ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

11 results

The Debug Zone
Hex digest for Python's built-in hash function

Today's Topic: Hex digest for Python's built-in hash function Thanks for taking the time to learn more. In this video I'll go through ...

2:15
Hex digest for Python's built-in hash function

4 views

5 days ago

Sophia Wagner
Softwareengineering: REST API security: HMAC/key hashing vs JWT

REST API security: HMAC/key hashing vs JWT Hey guys! Hopefully you found a solution that helped you! The Content is licensed ...

3:47
Softwareengineering: REST API security: HMAC/key hashing vs JWT

5 views

5 days ago

Sophia Wagner
Security: How to check user password against list of weak passwords when I use client-side hashing?

How to check user password against list of weak passwords when I use client-side hashing? Hey guys! Hopefully you found a ...

2:25
Security: How to check user password against list of weak passwords when I use client-side hashing?

0 views

4 days ago

Кафедра ММЗІ
Hash Functions and MAC Codes, Lecture 08-3: ROX Scheme

Course "Hash Functions and Authentication Codes", lecture No. 08 The following issues were considered: — ROX scheme (Random ...

11:24
Hash Functions and MAC Codes, Lecture 08-3: ROX Scheme

0 views

1 day ago

Hiago Driver
ASIC Setup Tip: Every Hash Has Its Exact Place #ASIC #ASICArSetup #BitcoinMining #btc
0:16
ASIC Setup Tip: Every Hash Has Its Exact Place #ASIC #ASICArSetup #BitcoinMining #btc

833 views

3 days ago

SANS Internet Storm Center
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache …

... https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function ...

6:17
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache …

354 views

3 days ago

Кафедра ММЗІ
Hash functions and MAC codes, lecture 08-1: parameterized hash functions (general provisions)

Course "Hash Functions and Authentication Codes", lecture No. 08 The following issues were considered: — parameterized hash ...

11:16
Hash functions and MAC codes, lecture 08-1: parameterized hash functions (general provisions)

0 views

1 day ago

Кафедра ММЗІ
Hash Functions and MAC Codes, Lecture 08-5: Functions Derived from SHA-3

Course "Hash Functions and Authentication Codes", lecture No. 08 The following issues were considered: — NIST standard 800 ...

15:36
Hash Functions and MAC Codes, Lecture 08-5: Functions Derived from SHA-3

0 views

1 day ago

Tom Olzak
Building Crypto Agility for the Post-Quantum Transition

Quantum computers probably won't “break TLS tomorrow,” but harvest now, decrypt later changes the risk math today: attackers ...

8:37
Building Crypto Agility for the Post-Quantum Transition

8 views

3 days ago

Network State Podcast
Crypto Is the Currency of AI Agents with Circle Cofounder Sean Neville

Sean Neville cofounded Circle and helped scale USDC to billions in circulation. Sean and Balaji discuss the original vision for ...

56:51
Crypto Is the Currency of AI Agents with Circle Cofounder Sean Neville

3,052 views

6 days ago

Bionutrient Food Association
Week 1:  Christopher Houghton Budd - BFA 12th Soil & Nutrition Conference - reNaturing ourSelves

ECONOMICS - Your speaker, Christopher Houghton Budd is a British economic and monetary historian whose work bridges ...

2:01:45
Week 1: Christopher Houghton Budd - BFA 12th Soil & Nutrition Conference - reNaturing ourSelves

256 views

6 days ago