Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
265 results
A hash function can detect changes in data, but it cannot prove who sent the message. This is where Message Authentication ...
2 views
1 month ago
Content for The Next Generation Of Cracked Engineers - https://davidmoreen.com.
0 views
6 days ago
In this detailed lecture, we explain the complete concept of Message Authentication Code (MAC) in a simple and structured ...
139 views
2 weeks ago
In part 3 of our simulated penetration test we utilize Homer's access to his computer to hunt for cached credentials. We extract an ...
27 views
13 days ago
In this video, we explore the 5G-AKA authentication protocol and how it improves upon LTE's EPS-AKA. We cover: • SUPI vs SUCI ...
This is mainly through registration and login with techniques called Password Hashing(encryption of passwords).Common ...
1 view
Learn how to build a super simple login function using Axios in a ⚡ Vite + TypeScript app. In this quick tutorial, you'll see how to: ...
15 views
3 weeks ago
In this video, we're treating cryptography like a toolbox, not a magic spell. Cryptography helps us protect information and prove ...
22 views
How do hackers actually crack passwords? In this video I explain the real techniques used in cybersecurity such as brute force ...
30 views
CISA Domain 5 Part 1: Cryptography, Access Control & Authentication - Last Minute Refresher Master the cryptography and ...
98 views
Excel VBA – Creating a Secure User Login System for Collaborative Projects (Part 2) Welcome to Part 2 of this Excel VBA security ...
52 views
11 days ago
In this video, we explain how to implement Username & Password Login using AuthVaultix in your C# application. 🔐 AuthVaultix ...
12 days ago
When you create an account on a website, your actual password should never be stored in plaintext. But how do websites store ...
4 views
Ever wonder what actually happens in the split second after you click "Log In"? In this episode of "The Explainer," we pull back the ...
24 views
Summary* This video discusses web scraping and automation techniques for accessing data from secure websites that require ...
144 views
API5:2023 – Broken Function Level Authorization (BFLA) occurs when an API fails to verify if a user has the correct permissions to ...
13 views
3 views
Understanding API Gateway is essential if you're serious about backend engineering and system design. In this video, we break ...
7 views
This video provides a detailed overview of Google Cloud Functions, explaining their role as a serverless "Function as a Service" ...
5 views
This episode explains hashing as a tool for integrity and secure comparison, and it aligns to GSEC questions that probe whether ...