[ Videos ]

Video hub — watch → notes → code

SentinelEdge: Advanced eBPF Kernel Security & Systems Architecture

SentinelEdge: Advanced eBPF Kernel Security & Systems Architecture

Project overview of SentinelEdge — a professional-grade eBPF kernel security framework showcasing modern Linux kernel programming, deep system tracing, and production-style observability.

August 4, 2025
eBPF Kernel Security Linux Kernel SentinelEdge Observability Systems
Watch Video
Cache Miss, TLB Miss & False Sharing — The Performance Killers in 3 Minutes

Cache Miss, TLB Miss & False Sharing — The Performance Killers in 3 Minutes

Three invisible bottlenecks that silently destroy program performance — cache miss, TLB miss, false sharing — demonstrated with real C code and CPU counter data.

August 3, 2025
Performance CPU Cache TLB False Sharing C CoreTracer Profiling
Watch Video
Store→Load Reordering: x86 vs ARM64 Real-World Test

Store→Load Reordering: x86 vs ARM64 Real-World Test

What really happens when CPUs reorder your instructions. Side-by-side experiment putting store→load reordering to the test on x86-64 and ARM64.

August 3, 2025
Memory Model x86 ARM64 Concurrency CPU Memory Fences Lock-Free
Watch Video
Debugging Real-Mode Bootloader in GDB (CS Changed, Symbols Broken)

Debugging Real-Mode Bootloader in GDB (CS Changed, Symbols Broken)

How to debug a hand-written x86 assembly bootloader with GDB symbols — even across far jumps and segment changes. The trick most tutorials skip.

August 2, 2025
Bootloader Real Mode GDB x86 Assembly Segment Registers Debugging
Watch Video
Debugging Ubuntu 6.8 x86_64 Kernel with GDB & QEMU — Disable KASLR Without Rebuild

Debugging Ubuntu 6.8 x86_64 Kernel with GDB & QEMU — Disable KASLR Without Rebuild

Build and debug the Ubuntu 6.8 x86_64 kernel from source with debug symbols, then attach GDB via QEMU. Includes the trick for disabling KASLR without rebuilding.

August 2, 2025
Linux Kernel Ubuntu x86_64 GDB QEMU KASLR Debugging
Watch Video
How x86 Jumps REALLY Work: EFLAGS Truth with GDB + pwndbg

How x86 Jumps REALLY Work: EFLAGS Truth with GDB + pwndbg

All x86 conditional jumps (ja, jb, je, etc.) are triggered by EFLAGS — not by syntax or code order. Hands-on with GDB and pwndbg to see exactly which flag fires each branch.

July 11, 2025
x86 Assembly GDB pwndbg Reverse Engineering Malware Analysis EFLAGS
Watch Video
How to Build a Bootloader from Scratch — Just Assembly, No OS

How to Build a Bootloader from Scratch — Just Assembly, No OS

Hand-written Stage-1 bootloader in raw x86 assembly. No GRUB, no operating system, no standard library. Boots directly from BIOS.

June 18, 2025
Bootloader Assembly x86 BIOS Low-level NanoBoot
Watch Video
HarrisonSec Lab Tour | A Journey Through Computing Evolution

HarrisonSec Lab Tour | A Journey Through Computing Evolution

Join me on a tour of my security lab, where I explore the evolution of operating systems from FreeDOS to modern AI-driven security research.

May 17, 2025
Security Lab Operating Systems Windows History Security Research
Watch Video
Complete Secure Company Network Design

Complete Secure Company Network Design

A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration

May 12, 2025
Network Security VLAN Segmentation Firewall Configuration DMZ Enterprise Architecture
Watch Video
Buffer Overflow Attack Explained

Buffer Overflow Attack Explained

This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners

May 10, 2025
Buffer Overflow Memory Security Exploit Linux Security
Watch Video