ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

265 results

Lexorithm
Message Authentication Codes (MACs) Explained | Integrity + Authentication

A hash function can detect changes in data, but it cannot prove who sent the message. This is where Message Authentication ...

6:38
Message Authentication Codes (MACs) Explained | Integrity + Authentication

2 views

1 month ago

David Moreen
The First Time I Learned How Password Authentication Worked (With Code Walkthrough)

Content for The Next Generation Of Cracked Engineers - https://davidmoreen.com.

11:16
The First Time I Learned How Password Authentication Worked (With Code Walkthrough)

0 views

6 days ago

TechSimplified
Message Authentication Code (MAC) Explained | Working, Attacks & Applications

In this detailed lecture, we explain the complete concept of Message Authentication Code (MAC) in a simple and structured ...

14:27
Message Authentication Code (MAC) Explained | Working, Attacks & Applications

139 views

2 weeks ago

Attack Surface
Hacking a Power Plant - Cached Credentials

In part 3 of our simulated penetration test we utilize Homer's access to his computer to hunt for cached credentials. We extract an ...

10:41
Hacking a Power Plant - Cached Credentials

27 views

13 days ago

Lexorithm
5G-AKA Explained – 5G Authentication Protocol Deep Dive

In this video, we explore the 5G-AKA authentication protocol and how it improves upon LTE's EPS-AKA. We cover: • SUPI vs SUCI ...

6:17
5G-AKA Explained – 5G Authentication Protocol Deep Dive

0 views

2 weeks ago

Butera Marcel
The Architecture of Trust/ Authentication

This is mainly through registration and login with techniques called Password Hashing(encryption of passwords).Common ...

6:10
The Architecture of Trust/ Authentication

1 view

1 month ago

AsRealTech
Super Simple Login with Axios in  Vite + TypeScript | Beginner Friendly

Learn how to build a super simple login function using Axios in a ⚡ Vite + TypeScript app. In this quick tutorial, you'll see how to: ...

4:31
Super Simple Login with Axios in Vite + TypeScript | Beginner Friendly

15 views

3 weeks ago

Tom Olzak
Cryptography Goals

In this video, we're treating cryptography like a toolbox, not a magic spell. Cryptography helps us protect information and prove ...

15:27
Cryptography Goals

22 views

3 weeks ago

CogniBite
🔐The Architecture of Password Security and Digital Defense

How do hackers actually crack passwords? In this video I explain the real techniques used in cybersecurity such as brute force ...

5:39
🔐The Architecture of Password Security and Digital Defense

30 views

6 days ago

Chidambaram Narayanan
CISA Domain 5 Part 1: Cryptography | Last Minute Refresher

CISA Domain 5 Part 1: Cryptography, Access Control & Authentication - Last Minute Refresher Master the cryptography and ...

19:16
CISA Domain 5 Part 1: Cryptography | Last Minute Refresher

98 views

6 days ago

rafitsolutions
How to Create a Secured User Login System for Collaborative Projects Part 2

Excel VBA – Creating a Secure User Login System for Collaborative Projects (Part 2) Welcome to Part 2 of this Excel VBA security ...

12:48
How to Create a Secured User Login System for Collaborative Projects Part 2

52 views

11 days ago

Developer XD
AuthVaultix C# User & Pass Login Integration | Secure Authentication Tutorial KeyAuht Alternative

In this video, we explain how to implement Username & Password Login using AuthVaultix in your C# application. 🔐 AuthVaultix ...

6:18
AuthVaultix C# User & Pass Login Integration | Secure Authentication Tutorial KeyAuht Alternative

0 views

12 days ago

Lexorithm
Password Security Explained | Hashing, Salting & Secure Storage

When you create an account on a website, your actual password should never be stored in plaintext. But how do websites store ...

7:02
Password Security Explained | Hashing, Salting & Secure Storage

4 views

1 month ago

AI Evolution
How Login ACTUALLY Works: Hashing & Access Tokens Explained

Ever wonder what actually happens in the split second after you click "Log In"? In this episode of "The Explainer," we pull back the ...

6:33
How Login ACTUALLY Works: Hashing & Access Tokens Explained

24 views

2 weeks ago

AUTOHOTKEY Gurus
💻 Web Scraping Secrets: Fake Browser Authentication Like a Pro! | AHK Hero Extract

Summary* This video discusses web scraping and automation techniques for accessing data from secure websites that require ...

19:48
💻 Web Scraping Secrets: Fake Browser Authentication Like a Pro! | AHK Hero Extract

144 views

1 month ago

Diana Guerrero Roble
OWASP Top 10: API5:2023 – Broken Function Level Authorization (BFLA)

API5:2023 – Broken Function Level Authorization (BFLA) occurs when an API fails to verify if a user has the correct permissions to ...

5:42
OWASP Top 10: API5:2023 – Broken Function Level Authorization (BFLA)

13 views

3 weeks ago

channelofmon
Hashing vs encryption
13:03
Hashing vs encryption

3 views

11 days ago

Behind the API
The Gateway Guard: Architecture and Function of API Gateways

Understanding API Gateway is essential if you're serious about backend engineering and system design. In this video, we break ...

7:38
The Gateway Guard: Architecture and Function of API Gateways

7 views

3 weeks ago

Csoda81
cl09 Google Cloud Functions Explained

This video provides a detailed overview of Google Cloud Functions, explaining their role as a serverless "Function as a Service" ...

10:25
cl09 Google Cloud Functions Explained

5 views

6 days ago

Bare Metal Cyber
Episode 40 — Use Hashing Correctly: Digests, Salts, HMAC, and Integrity Without False Confidence

This episode explains hashing as a tool for integrity and secure comparison, and it aligns to GSEC questions that probe whether ...

12:33
Episode 40 — Use Hashing Correctly: Digests, Salts, HMAC, and Integrity Without False Confidence

4 views

3 weeks ago