All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
pcmag.com
Definition of secure code
Definition of secure code
Jan 14, 2020
Security Code Hacks
0:20
🎙️ No one ever wants a group of #hackers to say about their company: “We had the keys to the kingdom.” But that’s exactly what the hacker Sick Codes said on this week’s episode of #LockandCode. Listen now! ▶️ https://bit.ly/3BDlB7L Also available on: 🎧 Spotify - https://spoti.fi/3bdyKdd 🍎 Apple Podcasts - https://apple.co/3886V47 | Malwarebytes
Facebook
Malwarebytes
5.2K views
Sep 2, 2021
9:33
Everyone Believes These Hacking Codes… Until Now
YouTube
CyberTech Channel
2 months ago
11:59
How Hackers Use QR Codes to Hack ANY Mobile! ⚡ Hacking Girl YT
YouTube
Hacking Girl YT
74 views
2 months ago
Top videos
Basic Practices for Secure Development of Cloud Applications - Part 1 - SAFECode
safecode.org
Jul 9, 2019
SecureCode: A smart and seamless solution for code security.
devpost.com
Feb 18, 2024
Secure Coding Based On OWASP Top 10 with Practical Examples
git.ir
224 views
Oct 30, 2024
Security Code Generator
Secret Code Generator With Key
weebly.com
Nov 8, 2020
Free Online Unlock Code Generator
weebly.com
5 months ago
Make A Code Generator Based On Key
weebly.com
Oct 2, 2020
Basic Practices for Secure Development of Cloud Application
…
Jul 9, 2019
safecode.org
SecureCode: A smart and seamless solution for code security.
Feb 18, 2024
devpost.com
Secure Coding Based On OWASP Top 10 with Practical Examples
224 views
Oct 30, 2024
git.ir
Implement secure code with your team - Programming Foundations
…
Dec 12, 2018
linkedin.com
18 Best Code of Conduct Examples | Case IQ
3 weeks ago
caseiq.com
Secure coding | Red Hat Developer
Apr 13, 2018
redhat.com
0:53
SecurePass: The Ultimate Password Strength Checker! 🔒💡 #webdevelopm
…
924 views
11 months ago
TikTok
codewithshiree
Mastering the Security Code Review
774 views
Feb 22, 2024
git.ir
Secure coding guide for Developers, Analysts and Architects
Jun 27, 2022
git.ir
Introduction to Security - Code
6 views
Sep 6, 2024
odoo.com
How to create a killer HR Portal SharePoint site? 3 Examples and
…
Aug 1, 2020
origamiconnect.com
Taking the Pain Out of Securing Your Code: A Native, Automated A
…
2 months ago
dev.to
1:04
Secure Code Lab – Learn Secure Coding & Application Security
29 views
1 month ago
YouTube
Secure Code Lab
0:28
Is Your Code Secure? Find Out Now
816 views
1 month ago
YouTube
DevDecode
0:45
Secure Code = Secure Apps | Software Development Security #l
…
142 views
1 month ago
YouTube
CyberFromZero_Daily
1:54
How to Set Up Safe Code - Step by Step
3 months ago
YouTube
The Slop Farm 2
14:12
Infoblox DNS Security Overview
38.7K views
Jun 3, 2016
YouTube
Infoblox
State bank Debit Card 3D Secure Code
15.9K views
Aug 13, 2013
YouTube
EducationGovt
0:29
How to securely store secrets! #softwareengineer #cybersecurity
…
362.6K views
Nov 14, 2022
TikTok
codingcomrade
6:02
Terminal Block Basics
210.6K views
Oct 16, 2017
YouTube
RSP Supply
1:08
Coding Instructions - ATA PTX4 Remote
190.8K views
Mar 17, 2015
YouTube
National Garage Remotes & Openers
0:32
Tugger Safety Training
51.5K views
Jun 10, 2017
YouTube
Forklift University Inc
12:40
Introduction to Big-O
350.3K views
Jan 6, 2017
YouTube
WilliamFiset
2:14
How to Program your GunVault (Digital)
234.3K views
May 31, 2017
YouTube
GunVault Official
2:22
How Geogrid Works: Lateral Restraint Demonstration
64.3K views
Mar 25, 2013
YouTube
Tensar, a division of CMC
2:39
Unication G5 Quick Call Paging over P25
35.1K views
Apr 20, 2018
YouTube
All Star Communications LLC
16:59
Hash Functions in Cryptography
546.6K views
Dec 6, 2019
YouTube
Abhishek Sharma
8:33
Situational Leadership Types: Examples from Film
334K views
Oct 23, 2015
YouTube
Cassandra Vara
1:19:49
How to Analyze Code for Vulnerabilities
71.7K views
Jun 13, 2021
YouTube
OWASP DevSlop
See more videos
More like this
Feedback