Why did you lose the last PS5 restock to a bot?
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
Contributors | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/62270 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Denial-of-service attackModule (mathematics)Physical systemForcing (mathematics)Multiplication signIdentity managementCASE <Informatik>Open setData conversionConnectivity (graph theory)Hacker (term)1 (number)Arithmetic meanProfil (magazine)Task (computing)Slide ruleDigital photographyTotal S.A.Computing platformDistribution (mathematics)Parameter (computer programming)Web 2.0RobotComputer architectureClient (computing)Characteristic polynomialCybersexInformation securityInternetworkingCartesian coordinate systemPoint (geometry)Decision tree learningMalwareOperator (mathematics)Service (economics)Scheduling (computing)Software crackingInteractive televisionMereologyStatement (computer science)View (database)Hydraulic jumpGame theoryInformationBitLatent heatConcurrency (computer science)Deep WebGraphics processing unitPasswordProduct (business)Video game consoleReal numberProxy serverPerspective (visual)AutomationDisk read-and-write headBookmark (World Wide Web)10 (number)SoftwareForm (programming)PerimeterLoginMaxima and minimaDifferent (Kate Ryan album)Scaling (geometry)Avatar (2009 film)Computer simulationComputer animation
08:59
ArchitectureHacker (term)Configuration spaceComputer wormNetwork topologyAreaPlanningGame theoryoutputGamma functionEmailTwin primePasswordMotion captureDifferent (Kate Ryan album)PlastikkarteComputer wormDependent and independent variablesCodecWebsiteMereologyLoginTable (information)Computer programmingChecklistScripting languageService (economics)EmailConfiguration spaceGreatest elementLatent heatInternet forumHacker (term)PasswordSoftware testingWeb 2.0Process (computing)VirtualizationType theoryEnumerated typeHTTP cookieServer (computing)Slide ruleValidity (statistics)Open setConnectivity (graph theory)DatabaseTouch typingLogicOpen sourceSet (mathematics)Shape (magazine)Combinational logicPreconditionerINTEGRALCybersexBitOrder (biology)StatisticsVariable (mathematics)PredictabilityKey (cryptography)Compilation albumAddress spaceElectronic mailing listSoftware developerNumberPattern languageComputer architectureInformation securityProxy serverLink (knot theory)Stack (abstract data type)Form (programming)Flow separationForcing (mathematics)Right angleSign (mathematics)Task (computing)Differential (mechanical device)FreewareRow (database)Exploit (computer security)Computer animation
17:59
PasswordEnumerated typeDataflowProxy serverComputer networkCAPTCHAComputer iconImage resolutionBlock (periodic table)FreewareOperator (mathematics)Phase transitionMultiplication signInformation securityWebsiteBusiness modelOpen sourcePoint (geometry)Software crackingLastteilungInternet forumMoment (mathematics)Proxy serverSoftwareLatent heatFactory (trading post)Real numberHacker (term)CybersexRegulator geneThresholding (image processing)Social engineering (security)MeasurementPasswordBridging (networking)DivisorEmailRandomization1 (number)Perspective (visual)Bit rateRepository (publishing)Order (biology)Enumerated typeSet (mathematics)Group actionType theoryProduct (business)WeightStandard deviationDifferent (Kate Ryan album)HypermediaAuditory maskingServer (computing)RobotLoginElectric generatorGreatest elementOpen setCycle (graph theory)Motion captureOperator (mathematics)Service (economics)Table (information)FacebookElectronic mailing listPredictabilityPay televisionWell-formed formulaMereologyCombinational logicState of matterForm (programming)DigitizingValidity (statistics)Core dumpInheritance (object-oriented programming)IP addressVideo game consoleCodeComputer animation
26:58
Operator (mathematics)Keilförmige AnordnungServer (computing)Multiplication signExecution unitHoaxDifferent (Kate Ryan album)Server (computing)Polar coordinate systemProduct (business)Proxy serverRobotCommunications protocolRemote procedure callEmulatorAddress spaceMobile WebKnowledge baseWeb crawlerWebsiteService (economics)Endliche ModelltheorieVideo game consoleConnectivity (graph theory)SummierbarkeitConfiguration spaceKeyboard shortcutFunctional (mathematics)Game controllerGroup actionLatent heatConnected spaceGame theoryIP addressShared memoryOpen setPolygon meshTask (computing)ExistenceOrder (biology)Software crackingDivisorFingerprintTwitterSlide ruleEmailMereologyThresholding (image processing)Data managementSinc functionFocus (optics)Goodness of fitHacker (term)Flow separationTouchscreenPlastikkarteOperator (mathematics)Ferry CorstenPeer-to-peerOnlinecommunity
35:58
EmulatorInterior (topology)EmailCodeSoftware testingDifferent (Kate Ryan album)Multiplication signFigurate numberInformation securityLevel (video gaming)Order (biology)Software testingBridging (networking)CodeProduct (business)FrequencyAuthenticationVideo gameService (economics)In-System-ProgrammierungEmailClient (computing)RobotConfiguration spaceWebsiteWater vaporOperator (mathematics)Message passingSoftware developerMaxima and minimaHacker (term)Proxy serverSinc functionKey (cryptography)Internet forumChainPhase transitionSpacetimeCASE <Informatik>Formal languageDenial-of-service attackHypermediaWordData conversionRight angleExistenceOpen setDivisorType theoryDistribution (mathematics)Computer wormPasswordReverse engineeringComputer architectureSoftware crackingElectric generatorConsistencyEnumerated typeDifferential (mechanical device)ParadoxCodecSet (mathematics)Form (programming)Game controllerLogic
Transcript: Englisch(auto-generated)