ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

69 results

Professor Carol Alexander
I.2 Cryptographic Hashing

This video covers the role of cryptographic hash functions showing how hashing provides data integrity, tamper resistance, and a ...

23:17
I.2 Cryptographic Hashing

33 views

4 days ago

Lili_Code
Is Your Password Actually Safe? Encryption vs Hashing vs Salting 🔐

Most people think websites “store” passwords — but that's not how it works. In this video, we break down: What symmetric ...

9:32
Is Your Password Actually Safe? Encryption vs Hashing vs Salting 🔐

0 views

4 days ago

BMR EDUCATION
Digital Fingerprints: Cryptographic Hashes Explained — From Basics to Blockchain

In this video we unpack cryptographic hash functions — what they are, why they're trusted, and how they secure everything from ...

5:23
Digital Fingerprints: Cryptographic Hashes Explained — From Basics to Blockchain

0 views

4 days ago

ACID
A New Lock For Our Data

"Double-Hashing Operation Mode for Encryption" (DHOME), outlines a cryptographic method designed to efficiently secure "big ...

6:00
A New Lock For Our Data

19 views

7 days ago

Positive Technologies Global
Old but Gold Cryptography Pitfalls

Old but gold — and still dangerously relevant. Vsevolod Dergunov from PTSwarm breaks down common cryptography pitfalls that ...

26:13
Old but Gold Cryptography Pitfalls

19 views

5 days ago

AppForce1
Cryptography 101: What Every Swift Developer Should Understand

In a previous role as the tech lead of a team building a digital identity solution, Eric often saw developers using cryptography ...

43:55
Cryptography 101: What Every Swift Developer Should Understand

26 views

1 day ago

KryptoMindz Technologies
Digital Trust Basics: Hashes, Keys & Modern Crypto Security | Module 1.2

You'll see how simple ideas like hash functions, digital signatures, and key pairs come together to secure identities, applications, ...

19:09
Digital Trust Basics: Hashes, Keys & Modern Crypto Security | Module 1.2

0 views

1 day ago

Knowledge Hub
Your Password Is Never Stored: Here’s What Actually Happens!

Ever wondered how websites can store millions of passwords without actually knowing any of them? And why even after a ...

3:43
Your Password Is Never Stored: Here’s What Actually Happens!

72 views

6 days ago

Simply Bitcoin
MicroStrategy vs BitMine: Who Will Be The Crypto King?

Michael Saylor or Tom Lee? Bitcoin's unstoppable scarcity or Ethereum's flashy utility? This video breaks down the high-stakes ...

26:19
MicroStrategy vs BitMine: Who Will Be The Crypto King?

24,379 views

1 day ago

The Daily Notebook
The Secret Life of Passwords .cyber security day 8

Password hashing stores passwords securely by transforming them into fixed-length, irreversible strings using cryptographic ...

6:12
The Secret Life of Passwords .cyber security day 8

0 views

7 days ago

Python-in-Easy-way
BlockChain  Unit -II Lecture  2A

A blockchain is “a distributed database that maintains a continuously growing list of ordered records, called blocks.” These blocks ...

9:06
BlockChain Unit -II Lecture 2A

0 views

7 days ago

Professor Carol Alexander
I.3 Building a Blockchain

The role of cryptographic hash functions is then introduced, showing how hashing provides data integrity, tamper resistance, and ...

15:05
I.3 Building a Blockchain

31 views

4 days ago

Atdhe Buja
6. Security Fundamentals: Basic Cryptography

Finally, the lesson introduces hashing for integrity verification, showing how cryptographic hash functions such as SHA-256 are ...

4:26
6. Security Fundamentals: Basic Cryptography

3 views

1 day ago

Learn Fundamentals
Mastering Python Hashing with hashlib

Mastering Python Hashing with hashlib.

11:36
Mastering Python Hashing with hashlib

0 views

6 days ago

COSIC - Computer Security and Industrial Cryptography
Cybersecurity Industry Day 2025 - Your Face Isn’t Yours Anymore... (Diane Leblanc-Albarel, COSIC)

... Leuven) Cybersecurity Industry Day November 13, 2025 | Lamot Mechelen Perceptual hash functions convert images into hash ...

1:15
Cybersecurity Industry Day 2025 - Your Face Isn’t Yours Anymore... (Diane Leblanc-Albarel, COSIC)

56 views

6 days ago

David
What is Hashing? #Hashing #Cybersecurity #infosec #informationtechnology

Cybersecurity - Definition of Hashing.

0:25
What is Hashing? #Hashing #Cybersecurity #infosec #informationtechnology

0 views

5 days ago

THE ONE WAY LEARN AND KNOW
Blockchain Facts: What Is It, How It Works, and How It Can Be Used

Once the block is full, the block data is run through a cryptographic hash function, which creates a hexadecimal number called the ...

10:14
Blockchain Facts: What Is It, How It Works, and How It Can Be Used

33 views

4 days ago

Professor Carol Alexander
I.1 Distributed Ledger Technology

The next video covers the role of cryptographic hash functions showing how hashing provides data integrity, tamper resistance, ...

9:37
I.1 Distributed Ledger Technology

49 views

4 days ago

Zentro Wealth
How Blockchain Works – Explained Simply for 2026

Ever wondered how blockchain really works and why it's revolutionizing industries? In this video, we break down the mechanics of ...

6:05
How Blockchain Works – Explained Simply for 2026

0 views

4 days ago

The Crypto Minute
Immutability Unlocked: The Hidden Strength of Blockchains

A clear, educational explanation of immutability in blockchains. Visuals use simple analogies to show why past records are hard ...

0:35
Immutability Unlocked: The Hidden Strength of Blockchains

0 views

5 days ago