Channel Avatar

Ron Mattino @UCKuwfgy3HJi2MZ81T8sNELg@youtube.com

44K subscribers - no pronouns :c

This channel is dedicated to electronics, programming and en


06:33
Why does an LED need a RESISTOR? The Simplest Explanation.
06:48
USB over UTP cable: Testing Voltage Drop and Transfer Speed.
30:16
10 Common MYTHS about ELECTRONICS.
32:18
Electronics for BEGINNERS: Switch, Relay, Resistor, Diode, Capacitor, Transformer, Transistor, SCR
13:13
USB connection over an ETHERNET cable? Making your own 7 meters long USB extender cable from scrap.
34:47
Can you build a USB wall charger from scrap? Let's do it!
29:42
Do you know how to FAST CHARGE your phone? Fast charging and how it works.
31:30
How does touchscreen work?
26:38
7 Simple Arduino Projects for Beginners
24:36
How does the Hall Effect Sensor work? Building a Levitron using the Hall Effect Sensor.
31:12
Arduino for BEGINNERS! Set up the BOARD and Write your VERY first sketch in 5 minutes!
36:37
How does USB work?
36:31
How does NE555 work? Bistable, Monostable, Astable, with schematic examples. The COMPLETE Guide.
32:02
How to use a Multimeter? The ULTIMATE Guide you've been looking for!
28:00
How do computers work? CPU, ROM, RAM, address bus, data bus, control bus, address decoding.
29:45
All Electronic Components Explained In a SINGLE VIDEO.
30:31
Mastering SOLDERING. TOP 10 mistakes YOU make as a beginner!
25:00
How to power any LED and NOT turn it to smoke?
10:11
Can a virus set your PC on FIRE?
05:07
SEVEN hidden WINDOWS features that YOU are NOT AWARE of!
10:48
7 MOST Notable Hackers of All time. Kevin Mitnick, Albert Gonzalez, Gary McKinnon, Julian Assange.
09:41
Windows Command Prompt Secrets YOU did NOT know!
11:01
Is your phone being TAPPED? Find out NOW - in 3 simple steps!
08:33
What is a Bruteforce attack? Youtube Workshop.
09:31
ENCRYPTION -- How does it work? Explained in VERY simple terms.
12:27
THIS IS HOW Messenger App in YOUR phone can be easily HACKED. Man-In-The-Middle Attack EXPLAINED.
25:59
Trojans, AutoRun, USB Jackers, DDoS, Worms, Keyloggers, Botnets, Cryptojackers, Ransomware EXPLAINED
14:37
The famous "Wear Sunscreen" Commencement Speech. What's really behind it?
12:45
How to spot a PROFESSIONAL TROLL? Tweaking social media algorithms to manipulate users biases.
17:41
How to keep your CRYPTO safe? Hackers in search of a secret formula.
16:34
How HUMOR ruins your Youtube videos +10 SECRET TIPS from Ron Mattino
06:08
How Safe is Anonymous Browsing?
06:40
How Hackers Easily Gain Access To Sensitive Information : Kevin Mitnick's USB Hack Dongle EXPLAINED
05:59
Why do MOBILE BATTERIES have THREE terminals? A simple Explanation.
08:17
BINARY NUMBER SYSTEM. As simple as... Matches?!
10:31
Easy fix for a broken Magsafe cable.
26:57
Switching from Windows to Linux? All you need to know is in THIS VIDEO.
17:35
How THEY are Watching your MOBILE. Triangulation, Relative Tracking, GPS Tracking, WiFi Tracking.
21:20
Who is Gummo the Black Hat Hacker? Just an Opinion.