Latest Videos
Resultant and Components (Part 1) Analytic Mechanics (Statics) [Bangla]
Psi Squared
1.1K views·6 years ago
VirtualBox Shared Folder Settings & File Transfer [English Subtitles]
Psi Squared
257 views·6 years ago
01. Introduction To Cross Site Request Forgery (CSRF) Attack [Bangla]
Psi Squared
4.2K views·6 years ago
05. Add Friend Vulnerability Exploited By Stored XSS Attack [Bangla]
Psi Squared
2.2K views·6 years ago
06. Edit Profile Vulnerability Exploited By Stored XSS Attack [Bangla]
Psi Squared
1.6K views·6 years ago
02. Non Persistent (Reflective) Cross Site Scripting (XSS) Attack [Bangla]
Psi Squared
4.5K views·6 years ago
Introduction to Planar graph Non planarity of K5 and K3,3 graph [Bangla]
Psi Squared
2.4K views·6 years ago
![SEEDLabs Ubuntu 16.04 Installation on VirtualBox [Bangla]](https://i.ytimg.com/vi/bOc_OHVNonQ/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCqesFLs9MmDiC3h5v4b4AGuEnAeg)
![How to get 330+ in the GRE GRE Exam Preparation and Tips [Bangla]](https://i.ytimg.com/vi/S2isGXM8s8g/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLB8E_vwys42K0UYkMd_ydgPZkrgPQ)
![Resultant and Components (Part 1) Analytic Mechanics (Statics) [Bangla]](https://i.ytimg.com/vi/IKV4ibovJZc/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDzdeyHrqXy1Hr1AsbR8GkLN0Y0XQ)
![Midpoint Algorithm for Lines Scan converting Lines [Bangla]](https://i.ytimg.com/vi/3PprlEJjSsg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBkFfGRgqjKSWn6Wv-m5kvWk9XLTw)
![Pseudo-code of Midpoint Algorithm Scan Converting Lines [Bangla]](https://i.ytimg.com/vi/mdta741DTns/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAosjl6i9Jopr_j-FGCXpeMRqworg)
![Rasterization Introduction Scan Converting lines Incremental Algorithm [Bangla]](https://i.ytimg.com/vi/2TMlfnMmwog/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCpNfnzIrfTeasEIukNB1jFIZgcWw)
![Line-Line Intersection point finding in 3D [Bangla]](https://i.ytimg.com/vi/DXNQTRXMHQM/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA9rgQvv68F0hS7pY2ZIE1r5Wh1bg)
![Plane-Plane Intersection in 3D [Bangla]](https://i.ytimg.com/vi/zZx1a8VPGhw/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAfkjGJwr2SPN2nYTAHW0EjtIcbQg)
![VirtualBox Shared Folder Settings & File Transfer [English Subtitles]](https://i.ytimg.com/vi/8zj4LZfL91g/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCUptrHryPtrb--W13AV7D4lcG8QQ)
![04. Edit Profile Vulnerability Exploited By CSRF Attack [Bangla]](https://i.ytimg.com/vi/OOKWXNS1uxw/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLByat6VPZ4fgnprxiGyq_gux9C5Og)
![03. Add Friend Vulnerability Exploited By CSRF [Bangla]](https://i.ytimg.com/vi/R62XGd3Yw_w/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA2-GBlKjjn3vQTrmTJ4PotIeSbfA)
![02. Basic Ideas Behind CSRF Attack [Bangla]](https://i.ytimg.com/vi/hogfXVIZVck/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA7NjDUnbQg75geSQz0deG6LPcIIQ)
![01. Introduction To Cross Site Request Forgery (CSRF) Attack [Bangla]](https://i.ytimg.com/vi/POWDzpKJvFE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLANSOxHKEDMuR-sLJCBjfJ7Wdyolw)
![05. Add Friend Vulnerability Exploited By Stored XSS Attack [Bangla]](https://i.ytimg.com/vi/gYdhdK67TFg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBWlx2OJ_AUvoaTfB7D3wM42GKKKw)
![06. Edit Profile Vulnerability Exploited By Stored XSS Attack [Bangla]](https://i.ytimg.com/vi/kLkilRwNT3o/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDr92QaL323-nWO-ofnASb-JO6QYQ)
![01. Introduction To Cross Site Scripting (XSS) Attack [Bangla]](https://i.ytimg.com/vi/aSN5hQyLEek/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDjy0zqNIx2v--UgKVtP3F_0lt-lg)
![02. Non Persistent (Reflective) Cross Site Scripting (XSS) Attack [Bangla]](https://i.ytimg.com/vi/TIIaua-TFYg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAi60BjybQoW48Nz3UH6U2VlN8dEA)
![03. Persistent (Stored) Cross Site Scripting (XSS) Attack [Bangla]](https://i.ytimg.com/vi/V5ZLJfjiLsg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAT37cSXVW-4FzscC69cUW7QoTCZQ)
![04. Stored Cross Site Scripting (XSS) Cookie Stealing [Bangla]](https://i.ytimg.com/vi/y4AFGJG5qDI/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAjvH3UFl9JMWaUsPe80z9tyQa3kQ)
![Planar graph coloring Map coloring Graph Theory [Bangla]](https://i.ytimg.com/vi/MAN3b8seW1c/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAIS1mLVeNyx1Y4T6CAZ2FO7YhODw)
![Maximal Planar Graph Graph Theory [Bangla]](https://i.ytimg.com/vi/EB1NhyWOLFE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAEvrh3yKYwYZC960xj-fa98jUM3Q)
![Introduction to Planar graph Non planarity of K5 and K3,3 graph [Bangla]](https://i.ytimg.com/vi/JBwy_IyozSk/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAvFDh8bRvhuxvE32t309GilRnBHQ)
![Overlap Graph In Genome Assembly Bioinformatics [ Bangla ]](https://i.ytimg.com/vi/XlTe9s8GoVk/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA2BWDJ4VJQ5nmhBbieE-EE6qASuw)
![De Bruijn Graph In Genome Assembly Bioinformatics [ Bangla ]](https://i.ytimg.com/vi/mDc0gVl183Q/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCbg-0jldO5nSIp9p0YjaaDwho4oQ)
![05. Pattern Matching using BWT (Burrows-Wheeler Transformation) String algorithm [ Bangla ]](https://i.ytimg.com/vi/ozqfODT6Qb4/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDhAhIrQ3P3-wvnhMdGlPwN9Slq1Q)
![03. Trie + Suffix Tree data structure String algorithm in bioinformatics [ Bangla ]](https://i.ytimg.com/vi/soOVerIxv_c/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBhb-w_DnGfSItbzebfmnaRbCfafA)
![04. Application of Suffix Array and BWT (Burrows-Wheeler Transformation) in read-mapping [ Bangla ]](https://i.ytimg.com/vi/hyUxejWvZ0I/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBhj3lShASUx0P-L5eNbxHDE-1xCA)
![SCS (Shortest Common Superstring) in bioinformatics with greedy approach [ Bangla ]](https://i.ytimg.com/vi/WimqT6Zgq2Y/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDlYutho1DGHb2lwNRola6jnVAAfw)
![Introduction to Genome Assembly [ Bangla ]](https://i.ytimg.com/vi/ukdig-2Y9zQ/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLB7TZDcldlA2r0-IljnN2zA1WRsyA)
![02. KMP (Knuth-Morris-Pratt) algorithm Issues of KMP in multiple read mapping [ Bangla ]](https://i.ytimg.com/vi/vLr72Q6Gc14/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAUEajmbiPy__IUk74B6wMhV4JBZQ)