Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
53 results
TOTP and HOTP are algorithms for generating 2-factor authentication codes. Let's take a look at how these work, starting with the ...
30,037 views
5 years ago
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...
188 views
10 years ago
234 views
SMS OTP is widely used for phone number verification, 2 step verification, account recovery, and payment verification. However ...
34,473 views
SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) ...
24 views
7 years ago
Socrates SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes ...
11 views
Sophos Central: Enroll and use authenticators A step-by-step tutorial showing you how to enroll and use authenticators for ...
2 months ago
In this video, we discuss the three areas cryptography can provide threat mitigations in -- confidentiality, integrity, and authenticity ...
677 views
4 years ago
589 views
Learn what the CRC is, the technology behind it, and how it's performed.
145,644 views
9 years ago
... to do 2 Factor Authentication. So these include things such as you receive an SMS or text messages with the short term code.
189 views
I'm Richard, a CISSP certified information security professional with over 15 years IT experience. This is an overview of two factor ...
157 views
6 years ago
428 views
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NaCl_(software) 00:01:02 1 Basic functions 00:01:13 ...
37 views
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
35,948 views
Read the Firebase Cloud Messaging documentation: https://goo.gl/h3wBld One of the coolest features to land in Chrome recently ...
24,478 views
This is an audio version of the Wikipedia Article: IEC 62351 Listening is a more natural way of learning, when compared to ...
108 views
MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...
5,504 views
11 years ago
In this video we demonstrate VulCAN, a lightweight and efficient framework for implementing industry standard-compliant and ...
380 views
8 years ago