Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube
Explore the intricacies of buffer solutions in this comprehensive chemistry video tutorial. Learn how to calculate the pH of buffer solutions using the Henderson-Hasselbalch equation, understand the concept, components, and function of buffer solutions, and discover the relationship between pH and pKa values. Delve into the composition of buffer solutions, consisting of a weak acid and its conjugate weak base counterpart, and their purpose in maintaining a relatively constant pH value. Work through numerous examples and practice problems to reinforce your understanding of this crucial chemistry concept.

YouTube
Explore the technical intricacies of buffer head deprecation in this 20-minute Linux Foundation conference talk. Delve into the reasons behind sunsetting buffer heads, understand the implications for system performance, and learn about alternative approaches being implemented. Gain insights into the evolution of Linux kernel memory management and how these changes impact overall system efficiency.

Pluralsight
Modern software systems rely on fast, efficient inter-service messaging to meet performance demands in distributed environments. In this course, Protocol Buffers Fundamentals, you’ll learn to adopt this high-performance technology. First, you’ll explore the secrets that protocol buffers so fast and efficient. Next, you’ll discover how to construct your own messaging systems. Finally, you’ll learn how to maintain your message definitions as your system’s needs evolve. When you’re finished with this course, you’ll have the skills and knowledge of protocol buffers needed to build systems with blazingly fast and efficient messaging.

YouTube
Dive into advanced buffer overflow techniques in this Black Hat USA 2000 conference talk by Greg Hoglund. Explore attack theory, injection vectors, and payload types while learning about the challenges of buffer overflow injection. Examine stack injection techniques, address housekeeping, and endianness considerations. Discover strategies for payload placement, including confined payloads and using more stack space. Investigate HEAP trespassing, VTABLE overwriting, and XOR protection. Compare hardcoded function calls with dynamic function loading, and understand the pros and cons of each approach. Gain insights into HASH loading and CRC checking in this comprehensive exploration of advanced buffer overflow methods.

YouTube
Dive into the world of 32-bit Windows buffer overflows through this comprehensive 30-minute course. Learn the step-by-step process of exploiting buffer overflows, starting with an introduction to the concept. Progress through spiking and fuzzing techniques, then master the art of finding offsets and overwriting the EIP. Explore methods for identifying bad characters and locating the right module. Finally, generate shellcode and gain shells to complete your understanding of this critical cybersecurity topic. Presented by Cyber Mentor, this course simplifies complex concepts, making buffer overflows accessible and easy to grasp for aspiring security professionals.

YouTube
Explore vertex buffer layouts in game engine development through this comprehensive video tutorial. Learn about vertex buffers, buffer offsets, and buffer layouts while diving into shader enums, buffer layer offsets, and size calculations. Discover techniques for changing types, converting vectors to buffers, and iterating through elements. Gain insights into component counts, OpenGL base types, and adding color to triangles. Master the process of setting layout layouts and implement clean-up procedures to optimize your game engine's performance.

Pluralsight
Pluralsight is not an official partner or accredited training center of EC-Council. Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and implementation practices can be exploited to create security issues in systems and networks. The problem is that most IT professionals do not have the extensive software development background needed to tackle the subject of buffer overflow. This course breaks down the technical subjects of computer memory management, controlling code, and data inside of a running program, and exploiting poor quality software into terms that IT people with no software development experience can understand. Also examined are ways to prevent buffer overflow conditions and minimize the impact of buffer overflows that do happen. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Craftsy
Not all quilts need to end with a plain binding! In this class, taught by art quilter Heather Thomas, you will learn 10 different techniques for adding edges and finishes to your quilted projects: Satin Stitch with Rattail Two Toned Double French Binding Sandwich Facing with a Wavy Edge Gathered Ribbon Edging Single Fold Hand Beading Binding Raw Edge Sectioned Binding Iron-on Curved Edge Binding Ripped Iron-on with Twisted Couched Fabric Single Fold Ripped Edge with Fray & Couched Ribbon Each of these techniques can add some extra beauty to the edges of your quilts.

Craftsy
Take your sewing to the next level by adding professional seam finishes to your projects. Perfect seams are the foundation of a well-sewn garment or project. In this class, ZJ Humbach gives you a quick tutorial on how to ensure your seams are perfect each and every time you sew. You will also be able to download a checklist for sewing perfect seams. Your sewing machine offers you several choices for finishing your seams quickly, easily and professionally. Even if you only have a straight-stitch machine, you can add a custom look with either edge stitching or a turned and stitched seam, which is also called a clean finish. For those with zigzag machines, there are three main options to achieve a professional look. Encased seams are a versatile finish for a wide range of sewing projects. You’ll learn how to do three different styles: self-bound seam, mock French seam, and French seam. Each looks terrific and is easier than you think. Once you learn how, you’ll use these techniques on so many projects! You will be able to practice everything you have learned in the bonus project, a simple tote bag. Practice sewing an encased seam and French seams. You’ll also learn how to make a lined pocket. You can make this bag in less than an hour!

YouTube
Explore buffer layout abstraction in OpenGL through this 30-minute video tutorial. Learn why vertex arrays are important and how to abstract them effectively. Discover the process of creating and implementing vertex arrays, as well as how to work with vertex buffers. Follow along with practical demonstrations and gain insights into optimizing your OpenGL projects. Conclude with a test of your newly acquired knowledge and skills in buffer layout abstraction.

YouTube
Explore the art of spiking in buffer overflows through this 10-minute video tutorial. Learn how to identify vulnerable commands within a program using techniques like connecting to Vulnserver, utilizing generic_send_tcp, and writing SPIKE scripts. Follow along as the instructor demonstrates spiking the Vulnserver STATS and TRUN commands, providing practical insights into this crucial aspect of cybersecurity. Gain valuable knowledge to enhance your understanding of buffer overflow vulnerabilities and improve your penetration testing skills.

Craftsy
Bring out the true style potential in any fiber project! Join popular fiber aficionado Edie Eckman and learn how to crochet beautiful borders that you can apply beyond just crocheted projects. During class, you’ll conquer lots of great border styles, from tasteful basics to unique beauties. Along the way, you’ll see how to plan for project success, crochet a base row and read charts like a pro. If you run into a bump along the way, no big deal, because Edie will show you how to troubleshoot common problems. You’ll also learn new crochet stitches, conquer curves and corners and discover how to apply your border to all sorts of fabrics.

Craftsy
Work through each seaming technique with Katrina as you build a reference notebook of techniques you can apply to any garment. Katrina will show you the creative possibilities of vintage seaming techniques and design details with stunning inspiration samples. Learn a variety of tailored effects including topstitching, padded and welt seams, piping and double piping, strap seams, lace insertions and more. Design bold garment elements using faux tucks, prairie points and Seminole piecework. Katrina puts it all together in three renditions of a dress pattern to show you how decorative seams can transform simple garments. Important Pattern Information: The sewing pattern on which this class is based — Vogue 1329 — is not included with your purchase and may be out of print — check with online retailers. This class is rich in essential sewing techniques, so if the pattern is out of print, we encourage you to look for an alternative pattern with similar style details. You might also be able to find the original pattern through a private reseller.

Craftsy
Learn time-saving techniques that help you avoid drawn-out hand appliqué processes without sacrificing quality stitching. Beth’s hand appliqué tips help you at every step, from the initial creation and organization of templates to embellishing your quilt motifs with embroidery stitches. She’ll cover the fundamentals of how to appliqué, including the materials necessary to create her exclusive, customizable pattern. Efficiently cut and address the paper templates so you can easily dock and stitch them together later. Glue-baste perfect circles and sharp points in deceptively simple techniques. Choose fabrics with different color values to produce interesting lighting details, and machine-stitch your motif to the background for heirloom-quality results.

YouTube
Explore DMA safety in buffers for Linux kernel device drivers in this conference talk. Delve into findings originating from an I2C subsystem issue that became more widespread, addressing the question of DMA safety for externally allocated message buffers. Evaluate buffer handling in various subsystems, uncovering instances where DMA safety relies on coincidence or assumptions that may not always hold true, especially considering future kernel hardening changes. Discover the challenges of checking DMA buffer capability and learn about current solutions. Gain insights into the importance of this problem for embedded system safety and the need for increased scrutiny. Understand the implications of DMA usage, potential code paths, and unexpected issues across different subsystems, including I2C and SPI. Learn debugging techniques, considerations for DMA buffer subsystem maintainers, and the broader impact on Linux kernel development.

YouTube
Explore the challenges and solutions surrounding buffer allocation contention in Android's core graphics stack during this 15-minute Linux Plumbers Conference talk. Delve into the specific details of how the alloc-mutex became a major source of contention, leading to significant delays and janks in the system. Learn about the strategies and techniques implemented to mitigate these scenarios in binder, improving overall performance and user experience in Android devices.

YouTube
Explore the intricacies of buffer overflow exploitation on the RISC-V architecture in this 36-minute conference talk. Gain an introduction to RISC-V and understand how exploitation techniques differ from Intel and ARM platforms. Learn to overflow buffers, create shellcode in assembly language, and perform ret2libc attacks. Delve into important registers, local variables, and hacking approaches specific to RISC-V. Discover techniques for manipulating buffer sizes, utilizing odd numbers, and leveraging writable stacks. Examine practical examples of overwriting buffers, fixing stacks, and analyzing object dumps. Suitable for those with a basic understanding of assembly and C programming.

YouTube
Explore the efficient handling of sensor data in modern automotive systems for self-driving vehicles in this conference talk. Learn about the basics of dmabuf, dma fence, dma heap, and reserved memory Linux kernel frameworks, and discover how to implement them to address the requirements of heterogeneous data processing pipelines. Gain insights into using dmabuf and reserved memory frameworks for allocating buffers from preferred memory, and understand a proposed solution for sharing buffers between different accelerators to set up a zero-copying data pipeline. Delve into the use of dma fence for synchronization between devices without userspace application intervention, and learn how userspace applications can monitor data execution using dma fence. The talk covers topics such as buffer exporters, driver APIs, DmaHip, CMAHip, buffer arrays, pipeline buffer allocation, and user notifications, providing a comprehensive overview of streamlining sensor data handling in autonomous vehicle systems.

YouTube
Explore a conference talk from XDC 2024 that delves into the challenges and potential solutions for universal buffer allocation in Linux systems. Learn about the current landscape of buffer allocation for media content, including existing APIs and frameworks for image capture, processing, decoding, encoding, rendering, and display. Discover how improvements like DRM dumb buffer API, DMA heaps, GBM, Vulkan buffer management, and Android's gralloc have addressed specific use cases, while understanding why a universal solution for allocating buffers across multiple devices remains elusive. Join Laurent Pinchart in examining the interoperability challenges, existing workarounds, and participate in a discussion about developing a comprehensive solution for the Linux ecosystem.

YouTube
Explore advanced tracing techniques beyond traditional ring-buffer methods in this 38-minute conference talk by Jérémie Galarneau from EfficiOS. Discover two new mechanisms introduced in LTTng: triggers and aggregation maps. Learn how triggers enable rule-based notifications and tracing configuration changes, allowing for continuous monitoring of systems without excessive data collection. Understand the power of aggregation maps in both kernel and user space for efficient statistics extraction. See how these features can be combined with traditional tracing to gain detailed insights into production systems while minimizing data management challenges.