In computer programming, Base64 is a group of binary-to-text encoding schemes that represent binary data (more specifically, a sequence of 8-bit bytes) in sequences of 24 bits that can be represented by four 6-bit Base64 digits. Common to all binary-to-text encoding schemes, Base64 is designed to carry data stored in binary formats across channels that only reliably support text content. Base64 is particularly prevalent on the World Wide Web where one of its uses is the ability to embed image files or other binary assets inside textual assets such as HTML and CSS files. Base64 is also widely used for sending e-mail attachments. This is required because SMTP – in its original form – was designed to transport 7-bit ASCII characters only. This encoding causes an overhead of 33–37% (33% by the encoding itself; up to 4% more by the inserted line breaks). (Wikipedia).
1,010,010,101,000,011 - #MegaFavNumbers
This is my submission to the #megafavnumbers project. My number is 1010010101000011, which is prime in bases 2, 3, 4, 5, 6 and 10. I've open-sourced my code: https://bitbucket.org/Bip901/multibase-primes Clarification: by "ignoring 1" I mean ignoring base 1, since this number cannot be fo
From playlist MegaFavNumbers
IMT3673 - Mobile Programming (Deployment) - Part 1
Deployment
From playlist Archive - Mobile Development
IMT3673 - Mobile Programming (Deployment) - Part 2
Deployment
From playlist Archive - Mobile Development
Railroad Maintenance (Part 12/14) Inserting the baseplate
train
From playlist Railroad Track Maintanance
MegaFavNumbers - A number with 19729 digits
This video is about my MegaFavNumber. It has 19729 digits, and it is a power of two. [This link is now broken, and I can't find it anywhere else. :( ] See all the digits here: https://sites.google.com/site/largenumbers/home/appendix/a/numbers/265536 The OEIS sequence I mentioned: https:/
From playlist MegaFavNumbers
Convert Numbers in Base Ten to Different Bases: Remainder Method
This lessons explains how to write numbers in base ten as numbers in different bases. Site: http://mathispower4u.com
From playlist Historical Counting Systems
Using CyberChef To Automatically Extract Shellcode from PowerShell Loader [Twitch Clip]
How to automatically extract the shell code from a multi-stage PowerShell loader (Cobalt Strike) using CyberChef! See the full stream, including our analysis of the shell code... https://www.patreon.com/posts/live-stream-vod-75195977 ----- OALABS PATREON https://www.patreon.com/oalabs O
From playlist Open Analysis Live!
Binary 4 – Floating Point Binary Fractions 1
This is the fourth in a series of videos about the binary number system which is fundamental to the operation of a digital electronic computer. In particular, this video covers the representation of real numbers using floating point binary notation. It begins with a description of standard
From playlist Binary
You can choose a complex number as a base, and the results can be beautiful! [1] William J. Gilbert. Arithmetic in complex bases. Mathematics Magazine, 57(2), 1984. [2] T. Jamil. The complex binary number system. IEEE Potentials, 20(5), 2002. [3] Donald E. Knuth. The Art of Computer Pr
From playlist Summer of Math Exposition Youtube Videos
Rails Conf 2013 Pry-- The Good Parts! by Conrad Irwin
Pry is the featureful development console for Ruby. From its humble roots as an irb replacement, Pry has grown into an indispensable tool for any Ruby or Rails programmer. Using some real-life examples, I'll explain how to use Pry effectively. We'll start from the beginning, with simple fe
From playlist Rails Conf 2013
Shell Scripting - Password Generator
Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr
From playlist Shell Scripting
2.6 Saving Images and Base64 Encoding - Working with Data and APIs in JavaScript
💻https://github.com/CodingTrain/Intro-to-Data-APIs-JS Let's add an image from the webcam to our database. For this project, we will be using the p5.js JavaScript library! 🎥 NEXT LESSON: https://youtu.be/1mnpn6q25FI 🎥 PREVIOUS LESSON: https://youtu.be/q-lUgFxwjEM 🎥 FULL COURSE: https://w
From playlist Working with Data and APIs in JavaScript
0030 - C++ programming: Developing a Web Server from scratch
This is #30 in my series of live (Twitch) coding streams, working on writing my own web server and service framework in C++. This stream I almost finished up WebSockets. It took a bit more time than I expected. I brought in some libraries I needed: SHA-1 hash algorithm, Base64 encoder,
From playlist Excalibur
PowerShell+ 2019 - "Piping" data between packaged scripts by Paul DeArment Jr
The idea for this talk came when working on a project for a previous employer. Working on multiple domains, different executables needed to be run for different domains due to requirements by the security team. I was having trouble passing data between the exe's due to being unable to dire
From playlist PowerShell + DevOps Global Summit 2019
RubyConf 2019 - How to Become an Encoding Champion by Deedee Lavinder
RubyConf 2019 - How to Become an Encoding Champion by Deedee Lavinder encoding's Character encoding happens every time we interact with a computer or any digital device. There is no such thing as plain text. Understanding how encoding works, how Ruby handles encoding issues, and how
From playlist RubyConf 2019
FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root
Welcome to the OSCP prep series, where we will be solving various CTF boxes on HTB and VulnHub. In this video, we will be pwning FristiLeaks1.3. Write-up: https://hsploit.com/frisitleaks1-3-vulnhub-wlakthrough/ Kioptrix on VulnHub: https://www.vulnhub.com/entry/fristileaks-13,133/ ◼️Get
From playlist Linux Exploitation
0108 [ C++/React/Python ] server/client authentication
This is #108 in my series of live (Twitch) coding streams. This stream I implemented a basic public-key authentication mechanism so that administrators are required to authenticate by providing a valid signature to a randomly-generated challenge string. https://tinyurl.com/y9az4ufb -
From playlist Excalibur
OverTheWire Bandit Walkthrough - Level 7 - 11
In this video i go through levels 7 - 11 of the OverTheWire Bandit challenge. The levels consist of working with strings, grep and base64 and ROT13 decryption. LINKS USED IN VIDEO: OverTheWire: https://overthewire.org 📈 SUPPORT US: Patreon: https://www.patreon.com/hackersploit Merchandis
From playlist Linux
MegaFavNumbers: Plus One Primes, 154,641,337, and 62,784,382,823
My entry in the #MegaFavNumbers series looks at a particularly striking example of a very specific family of primes -- and how it connects to what digits can be the final digit of primes in different bases.
From playlist MegaFavNumbers