ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

54 results

iter
How HOTP and TOTP work

TOTP and HOTP are algorithms for generating 2-factor authentication codes. Let's take a look at how these work, starting with the ...

4:20
How HOTP and TOTP work

30,043 views

5 years ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

234 views

10 years ago

PaceIT Online
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

9:37
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

188 views

10 years ago

Chrome for Developers
SMS OTP form best practices

SMS OTP is widely used for phone number verification, 2 step verification, account recovery, and payment verification. However ...

8:25
SMS OTP form best practices

34,475 views

5 years ago

PaceIT Online
PACE-IT: Security + 6.2 - Cryptographic Methods (part 1)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

6:28
PACE-IT: Security + 6.2 - Cryptographic Methods (part 1)

234 views

10 years ago

wikipedia tts
ISO/IEC 9797-1 | Wikipedia audio article

SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) ...

11:11
ISO/IEC 9797-1 | Wikipedia audio article

24 views

7 years ago

wikipedia tts
ISO/IEC 9797-1 | Wikipedia audio article

Socrates SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes ...

10:34
ISO/IEC 9797-1 | Wikipedia audio article

11 views

7 years ago

SophosGlobalHub
Sophos Central - Enroll and use authenticators

Sophos Central: Enroll and use authenticators A step-by-step tutorial showing you how to enroll and use authenticators for ...

6:25
Sophos Central - Enroll and use authenticators

11 views

2 months ago

cs615asa
CS615 System Administration, Week 11, Segment 4 - System Security IV: Crypto means Cryptography

In this video, we discuss the three areas cryptography can provide threat mitigations in -- confidentiality, integrity, and authenticity ...

19:31
CS615 System Administration, Week 11, Segment 4 - System Security IV: Crypto means Cryptography

677 views

4 years ago

PaceIT Online
PACE-IT: Security + 5.1 - Summary of Authentication Services

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 5.1 - Summary of Authentication Services

589 views

10 years ago

NSRC Network Startup Resource Center
Campus Network Security: Encryption and Two-Factor Authentication

... to do 2 Factor Authentication. So these include things such as you receive an SMS or text messages with the short term code.

4:23
Campus Network Security: Encryption and Two-Factor Authentication

189 views

4 years ago

Cyber Skills
TWO FACTOR AUTHENTICATION EXPLAINED! 2019

I'm Richard, a CISSP certified information security professional with over 15 years IT experience. This is an overview of two factor ...

12:56
TWO FACTOR AUTHENTICATION EXPLAINED! 2019

157 views

6 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,666 views

9 years ago

PaceIT Online
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 1)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:40
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 1)

428 views

10 years ago

wikipedia tts
NaCl (software) | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NaCl_(software) 00:01:02 1 Basic functions 00:01:13 ...

4:30
NaCl (software) | Wikipedia audio article

37 views

7 years ago

Wisc-Online
SSH - Secure Shell

In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.

5:04
SSH - Secure Shell

35,948 views

9 years ago

wikipedia tts
IEC 62351 | Wikipedia audio article

This is an audio version of the Wikipedia Article: IEC 62351 Listening is a more natural way of learning, when compared to ...

5:05
IEC 62351 | Wikipedia audio article

109 views

7 years ago

Chrome for Developers
Firebase Messaging -- Polycasts #59

Read the Firebase Cloud Messaging documentation: https://goo.gl/h3wBld One of the coolest features to land in Chrome recently ...

15:54
Firebase Messaging -- Polycasts #59

24,478 views

9 years ago

Spoken-Tutorial IIT Bombay
MD5 Encryption - English

MD5 Encryption Calculates the MD5 hash of str using the RSA Data Security, Inc.'s MD5 Message-Digest Algorithm, and returns ...

9:34
MD5 Encryption - English

5,504 views

11 years ago

Jo Van Bulck
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks

In this video we demonstrate VulCAN, a lightweight and efficient framework for implementing industry standard-compliant and ...

4:42
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks

380 views

8 years ago