- Видео 84
- Просмотров 661 644
NovelTech Media
Добавлен 25 дек 2012
Minimalistic Product Designer - Shopify Tutorial
Enable your Shopify customers to design their own products. The Minimalistic Product Designer allows seamless design customization, turning everyday items into personalized masterpieces effortlessly.
In a world saturated with mass-produced items, give your customers the power to stand out. Embrace individuality and offer a personalized shopping experience that goes beyond expectations.
With a responsive design, Minimalistic Product Designer ensures a seamless experience across devices. Whether on a desktop or a mobile device, your customers can design on the go.
Website: website.minimalistic-product-designer.com
Shopify: apps.shopify.com/minimalistic-product-designer
Email: contact@minimalisti...
In a world saturated with mass-produced items, give your customers the power to stand out. Embrace individuality and offer a personalized shopping experience that goes beyond expectations.
With a responsive design, Minimalistic Product Designer ensures a seamless experience across devices. Whether on a desktop or a mobile device, your customers can design on the go.
Website: website.minimalistic-product-designer.com
Shopify: apps.shopify.com/minimalistic-product-designer
Email: contact@minimalisti...
Просмотров: 286
Видео
Learn Python - In-Depth Tutorial from Beginner to Advanced | Types & Data Types (Part 2)
Просмотров 6732 года назад
Learn python and unleash its power to build anything from web servers to the next machine learning revolution. It is important to know one language well and be able to use across multiple domains. In this series of videos you will get an in-depth understanding of python which you can apply to almost any software problem. CHAPTERS 0:00 Intro 0:40 Built-in Types & Data Types 1:20 Numerics 4:00 It...
Learn Python - In-Depth Tutorial from Beginner to Advanced | Constants & Functions (Part 1)
Просмотров 5732 года назад
Learn python and unleash its power to build anything from web servers to the next machine learning revolution. It is important to know one language well and be able to use across multiple domains. In this series of videos you will get an in-depth understanding of python which you can apply to almost any software problem. CHAPTERS 0:00 Intro 6:13 Built-in Constants & Functions 6:24 Print Functio...
How GPT 3 Works - Explanation and Review
Просмотров 1,1 тыс.2 года назад
In this video we will take a deeper look into GPT-3, we will look at the research paper and do a demonstration using the Open AI Playground. We will compare how it performs on different tasks and what accuracy is achieved. This is the largest model ever created with 175 Billion parameters. If you want to learn more about Python, code awesome projects, learn more about data and algorithms check ...
Handwritten Digits Recognition - Classification in Machine Learning
Просмотров 7622 года назад
In this video we will create a handwritten digits recognition machine learning model using sklearn, numpy, jupyter while using a Suport Vector Machine. You will learn the basics from analyzing, transforming the data and building out a machine learning model. If you want to learn more about Python, code awesome projects, learn more about data and algorithms check out noveltechmedia.com NovelTech...
Nmap Tutorial | Network Scanning | Find Devices & Vulnerabilities on a Network
Просмотров 7302 года назад
In this Nmap tutorial you will learn to scan a network and search for devices and services on that network. We will use Syn, Tcp, Udp scanning to find all devices, their ports, services and version on the network. We will touch the basic concepts of nmap and go through all the different parameters and scans you can perform using this tool. We will also use Wireshark to monitor the traffic. If y...
Learn Hacking - Hack Into Computers With Metasploit
Просмотров 1,4 тыс.2 года назад
In this video we will setup a simple hacking attack using metasploit. We will search for common vulnerabilities using nmap and use that information to gain access of our target system. Metasploit is the perfect tool to do this in a quite simple way. For our base system we will be using Kali Linux. The target system will be a Metasploitable VM. If you want to learn more about Python, code awesom...
Bash Shell Scripting Advanced Tutorial - Top 10 Bash Commands
Просмотров 2,6 тыс.2 года назад
In this video you will learn Advanced Bash Commands. This video will cover the most popular and useful bash commands to manipulate files and automate tasks. We will go over commands like sed, pipes, grap, awk, echo, cat and regex expressions By watching this video you should gain basic knowledge over Bash, you should be able to navigate around directories, manipulate files, search for content a...
Sell your own API on a Marketplace
Просмотров 1 тыс.2 года назад
This video will explains how to host and sell your own APIs using Rapid API and AWS. We will create a simple Nodejs Express API and fetch data from Coinmarketcap to display the current price for any cryptocurrency. You will learn how to setup and proxy your Rapid Api requests to your own server. After this video you will have the basic knowledge to start selling your own APIs. Github: github.co...
Web Scraping Tutorial with ScraperApi and Nodejs
Просмотров 1,8 тыс.3 года назад
In this tutorial we will use scraperapi in order to avoid the most common problems when scraping websites like captcha, changing ips, getting kicked out, sessions and much more. We will also use curl and libraries to simply achieve this by using the scraperapi proxy. If you want to learn more about web scrapping take a look at the videos below: 🚨 ScraperApi Link: www.scraperapi.com?fpr=noveltec...
Wireshark Tutorial - Packet Analysis (TCP, HTTP, TLS)
Просмотров 11 тыс.3 года назад
In this tutorial you will learn the basics from wireshark. Wireshark is a packet analysis tool to help you understand your internet flow. You can track receiving and outgoing packets and analyze them. In this tutorial we will learn about tcp, http, tls and the osi model in order to make sense of the wireshark packets. If you want to learn more about Python, code awesome projects, learn more abo...
Build a 3D Game in Javascript
Просмотров 21 тыс.3 года назад
In this tutorial I will try to create a 3d game in javascript starting from scratch. We will cover all the basics around developing a game. Creating the animations, environment, assets, physics engine, obstacle detection system and randomizing the output. All this can be created using just javascript and a few basic libraries like tree.js. If you want to learn more about Python, code awesome pr...
OAuth 2.0 Explained - Authentication Example using OpenID, JWT and Opaque Tokens
Просмотров 24 тыс.3 года назад
In this video I will explain how OAuth works by going over the entire authentication flow and explaining everything from scopes, open id, jwt and opaque tokens. We will go over an example and take a look how an application would receive an access token from the google authorization server. We will also look into the difference between authorization code and authorization code with pkce. If you ...
How to add Google Login (OAuth Credentials) to your website
Просмотров 87 тыс.3 года назад
In this video I will implement google authentication in a nodejs website. For that we will be using oauth 2.0 and the passport library to implement federated authentication with google. We will create oauth credentials and use those in our nodejs application to enable signing in over google to any website. You could use this to for example enable google login to your react website. If you want ...
How to Hack Devices Using Phishing Links - Windows Exploit (Ethical Hacking)
Просмотров 16 тыс.3 года назад
In this video I will explain in detail how phishing attacks work, how to generate a phishing link and exploit a windows server. We will create a C2 Server and a Windows VM, try to inject an exploit into the windows machine and gain access over the Windows WM. You will learn the basics about Metasploit and IT Security. Learn Ethical Hacking. If you want to learn more about Python, code awesome p...
How to Query the Ethereum Blockchain (like Etherscan) using Web3
Просмотров 22 тыс.3 года назад
How to Query the Ethereum Blockchain (like Etherscan) using Web3
Create Your Own Cryptocurrency with Ethereum ERC20 and Solidity
Просмотров 1,5 тыс.3 года назад
Create Your Own Cryptocurrency with Ethereum ERC20 and Solidity
AWS S3 CloudFront Route53 Web Hosting with HTTPS Tutorial
Просмотров 6793 года назад
AWS S3 CloudFront Route53 Web Hosting with HTTPS Tutorial
WebSockets Tutotrial with Socket Io and Javascript
Просмотров 1883 года назад
WebSockets Tutotrial with Socket Io and Javascript
CI CD Pipeline using AWS and Circle CI 3.0 - Build Test Deploy
Просмотров 11 тыс.3 года назад
CI CD Pipeline using AWS and Circle CI 3.0 - Build Test Deploy
Upload Image to Express API - Image Uploader with Node and S3
Просмотров 5 тыс.3 года назад
Upload Image to Express API - Image Uploader with Node and S3
Face Detection in Python | Image 2 Emoji
Просмотров 4,9 тыс.3 года назад
Face Detection in Python | Image 2 Emoji
Learn Git and Github in 10 Minutes - Using Git Bash
Просмотров 4943 года назад
Learn Git and Github in 10 Minutes - Using Git Bash
Build a Web Scraper for Instagram with Python and Selenium
Просмотров 1,7 тыс.3 года назад
Build a Web Scraper for Instagram with Python and Selenium
Build a Machine Learning Algorithm that Writes Articles
Просмотров 7013 года назад
Build a Machine Learning Algorithm that Writes Articles
GPT-3 Review in 2021 - Hype or Revolution?
Просмотров 8923 года назад
GPT-3 Review in 2021 - Hype or Revolution?
Deep Learning (CNN) - Image Classification Example
Просмотров 1673 года назад
Deep Learning (CNN) - Image Classification Example
After giving ghost install command,it is showing installing dependencies 4/5.Thjs is showing from last 1hour sir. How to resolve this
Wolf: Coding language. Rabbit: Me
music.
i wonder why there is no convenient gui that just lets you choose a text file and it finetunes a llm. how come such things dont exist anymore?
if im following what the intent was, it was to move all from a to c, but in your code explanation your final state is they all moved to point b
I don't think i can keep up with the process
Very useful not overly simplified.
holy yappatron of yappington, it took u so long to get to the point, stop stalling
Tutors be like .. "lemme explain the concept before we do practicals" Meanwhile.. Learners.. "Get straight to the f**ing point .😅 💀💀
@@Halagamerz723 Fr!! 😭🙏
Can u help us with a tutorial to add login to your blogger website
please help I have an error like below: /opt/circleci/.rvm/scripts/extras/bash_zsh_support/chpwd/function.sh: line 5: cd: ./app: No such file or directory Exited with code exit status 1
Dope!! Are there any proxies you recommend for this task? I came across Proxy-Store on Google, they offer proxies for scraping, any feedback on their effectiveness?
Hey thanks for this, just started watching, I wanted to ask how can I add slowmotion feature in this?
What's a O auth it's zero auth
It's not zero auth it's Oauth
github?
this is for node & passport
Im glad I found this video, I had a hard time grasping into the information, but watching this over and over just helps understanding it a little bit more every time. Thank you!
As a frontend developer, I don't understand well about id and secret keys. If you provide your Google (google_id and secret keys) in your .env.local, how does it work when I'm signing in to this app in my browser? The (google_id and secret) be updated to my Google credentials? Not providing the credentials, could we sign in to the app?
can you please keep same topic in react
😘 "promo sm"
I have already verified my search console site now how find this code
this is authorization. false advertising.
Yes and no. OAuth 2.0 is indeed authorization, but the mentioned ID token is not part of it but comes from OIDC which is authentication (and authorization as it's based on OAuth 2.0). So it's not wrong in comparison to your false advertising claim.
Running your own Ethereum node is a solid step toward deep blockchain understanding. Like how Etherscan queries the chain, you're tapping into the same power but with personal control. SubQuery's tools could be a great addition here, offering efficient data indexing that could streamline the process of interacting with your node. It's about empowering developers to harness data more effectively, making the blockchain not just a ledger but a rich source of insights IMO!
Thank you very much for this video. In what case do you think resource server will use both of the ID token and access token. If resource server can confirm the authorization of the access to resource based on the access token, why it would use ID token?
it's possible to bring google oauth - in "google site" constructor?
awesome! thank you
U should not be allowed to teach, you cannot speak english. it is very bad. you have no concept of logic like the ancient greeks and romans
while using this code im getting this error TypeError: Conv2D.__init__() missing 1 required positional argument: 'kernel_size'
Good content, poor teaching
PLESAE help! I have copied EVERYTHING exactly from the github, but i get this: `Cannot GET /auth/google`
Source code?
Excellent! Thank you so much for your super-informative content! You are a beacon of light in a sea of confusion. Your ability to simplify things and communicate the important aspects of the BASH scripting language is a gift. Please continue creating content. I have liked and subscribed. because I see that you really know your $h!t and, moreover, you are willing to share it with the rest of the world ... which leaves an indelible mark of positivity and goodness.
Sir plssssssssssssssssss provide the github link of this code😭😭😭
code not working
You dont need public key to access the payload of the JWT
you need public key if JWT can be decoded by your resource servers
4mn:58s ruclips.net/video/T-vmSyqN8IQ/видео.html we will provide : Authorization Code + CLIENT_ID + CLIENT_SECRET and not Access token + CLIENT_ID + CLIENT_SECRET. At this step we have not received the access token yet.
Let me know if anyone is stuck was able to get the code to work with few changes.
Everytime I try to create a project it's asking me for an organization like I can create an organization but it would be so much easier if I did not need to. Is that possible or do I need to create an organization?
@@ulfinawakjira1977 which part is it asking that ?
all i need is example code for after the person is loged in successfully ..i need to retrieve their email address...
@@MickeyMousePark been a long time but I can share the code I have
i recently got into all this web3 stuff and i've been enjoying the learning process. What would be a solid starting point to learn more about web3 tho? Is it going through the web3 library and read about everything? Obviously learning more about the blockchain itself will be helpful as well.. Nice vid tho!
This is working! Thank you. Question, I get an array of links to pdf files, but I’m not able to get this to download because it requires a token variable. Do you have any clues that could point me in the right direction?
Subscribed btw, you’ve been way ahead of your time, especially with the GPT stuff.
Very useful, thank you! Straight to the point.
No this time.
What if I have Cusotm DNS from Wix already placed? when I click on Host to change DNS it send me to CUstom DNS
Please what’s the password you used for the authentication at 1:05:50
The presentation is poor.
not working as expected
is useful guys !!!! don’t waste your time with this sh'it
lspci | grep VGA is a good command that uses the pipe with lspci and grep in linux to tell you the graphics info on board. Thanks I enjoyed the tutorial!
are u from indea ? plz be real
@@r0o0di. because he helped me well🤙🏻
no he is not
Hi There! Thanks for this informative video! 👍 I need to know this for my upcoming CompTIA A+ Certification exam.
Excellent Video. Thanks !!
where I can get traning.txt ?