1. Surveillance


    from tolgaozisik Added 8,038 424 14

    for boxpn.com Direction, Design and Animation: Tolga Ozisik Script: Tolga Ozisik, Ebru Arik Sound Design and Jingle: Burak Davuloglu Produced by: Efe Cakinberk Thanks to Efe Cakinberk, Cagri…

    + More details
    • CodeIgniter 2 + Sparks + PHP ActiveRecord Part 2: The User Model


      from Big Name Added 8,844 1 4

      This screencast is the second in a series utilizing CodeIgniter 2 (Reactor) and PHP ActiveRecord. I'm fundamentally focusing on PHP ActiveRecord due to the dramatic improvement it provides over…

      + More details
      • Detach From Attachments! Arabic subtitles


        from Tibet Action Institute Added 5 0 3

        Share documents, but don't email them. Use GoogleDocs, Dropbox.com, or Ge.tt and check any attachments you get with VirusTotal.com.

        + More details
        • SurfEasy VPN


          from SurfEasy Added 98.4K 14 3

          SurfEasy encrypts all Internet traffic on your smartphone, tablet and computer to protect your online privacy and security. We give you the tools you need to surf the web safely, securely and the…

          + More details
          • Encryption


            from Sam Mularczyk Added 970 84 3

            A little video about why encryption is important when you're buying stuff online. Voiceover by Stuart Anderson: https://www.facebook.com/StuartAndersonVO/

            + More details
            • San Jose Semaphore


              from Ben Rubin Added

              San José Semaphore, by artist Ben Rubin, is a permanent public artwork commissioned by Adobe Systems Incorporated in collaboration with the City of San Jose’s Office of Cultural Affair’s…

              + More details
              • Geek101 - Episode 1 - Basics of Encryption


                from Hans Kokx Added 161 2 1

                Basics of Encryption is geared toward novice users and explains some of the basics of privacy and encryption.

                + More details
                • Vormetric Data Security: Complying with PCI DSS Encryption Rules


                  from CTOBuddy Added 42 0 1

                  PCI DSS Encryption: Secure your data, complying with PCI DSS Encryption rules. Vormetric : data security simplified http://enterprise-encryption.vormetric.com/eva4-pcidss-singleStep-landingpage.html Visit…

                  + More details
                  • KeePass & Gpg4win (TCATO)


                    from Best Crypt Added 58 0 1

                    Most password managers rely on auto-typing (auto-filling) data into login fields. So does Keepass. But auto-typed data can be key-logged. Keepass provides a way around this vulnerability through enabling…

                    + More details
                    • Red Matrix - registration and first steps


                      from Pynolo Added 946 0 1

                      The RedMatrix is a super network created from a huge number of smaller independent and autonomous websites - which are linked together into a cooperative publishing and social platform. It consists…

                      + More details

                      What are Tags?


                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."