ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

571 results

ZoomInData
Authentication & Authorization in Azure Functions

Azure Functions Interview Questions & Answers | Azure Serverless | ZoomInData In this video, we cover the most important Azure ...

14:32
Authentication & Authorization in Azure Functions

9 views

2 weeks ago

Perfect Computer Engineer
Message Authentication Code ( MAC )

This lecture talks about Message Authentication Code ( MAC ) in the subject Cryptography & System Security in Hindi. This lecture ...

9:41
Message Authentication Code ( MAC )

1,014 views

4 weeks ago

Will To Learn
Hash Function vs MAC in 5 Minutes

Hash Function vs MAC Explained Simply | Data Security Basics with Real-Life Examples In this video, we explain Hash Functions ...

6:31
Hash Function vs MAC in 5 Minutes

19 views

10 days ago

Lexorithm
Message Authentication Codes (MACs) Explained | Integrity + Authentication

A hash function can detect changes in data, but it cannot prove who sent the message. This is where Message Authentication ...

6:38
Message Authentication Codes (MACs) Explained | Integrity + Authentication

0 views

2 days ago

AppForce1
Cryptography 101: What Every Swift Developer Should Understand

In a previous role as the tech lead of a team building a digital identity solution, Eric often saw developers using cryptography ...

43:55
Cryptography 101: What Every Swift Developer Should Understand

84 views

4 weeks ago

David Bombal
Password Cracking: Can a Rainbow table reverse a hashed password?

Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use ...

50:43
Password Cracking: Can a Rainbow table reverse a hashed password?

220,668 views

2 weeks ago

Jenny Yong
Answers to questions regarding Verification, KD coins, function activation and recharge

Answers to questions regarding Verification, KD coins, function activation and recharge #keydiy#

5:32
Answers to questions regarding Verification, KD coins, function activation and recharge

31 views

3 weeks ago

Simplilearn
OAuth 2.0 Tutorial 2026 | OAuth 2.0 Explained - How It Works | OAuth 2.0 For Beginners | Simplilearn

Full Stack Java Developer Program (Discount Code - YTBE15) ...

29:07
OAuth 2.0 Tutorial 2026 | OAuth 2.0 Explained - How It Works | OAuth 2.0 For Beginners | Simplilearn

2,064 views

3 weeks ago

THE FACT FACTORY
Understanding PBKDF2: An Older Standard in Modern Cryptography Explained

In this comprehensive video, we delve into the intricacies of PBKDF2 (Password-Based Key Derivation Function 2) and its ...

2:01
Understanding PBKDF2: An Older Standard in Modern Cryptography Explained

0 views

3 weeks ago

NextGen Networks
5G Registration Procedure – NAS Packet Decode, Authentication & Security Explained | Interviews

This video provides an expert-level explanation of the 5G Registration Procedure, including NAS packet structure, authentication ...

6:47
5G Registration Procedure – NAS Packet Decode, Authentication & Security Explained | Interviews

50 views

4 weeks ago

Bare Metal Cyber
Episode 46: Hashing and Message Integrity

Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode ...

12:52
Episode 46: Hashing and Message Integrity

3 views

3 weeks ago

NightEagleCY
Gatekeepers of Security: Distinguishing Authentication from Authorization

Modern digital security relies on two distinct but complementary processes known as authentication and authorization.

1:34
Gatekeepers of Security: Distinguishing Authentication from Authorization

0 views

13 days ago

Microsoft Security Community
Microsoft Agent Identity Platform Fundamentals

Wednesday, January 21st, 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Entra | Microsoft Agent ...

1:01:14
Microsoft Agent Identity Platform Fundamentals

1,012 views

3 weeks ago

7minute cse
A Remote PUF Authentication Based Internet of things

Remote PUF (Physical Unclonable Function) authentication provides a lightweight, hardware-rooted security solution for IoT ...

4:37
A Remote PUF Authentication Based Internet of things

0 views

2 weeks ago

Maxim Masiutin
Information Security Terminology - Lecture 11/16 - Hashing and Data Integrity

0:00 Lecture 11: Hashing and Data Integrity 0:14 Introduction 1:21 Part 1: Cryptographic Hash Function Fundamentals / What is a ...

39:23
Information Security Terminology - Lecture 11/16 - Hashing and Data Integrity

0 views

2 weeks ago

Microsoft Research
Fuzzy Extractors are Practical

Speaker: Amey Shukla, University of Connecticut Host: Melissa Chase Despite decades of effort, a chasm existed between the ...

50:30
Fuzzy Extractors are Practical

367 views

2 weeks ago

SpaceJamBetter
How Hackers Steal Passwords (And How To Fix It)

Learn the history and inner workings of password security, how hackers steal passwords, and what you can do about it.

6:45
How Hackers Steal Passwords (And How To Fix It)

71 views

2 weeks ago

The Digital Mechanism
Why Your Password Alone Is No Longer Enough

How does two-factor authentication actually work, and why is it so effective at protecting accounts? In this video, we explain how ...

6:00
Why Your Password Alone Is No Longer Enough

10 views

3 weeks ago

TechSimPlus Learnings
#19 Token-Based Authentication - Secure API Endpoints in FastAPI | Tutorial #fastapi

Learn to protect your FastAPI routes using JWT tokens! Implement authentication middleware and secure your API endpoints.

19:38
#19 Token-Based Authentication - Secure API Endpoints in FastAPI | Tutorial #fastapi

525 views

1 month ago

De-Complicated
How Passwords Actually Work Explained Simply

How Passwords Actually Work (Explained Simply) Ever wondered how passwords actually work behind the scenes? In this video ...

6:24
How Passwords Actually Work Explained Simply

3 views

2 weeks ago