- 52
- 1 232 256
CBTVid
Registrace 3. 02. 2011
In this channel you can watch videos on Network, Security and other Technologies.
Remove Weak SSL TLS Ciphers from Palo Alto FW TLS profile
In this video you'll find how to remove weak SSL/TLS algorithms form Palo Alto firewalls SSL/TLS profile.
zhlédnutí: 6 066
Video
9 - Cryptography Basics - SSH Protocol Explained
zhlédnutí 34KPřed 3 lety
In this video you'll learn about the details of SSH protocol.
8 - Cryptography Basics - SSL TLS Protocol Explained
zhlédnutí 11KPřed 3 lety
In video I explain the SSL/TLS protocol in details. I also capture packets involved in establishing a secure session between a client and server to see the order and content of packets.
7 - Cryptography Basics - Diffie-Hellman Key Exchange
zhlédnutí 74KPřed 3 lety
In this video you'll learn about Diffie-Hellman key exchange method.
6 - Cryptography Basics - Public Key Infrastructure
zhlédnutí 4,1KPřed 3 lety
In this video you'll learn about PKI, trust models, managing PKI, certificate policy, certificate life cycle and key management.
5 - Cryptography Basics - Types of Digital Certificates
zhlédnutí 4,4KPřed 3 lety
In this video you'll learn about three categories of digital certificates. Root certificate, domain certificate and hardware and software certificates.
4 - Cryptography Basics - Managing Digital Certificates
zhlédnutí 4,5KPřed 3 lety
In this video you'll learn about different entities and technologies involved in managing digital certificate.
3 - Cryptography Basics - Digital Certificate
zhlédnutí 14KPřed 3 lety
In this video you'll learn about Digital Certificate and it's applications
2 - Cryptography Basics - Digital Signature
zhlédnutí 28KPřed 3 lety
in this video you'll learn about digital signature and it's applications.
1 - Cryptography Basics
zhlédnutí 13KPřed 3 lety
in this video you'll learn about the basics of cryptography, hashing and different algorithms.
Configuring VoIP in GNS3
zhlédnutí 50KPřed 10 lety
In this video I show you how to configure a voice lab in GNS3 using Cisco CME.
How to Configure VirtualBox in GNS3
zhlédnutí 3,4KPřed 10 lety
In this video I show you how to configure the VirtualBox integrated in GNS3.
Configuring IP Phones and DHCP Server in Packet Tracer
zhlédnutí 36KPřed 10 lety
In this video you will learn how to configure IP Phones in a network of voice and data. This topology uses one DHCP server to assign IP addresses to both phones and PCs which are in different VLANs.
Copy and Paste Text and Graphic between Host and VirtualBox
zhlédnutí 5KPřed 10 lety
In this video I show you how to copy and paste text and graphic between host machine and VirtualBox guest machine.
Network Address Translation - Configuration
zhlédnutí 4,8KPřed 11 lety
In this video you learn how to configure different typs of NAT such as Static, Dynamic and NAT with PAT.
Extended Access Control List (ACL) part 2
zhlédnutí 10KPřed 13 lety
Extended Access Control List (ACL) part 2
Extended Access Control List (ACL) part 1
zhlédnutí 19KPřed 13 lety
Extended Access Control List (ACL) part 1
Network Address Translation (NAT) part 5
zhlédnutí 6KPřed 13 lety
Network Address Translation (NAT) part 5
Network Address Translation (NAT) part 4
zhlédnutí 9KPřed 13 lety
Network Address Translation (NAT) part 4
Network Address Translation (NAT) part 3
zhlédnutí 13KPřed 13 lety
Network Address Translation (NAT) part 3
Network Address Translation (NAT) part 2
zhlédnutí 20KPřed 13 lety
Network Address Translation (NAT) part 2
Network Address Translation (NAT) part 1
zhlédnutí 45KPřed 13 lety
Network Address Translation (NAT) part 1
transfer files between host and virtualbox
zhlédnutí 162KPřed 13 lety
transfer files between host and virtualbox
Please provide the windows image
Should scratch any other explanation on SSH from internet forever and keep this alone.
best best best
good video bro
i was wondering why signatures required encrypting with private key forever. this literally makes so much sense
bro you explain it beautifully 😊😊👍👍
Thank you for this course!
Where is Eve? Also, best explanation video for digital signatures on youtube!
Thanks
Simplified explanation. Thanks
Thanks a lot.
❤
BEST WORK A**** THANK YOU
Tom's number ( z=4 ) is not prime. Should it not be?
Wonderfull explaination, thanks buddy!
Fortunately I have an assignment so your video helped me thanks bro
thanks
Practicly impossible for supercomputers yet invented by human creative mind by applying logic and imagination. Amazing!
very simple, free from burdensome difficult terminologies, straight to the point, and no time wasting. amazing
But what's the point of getting uncrypting k = 10 on the receiving end ? When and who decided that the uncrypted message would be 10 ?
Than you very much, may god bless you and guide you.
This is fucking awesome
7:08
Bro just explained them better than my professor did in two lectures
Mind blowing and easy explanation. I am from non cs background but i understood it very clearly. ❤❤❤
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
00:24 What? You say, this: "If Bob can *decrypt* the message that came from Alice, using Alice's public key, then Bob knows that the message came from Alice." But how would Bob decrypt a message with Alice's public key? maybe you wanted to say, that Bob should encrypt (not decrypt) the message? Unclear. Public keys are shared because the receiver should be able to encrypt the data with that public key, not decrypt. For decryption, private key is there. Then you continue, that Alice encrypts the message with the private key.. man, I think you're using public and private keys really incorrectly here.
I think what they are saying here is that if you can decrypt the message with the public key of the sender, then it must have been them who have encrypted it because only they know their private key (which is called signing a message). If someone encrypted the message with your public key and sent it to you to decrypt with your private key, there would be no way to prove that they are who they say they are. So the initial approach must be taken to prove this, but it can be disrupted by an attacker. Thus, certificates must be used.
good content
great video mate keep going
very good! 🇧🇷
Thanks, great video! One thing I don't understand though, it is said in the video that the certificate authority generates a hash from Alice's certificate signing request (city, state, country, etc...) then encrypts it with their private key. However, it is said that Bob creates a hash of ALL the information on the digital certificate (name of issuer, serial number, etc...). This info is not the same as the one from Alice's certificate signing request. So how can Bob get the same hash when it is generated from different info ?
Awesome thanks I was lost forever on this
Thank Youu ❤ 🎉 its very clear sir
hi , can i contact you pls ?
Super
thanks for this video
This is the best video🎉
Finally someone explained this in a clear way! Thank you! Bowing!
Awesome 😍
It is also a good thing to know that g is a primitive root modulo of n
so simply and brilliantly explained....not sure and wondering why this video is viewed by so less people, and liked by very few ones :
great and highly recommend thank you
Great explanation. Now, if Bob wants to send a message to Alice, how does he encrypt it? This may be a dumb question, but I'm not sure where the message fits in here. What am I missing?
How to find the remainder
When Alice sent a request to Certificate Authority, did she encrypt it with her private key?
Thank You so much for this tutorial ❤❤❤
such a transparent crystal clear concept explanation... Thank you
Thank you! You deserve a lot more views.
great
Thanks man!