http://vimeo.com/doservice http://soundcloud.com/states http://www.facebook.com/inorganic.being http://www.d-os.org http://www.facebook.com/pages/Extrawelt/25842915423 http://soundcloud.com/extrawelt-official http://www.discogs.com/artist/Extrawelt http://www.traumschallplatten.de http://soundcloud.com/traum-schallplatten

        + More details
        • Contour & Shape


          from denial of service / Added

          87.5K Plays / / 101 Comments

          all sound & vision by the denial.of.service ©2015 - Creators.Project.Blog.Vice : http://thecreatorsproject.vice.com/blog/video-artist-makes-human-data-writhe-like-liquid-metal - Optimal.Human.Modulation website : http://optimalhumanmodulation.com/2015/02/02/glitch-visual-bliss-and-intense-edm/ - the Jellyfishact Blog : http://blog.thejellyfishact.com/thejellyfishact/2015/3/2/kinect-vision-meets-data-mosh-contour-shape-denial-of-service all shots (of myself & surroundings) were achieved entirely on the MS Kinect v1. PC & Z data were captured & manipulated with Brekel, Processing and Meshlab. sequences were rendered in 3DSMax with Krakatoa & Vray / After Effects with Trapcode Form. datamoshing & further glitch was mostly accomplished with ruby code & processing. audio : Roland TR-808 & SH-101, Oberheim DMX, Clavia NordLead IIX, AKAI S-950, Yamaha CS15, Doepfer A-100 & MAQ 16/3. https://www.facebook.com/dof.service https://soundcloud.com/states https://www.behance.net/states http://d-os.org

          + More details
          • Can You Hack It?


            from Anonymous / Added

            71.6K Plays / / 3 Comments

            AKA Hackers Wanted This film explores the origin of true hackers vs. today's computer criminals by following the adventures of Adrian Lamo and other well-intentioned hackers, who found security holes and pointed them out so they might be fixed, only to eventually be arrested. Commonly thought of as computer criminals and vandals, a true hacker is an innovative thinker able to 'hack' himself out of a given problem or situation, whether it be computer related or not. Historically, hackers have accounted for mankind's greatest inventions and discoveries and yet have repeatedly been persecuted for their new ideas by the powerful and fearful. Experts on cyber-terrorism also examine our societal view of the hacker and debate as to whether or not we should recruit and utilize the skills of the helpful hackers to fight future cyber-wars, instead of continuing to punish what we do not understand.

            + More details
            • CYBER ADVENTURES


              from COLOR BLIND / Added

              50.7K Plays / / 0 Comments

              Download loops pack "CYBER ADVENTURES PART1" in 1280x720 pixels @ http://vjloophd.blogspot.com/ Blog will be update regularly.

              + More details
              • Visualizing a cyber attack on a VOIP server


                from benreardon / Added

                46K Plays / / 4 Comments

                http://dataviz.com.au/VOIP_attackers.html Through our support of the Honeynet Project, we recently attempted a new approach to visualizing attacks on their VOIP honeypots. With the increase in popularity of VOIP telephony, attacks are becoming more prevalent. The compromise of a VOIP system can cost the victim over $100,000 in real cash. For example, an Australian based company suffered $120,000 in toll fraud as a result of a VOIP compromise - read the full story here. The video is intended to be a high level (if not stylized) visualization of the early stages of a cyber criminal compromising a VOIP system. Credit to gltail, a ruby based tool which we fed heavily hacked/modified logfiles. Also Johann Pachelbel for his beautiful Canon as I was so tired of hearing electronic dance music mixed to hacking videos.

                + More details
                • CyberTV EP.6 สัมผัสแรก Samsung Galaxy S3


                  from CyberBiz MGR / Added

                  29.6K Plays / / 1 Comment

                  วันนี้ทางทีมงานก็ได้รับ Galaxy S3 มารีวิวแบบจัดเต็มอีกครั้ง แต่ก่อนจะไปรับชมรีวิวตัวเต็มในรูป Text วันนี้ทีมงานได้นำ Galaxy S3 มาแฮนด์ออน ตรวจทุกมุมในรูปแบบรายการ CyberTV ด้วยความยาว 20 นาทีกับคุณบอย

                  + More details
                  • Verint CIS Solutions


                    from Verint / Added

                    23.7K Plays / / 0 Comments

                    This video discusses how the Verint Communications and Cyber Intelligence products and solutions help make the world a safer place.

                    + More details
                    • CyberTV EP.7 พรีวิว LG Optimus 3D Max


                      from CyberBiz MGR / Added

                      21.3K Plays / / 0 Comments

                      คุณแพทจะพาสัมผัส LG Optimus 3D Max ที่เน้นความโดดเด่นเรื่องระบบ 3 มิติและซีพียูที่อัปเกรดเป็น Dual Core จากรุ่นแรก

                      + More details

                      What are Tags?


                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."