Encryption as Fast As Possible

  Переглядів 518,746

Techquickie

Techquickie

День тому

How does data travel around the internet without becoming publicly visible? Encryption! But what is encryption?...
Massdrop link: dro.ps/techquickie

КОМЕНТАРІ: 575
@MatheusLB2009
@MatheusLB2009 7 років тому
I type with gloves so they can't get my fingerprints
@Ajswindowshelper
@Ajswindowshelper 7 років тому
Mom what did I tell you about watching videos that'll just get you worried about being hacked!!?!?!!
@gysmothediamond2046
@gysmothediamond2046 4 роки тому
this is very useful now bc contact is bad
@SimpleSetting
@SimpleSetting 3 роки тому
I use no keyboard or mouse, actually i dont gave a pc so they dont get my fingerprints
@tombrown5235
@tombrown5235 3 роки тому
@@gysmothediamond2046 yes with covid
@CTSSTC
@CTSSTC 4 роки тому
Am I going crazy, or is his voice fluctuation in pitch/squeakiness?! :0
@rodrigocorreia8096
@rodrigocorreia8096 5 років тому
WHO DOESN'T LOVE THIS FAST AS POSSIBLE VIDEOS AS I DO!? Thank You Linus Sebastian! Keep the greatest content up! :D
@neeraj_hk
@neeraj_hk 9 років тому
LinusLaunderingTips
@HomeSkillenSLICE
@HomeSkillenSLICE 9 років тому
LinusStabbingTips
@TheRealSkeletor
@TheRealSkeletor 9 років тому
LinusFoldingKnifeTips
@Walterrinho
@Walterrinho 9 років тому
Did anyone noticed Linus's tabs "contract killing", "laundering" and "hire hitman"?!!
@oniruddhoalam2039
@oniruddhoalam2039 3 роки тому
Taran's computer
@TheAIKnowledgeHub
@TheAIKnowledgeHub 9 років тому
Techquickie Nice video, but you might want to add an important thing in when you talk about this again. All encryption can be broken, but it's about it being resource intensive. For example, AES 256 can be broken, but it will take a computer about 10,000 years to go through all the possible combinations that the password can be. However, a weaker encryption may take a few seconds or minutes. (It's like other locks. No one would use a bike lock to protect their bank because it's not resource intensive enough. However, no one would use a bank lock to protect a bike because that's too resource intensive for the end user. But in both cases, you can break any lock if you have the right resource (equipment and time).)
@ludan1498
@ludan1498 9 років тому
Simple example of encryption: 1234 => Your password 5=> encryption key (1+5)(2+5)(3+5)(4+5) = 6789 => encrypted password. Encryption key received by recipient => -5 So 6-5; 7-5; 8-5; 9-5; and voila
@hihisham
@hihisham 9 років тому
You sir deserved my like
@bollwerk784
@bollwerk784 9 років тому
Ceasar cipher sucks, as it's a perfect bijection, where you can - given the ciphertext - calculate the plaintext without problems.
@sighisoaraa
@sighisoaraa 9 років тому
The recipient doesn't receive a key, but instead already has a private key of its own, just like the guy in the video said. That's the point.
@napillnik
@napillnik 9 років тому
sighisoaraa that's just called a key. Private and public are used only when talking about key pairs, in algorithms that use them. Such algorithms are called Asymmetric. Now, what you're referring to is just a symmetric encryption. Asymmetric encryption is extremely slow, and quite vulnerable. Symmetric encryption is lightning fast (a modern day CPU can encrypt/decrypt gigabytes of data each second with symmetric keys, even 10 years ago CPUs could encrypt/decrypt up to 100Mb/s)
@napillnik
@napillnik 9 років тому
That's a trivial encryption example, which can be decrypted by any 7th grader without having the key. There is a certain information about text, like the frequency of each letter. In longer messages, that can be converted into statistics, and very confident guesses about what the key is. Or without any statistics, a regular brute force attack is easy.
@EonityLuna
@EonityLuna 9 років тому
1:45 > "The server room is on fire again"
@Xava2011
@Xava2011 9 років тому
Linus, u (and your team) are awesome. Thanks for everything :)
@TehOnlyShoe
@TehOnlyShoe 9 років тому
Well, I learnt a new lesson today. Throwing knives in the air is okay because Linus does it. Thanks Linus! My mother will be proud of me :D
@TrafficMan7
@TrafficMan7 9 років тому
"High performance knives, for gamers."
@arjenbij
@arjenbij 9 років тому
Factory new.
@LohJiaHung
@LohJiaHung 9 років тому
Karambit, anyone?
@Dylon99
@Dylon99 9 років тому
Loh Jia Hung StatTrak M9 Bayonet | Fade (Factory New). Plis xD
@LohJiaHung
@LohJiaHung 9 років тому
DylonxD StatTrak Karambit | Fade (Factory New) Confirmed kills: 9001
@Dylon99
@Dylon99 9 років тому
Loh Jia Hung gg. xD
@descent8275
@descent8275 9 років тому
"Hi Linus, The server room is on fire again Just FYI" LOLD me more then the green linus.
@airplaneass
@airplaneass 9 років тому
Hey, could you explain what the differences are between all the phone processors? Ex. Intel Atom, Rockchip processors, Qualcomm Snapdragon etc etc. Thank you!
@limitlessgames2921
@limitlessgames2921 8 років тому
Always wondered what the little padlock was....You learn something new everyday. Usually encryption dosent make sense to me but this did! Thanks so much!
@Fatman67
@Fatman67 9 років тому
In Soviet Canada, Linus FOLLOWS YOU !
@SPUNGEAYYY
@SPUNGEAYYY 9 років тому
I think you ment russia
@JamesHD1990
@JamesHD1990 9 років тому
Goku AKA Kakorot derp geography
@Denastus
@Denastus 9 років тому
JamesHD1990 lol
@CaseyStellar
@CaseyStellar 9 років тому
Nyllith S. Goku AKA Kakorot JamesHD1990 Haha.
@Denastus
@Denastus 9 років тому
Prevet Stalin. Kak dela?
@MrHatoi
@MrHatoi 6 років тому
0:00 "hire hitman" "Contract Killing" "Laundering" "Money Laundering" "Van Rental"
@OCD.Reader
@OCD.Reader 9 років тому
Hey linus...what abt a tech quickie on data encryption softwares for hard drive? And also about what is visual studio redistributables...?
@david.st1
@david.st1 2 роки тому
Thank you for explaining encryption so clearly. It couldnt be explained any better!
@shrimpy420
@shrimpy420 4 роки тому
Came for the encryption explanation, stayed for the guy's funny voice
@simplyrubi1910
@simplyrubi1910 6 років тому
may I use the encryption part of this video for my final exam project in BCIS 1305 class?
@gladyszryan
@gladyszryan 9 років тому
Everyone can see exactly the videos I like and how many of your videos are liked by me, clearly i spend a LOT of time listening to you talk Linus :D
@DannyCarter95
@DannyCarter95 9 років тому
Linus, can you make an episode covering Audio Cables and such? RCA, TRS, XLR, Optical etc, their quality and general information? And some depth about Audio Quality between cables and also Bluetooth if possible :) I'm looking to get a pair of good speakers/studio monitors and I would like to know different input/outputs and such.
@MrJdavi3
@MrJdavi3 9 років тому
I need a computer for college soon and am looking at the old MacBook Pro and I'm going to put ssd' s in them is this better than buying something else if so plz tell me
@Fluxtroid
@Fluxtroid 9 років тому
Soo, can you encrypt when using UDP then, because you don't have the handshake procedure in order to get the key? If someone knows regarding UDP and encryption, would be cool to learn!
@tmm-thirtyfive
@tmm-thirtyfive 4 роки тому
Hey Linus, I am currently in CompTIA Security+ and have no IT background! Your videos are helping me understand very easily! Any way you could put out a video explaining asymmetric encryption vs symmetric as you only explain asymmetric in this video.
@tmm-thirtyfive
@tmm-thirtyfive 2 роки тому
@John Howard was this supposed to be funny or something?
@yourstrulybae
@yourstrulybae 9 років тому
I swear he makes the best videos of describing something.
@Stike96official
@Stike96official 9 років тому
Was he actually throwing a real knife into the air and catching it :O. Also 89'th viewer here :D.
@Deathtopaper
@Deathtopaper 9 років тому
Yes
@thomaster8870
@thomaster8870 9 років тому
The only thing holding you back is your own fear. And as always don't forget that fear is the true enemy.
@Slayer1111111111able
@Slayer1111111111able 9 років тому
it looked like it. He probably dulled the hell out of it. Hopefully. I know I have a cheapo dull knife specifically for that purpose.
@theuseraccountname
@theuseraccountname 9 років тому
He was tossing a real knife, but when he was tossing it, it was closed. He then reopened it when he showed us the blade part and stopped tossing it.
@drewhuff447
@drewhuff447 9 років тому
89th viewer?!?!?! holy shit that is sooooooooo fucking insaneeeeee broooooo
@JonnySelProductions
@JonnySelProductions 9 років тому
Linus! A Topic for you! Can you PLEASE make a comparison once and for all about what the big differences are between DLP and LCD Projectors!? I am really stuck as to which type of projector has the least amount of input lag as possible (for gaming of course). Can you please settle this? Thank you so much for your consideration.
@kapildeshmukh7878
@kapildeshmukh7878 9 років тому
A projector has a very high latency rate that makes it unsuitable for gaming. It takes more time than any physical display to "project" the rendering. Therefore you are better off with a good old cheap monitor.
@JonnySelProductions
@JonnySelProductions 9 років тому
kapil deshmukh I'm very well aware of that. However, there will always be a time when I may want to game on the biggest screen possible (especially if I am with friends where-ever I may be). And I can only do that with projectors. HUGE screen TVs cost a helluva lot more than an home theatre/entertainment projector that can project an even larger screen! :P
@bassl0va
@bassl0va 9 років тому
thecoolman3060 Productions Not really. Don't get data projectors mixed up with home theater projectors. Good projectors aren't cheap either. Not to mention getting a good screen too. Go have a look at Home Theather Shack or AVS Forum and they can probably help you choose something. People seem to look at 65"+ TVs costing many thousands and think "oh this $300 projector can do a way bigger picture!" Sure it can do a bigger picture, but it's cheap for a reason!
@JonnySelProductions
@JonnySelProductions 9 років тому
bassl0va I see your point, but I still want to see Linus' thoughts on this issue. I want to see different views on this matter, so I want to also know what Linus thinks about it (the best projector tech that is suitable for gaming (obviously with the least amount of input lag possible for a tolerable gaming experience with a projector (especially for parties and such)).
@bassl0va
@bassl0va 9 років тому
thecoolman3060 Productions You'll probably have the most luck from responses on home theater sites since there are guys there with lots of experience in that sort of thing. A video by Linus on the matter - while interesting - wouldn't be as comprehensive as from someone who has owned multiple projectors/worked with them for many years. You do notice people pulling Linus up on mistakes/generalizations in AFAPs where he's researched the topic just for video as he doesn't have the long term experience in those matters, whereas his content based on topics that have been his hobby/work for many years are much better.
@coffindancerno.173
@coffindancerno.173 5 років тому
We watched this at school today and I subbed from my teachers email to tech quickie as we were going to the cafeteria
@Entrepid83
@Entrepid83 9 років тому
Is HDCP any different than what was discussed in this video?
@EBackwards
@EBackwards 8 років тому
You know what Linus, when I watch your video at 2x times the speed... your voice changes very little 0.o Side Note: I've been sending my clients here as of late so they can learn more about anything computer related so keep it up!
@Muriqa
@Muriqa 7 років тому
Hi Linus, The server room is on fire again. Just for your information. Sarcastic. :)
@Bubbirock
@Bubbirock 9 років тому
I know this is possible the wrong video to post this comment but I think some people here have knowlegde for this question: I've got a Pc with 8GB-Ram, Nvidia GTX650Ti, I5-3450 4x 3.10 Ghz, 64-Bit. Is it possible to change the GTX650Ti to a GTX970 and the I5-3450 to a I7-4790K (4x4.0Ghz) without problems? That I only have to remove the processor and the graphic card and put in the newer ones and then my Pc is working? Sry for my English. :)
@eliemervelez3583
@eliemervelez3583 9 років тому
Make sure your power supply has enough juice. Also, that the I5-3450 and the I7-4790k have the same socket in the motherboard. thats about it
@walterhigo7658
@walterhigo7658 8 років тому
Excellent video. Very creative and explicative at the same time. This helped me a lot, thanx!
@coenraadkoster2094
@coenraadkoster2094 5 років тому
I like how he ended the video with a satisfied smile after he one-breathed did his outro...😂
@faridtitan7256
@faridtitan7256 9 років тому
I know many informations about the GPU like the name, due size, number of transistors, Technologie..... but when it comes to ROPs/TMUs !!! I have no idea what's that! and I know if there is more shaders unit its better, but what are those shaders unit ???
@TheMrMKultra
@TheMrMKultra 9 років тому
i wonder if he also wears socks in sandals while shooting techquickie
@amon7816
@amon7816 8 років тому
When I play League of legends my toaster seems to run really slow. I have a hamster running on a wheel and I whip it, how do I make it run faster to make my otter better?
@JoshuaPlays99
@JoshuaPlays99 9 років тому
Dang Linus you scared the crap out of me when you started flipping that knife haha.
@woopygoman
@woopygoman 9 років тому
You are really bad ass in this video man... 0_0
@Fantasma25
@Fantasma25 9 років тому
Actually most public key encryption algorithms (like RSA) have a really high computational complexity, so they are used only to share the keys used by other symmetric algorithms (like AES128/192/256). Those algorithms are the ones used to encrypt the actual data. You can see that in the padlock of the web browser.
@DerHirni
@DerHirni 9 років тому
Did you even read more than one article on this topic? Asymetric encryption like you explained it is usually not used to encrypt data. It's used to encrypt the session key of a symetric encryption algorithm to transfer it securely over the internet. That symetric algorithm is then used to encrypt the data.
@kelvinnguyen5130
@kelvinnguyen5130 6 років тому
“I type with a stick so that my hands don’t get ‘dirty’.”
@ModrunOfficial
@ModrunOfficial 9 років тому
ok so how can i encrypt my everythingdata? i alredy use a vpn sometimes but i rather not have my interwebs speed slowed so is there another way that wont slow my internets?
@cncrim1
@cncrim1 9 років тому
I love this channel.
@thematthewyoung
@thematthewyoung 9 років тому
wait so if the recipient sends you a public key which is some random number say 5325 and uses it as an encryption tool, how does the private key know you're public key was 5325? like how does it know that the key its using to decrypt the message is the same key that was used to encrypt it?
@arthurbirck4293
@arthurbirck4293 3 роки тому
I spend lots of time listening to your voice Linus i have now seen all of your newer vids so now i at watching the old ones
@dahorn100011
@dahorn100011 9 років тому
I remember something ironic about Lizard Squad, they were all on about privacy, but the list of people who had bought their 'lizard hack' tool the database was stored in plain text so the police were able to track emails and passwords of anyone who bought the tool
@Brandon-ob9rg
@Brandon-ob9rg 8 років тому
Shit I learn so much from these videos it's crazy!
@sectorcodec
@sectorcodec 9 років тому
Linus' photos in the beginning made my day.
@Hevletica
@Hevletica 7 років тому
Hi Linus, how can you redirect HTTPS to http? Thanks!
@miketeo4627
@miketeo4627 7 років тому
If you're visiting a website, you don't. The website should automatically redirect you to HTTPS if they have it.
@xorinzor
@xorinzor 7 років тому
wrong. For chrome there is an extension called HTTPS Everywhere which will automatically redirect you to HTTPS if the website has it enabled. I'm sure other browsers have such extensions as well.
@courtneyjones9031
@courtneyjones9031 6 років тому
xorinzor its impossible to go to http if the site has https if its set up correctly
@cjz5757
@cjz5757 6 років тому
"I TYPE WITH GLOVES SO THEY CAN'T GET MY FINGERPRINTS" LOOOOOL
@kairuihuang
@kairuihuang 9 років тому
2:31 Good one Linus XD
@gaminworld1018
@gaminworld1018 9 років тому
Would this pc play minecraft and bo2 good GT 720 2GB Intel i7 3.6GHz 12GBbof ram
@larswgjethammer6831
@larswgjethammer6831 8 років тому
Can someone tell me which gtx 980 ti is the quietest one? I am building a VERY quiet pc.
@UndeadCreeper22In1080pHD
@UndeadCreeper22In1080pHD 9 років тому
3:05 "As seen on breaking bad" lol i remember that
@reidjohnson808
@reidjohnson808 2 роки тому
Ok but how does the other computer in the email example get the key
@DBTDerpbox
@DBTDerpbox 6 років тому
Hi Linus, The server room is on fire again Just FYI I just wonder after 2 years how many joke emails he got from that.
@darshankavar5384
@darshankavar5384 6 років тому
I have a base64 script. I want to decode it into the image. How can I do it???
@marsniper27
@marsniper27 9 років тому
So what knife you flipping there? Dont get a good enough few to tell. Atleast not while watching the video on my phone..
@jayhawks300
@jayhawks300 9 років тому
Love the Christmas Story reference
@glenndbritto674
@glenndbritto674 9 років тому
Please make a video about ambient occlusion....
@luketimothy
@luketimothy 8 років тому
I enjoyed the video but I feel like you oversimplified the process a little. Public key crypto (like RSA) is usually not used in message transmission because the mathematics involved (using enormous 4096-bit numbers) is so CPU intensive, so it would really slow things down... So public key crypto is instead used to securely exchange/agree upon a secret key which can be used in a private key crypto scheme, where both parties share a single private key. Since private key crypto (such as AES) is much faster than public key crypto... SSL/TLS is not a public key crypto implementation, but rather a protocol which uses both public and private key cryptography (as well as other crypto techniques such as digital signing) to both verify the identity of each party and then securely exchange data between them.
@VisualBasic6
@VisualBasic6 9 років тому
clicked on the link in the video description, does not tell me if its dangerous to sell knives to Linus
@ArkadyVolovik
@ArkadyVolovik 9 років тому
But how can the Private Key can unlock the message if it's different from the Public key used to lock the message?
@itsokswallow
@itsokswallow 2 роки тому
Thank you I finally understand encryption very informative and I will be using mass draw thanks for the tip
@mahoihei
@mahoihei 9 років тому
Correct me if I am wrong, I think nowadays email is not encrypted unless you apply PGP yourself
@minjung4826
@minjung4826 9 років тому
The unlocking of enigma was told by the movie the Imitation Game It was a good one
@Luka-he5mr
@Luka-he5mr 3 роки тому
Is this video double sponsored? pulseway... But where is the link in the description?
@zefrinarosli1498
@zefrinarosli1498 6 років тому
i enjoy listening to this guy...
@RAZRC0
@RAZRC0 9 років тому
CYM or fnsr yvahf also, I'm pretty sure caesar made a cipher, which was in the early A.D.s.
@WyzzyMoon
@WyzzyMoon 9 років тому
"speaking of whatever I was talking about"
@brendanleach8971
@brendanleach8971 9 років тому
So what is "FAP topic ideas" doc in your google drive? Explain that in your next video pls.
@brendanleach8971
@brendanleach8971 9 років тому
***** nice profile pic :)
@BLOOWOLF4562x
@BLOOWOLF4562x 9 років тому
It's an acronym for Fast as Possible
@brendanleach8971
@brendanleach8971 9 років тому
BLOOWOLF4562 sure it is. We all know the real truth though
@DiegoBQZ
@DiegoBQZ 9 років тому
Holy fuck the PC screen capture footage finally runs at 30 fps! What was all that stuttering you had in the past when capturing it? That Mouse acceleration had the same problem and the mouse capture was...very laggy.
@GavinHohenheim
@GavinHohenheim 9 років тому
Follow-up request: Lenovo and Superfish
@UnknownXV
@UnknownXV 9 років тому
How does the recipient computer get the private key though? If the key is transmitted along with the data, couldn't the key be intercepted too? If it's not transmitted, how does the recipient computer have it?
@chris195868
@chris195868 9 років тому
The recipient only sent the public key, the one that could only encrypt, but not decrypt. The recipient also generated it's own private key to decrypt, that was never sent out. The private key is a key that can decrypt whatever the public key has encrypted. It's kinda like a some bike locks, anyone can lock it, but you need your key to unlock it.
@UnknownXV
@UnknownXV 9 років тому
Christoffer Nørskov Yeah I understand that, I don't understand how the recipient computer generates the private key though?
@chris195868
@chris195868 9 років тому
UnknownXV very advanced math, no, but honestly i wouldnt know
@HeyJD123
@HeyJD123 9 років тому
UnknownXV There's two locks. One lock only the server can unlock, and one lock only the client computer can unlock.
@UnknownXV
@UnknownXV 9 років тому
HeyJD But the key has to be transmitted to the recipient computer, or else how can the client computer lock be opened? How does the recipient computer know how to unlock it?
@featherspy
@featherspy 2 роки тому
You: as fast as possible Me: sets video to 2x anyways
@chaosjacky
@chaosjacky 9 років тому
How does the recipients private key unlock the what was locked with a public key? How does the encryption know that was the correct target and that private key is the good one?
@bman12three43
@bman12three43 9 років тому
nice christmas story reference
@javathehut3593
@javathehut3593 4 роки тому
does one private key decrypt only one message or does one private key decrypt multiple messages
@namangupta9319
@namangupta9319 5 років тому
Hey techquikie this is the half story of web encryption, after a successful public key private key connection their is a AES key exchanges in between 2 PCs and then the whole traffic is encrypts with AES encryption
@charleslane2735
@charleslane2735 6 років тому
so what your saying is that it makes harder for people what you look up on the internet?
@nexorabolis
@nexorabolis 9 років тому
Good video :) I always wondered about this
@TheBassteban
@TheBassteban 9 років тому
I know this channel has a worldwide audience but do Canadians really buy from Massdrops? I find the shipping fee really kill any deals the site could have...
@Victor_Marius
@Victor_Marius 2 роки тому
The encryption is done with the public key and decryption with the private key. Isn't possible to decrypt using the public key?
@xnamkcor
@xnamkcor 9 років тому
"Metallic tears of Sunder". True Fact.
@Elitea20
@Elitea20 4 роки тому
Man sounds like Alvin the chipmunk
@joshuamacauley1254
@joshuamacauley1254 9 років тому
He is such a good speaker
@What_was_wrong_w_jst_our_names
@What_was_wrong_w_jst_our_names 9 років тому
Wait so how does the private key unlock the encrypted data. How does it know how to unencrypt it
@supaicyboi
@supaicyboi 9 років тому
The knife flipping made me so paranoid. I drop my darts on accident and I flip out that I'm gonna stab a hole through my foot. That takes serious balls.
@AJMansfield1
@AJMansfield1 8 років тому
Except that unless you are using something special, current email DOES NOT use end-to-end public key encryption the way you suggest.
@robertkim7026
@robertkim7026 4 роки тому
Wow what an amazing job you do advertising starting from 3:49 lol didn't even notice that commin
@GavinRemme
@GavinRemme 9 років тому
Linus, you're right, I spend way to much time watching you. Wait...my math...It's due in 12 hours!
@SgtJStupid
@SgtJStupid 9 років тому
solid video.
@UntouchedWagons
@UntouchedWagons 9 років тому
An addition, what Linus described is called Asymmetric Encryption. There is also Symmetric Encryption which uses the same key to "lock" and "unlock" the data. TheMoreYouKnow.mp4
@adipramono1666
@adipramono1666 Рік тому
hey linus, this video is 7 years old. i have a question tho. Why encryption and decryption is faster on intel platform rather than AMD?
@Taylor-Hanson
@Taylor-Hanson 3 роки тому
Hey Linus thanks for doing this video. I had no idea that you would be helping teach me to get my bachelor's degree from Western Governors University. I've been a long time fan of LTT and now I'm a fan here too. :-)
@stephensnell5707
@stephensnell5707 Рік тому
I like it when Linus goes crazy
@sungminz
@sungminz 7 років тому
That voice though
@ohlife3288
@ohlife3288 7 років тому
that voice though
@ohlife3288
@ohlife3288 7 років тому
he has the voice of an angel that inhaled some helium
@wsqsite
@wsqsite 9 років тому
hashing != encryption Hashing was never meant to be reversed, it was just used in storing for authentication or verification.
How Does Individual File Encryption Work?
5:37
Techquickie
Переглядів 266 тис.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Переглядів 1,3 млн
Эта Мама Испортила Гендер-Пати 😂
00:40
Глеб Рандалайнен
Переглядів 3,1 млн
Піхотинець - про рутину на фронті
00:46
Суспільне Новини
Переглядів 521 тис.
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Переглядів 8 млн
End to End Encryption (E2EE) - Computerphile
8:12
Computerphile
Переглядів 740 тис.
Breaking Bitlocker - Bypassing the Windows Disk Encryption
9:11
stacksmashing
Переглядів 827 тис.
12 Signs Your Computer Has Been Hacked
9:32
BRIGHT SIDE
Переглядів 4,3 млн
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Переглядів 470 тис.
Deep Web & Dark Web as Fast As Possible
5:07
Techquickie
Переглядів 1,9 млн
Wi-Fi Security as Fast As Possible
5:13
Techquickie
Переглядів 316 тис.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Fireship
Переглядів 1,2 млн
Firewalls as Fast As Possible
4:42
Techquickie
Переглядів 332 тис.
Why Do Search Engines Suck Now?
8:23
Techquickie
Переглядів 233 тис.
Broken Flex Repair #technology #mobilerepair
0:50
ideal institute aligarh
Переглядів 1,4 млн
Игровой ноутбук за 100тр в МВИДЕО
0:58
KOLBIN REVIEW
Переглядів 361 тис.
Опасная флешка 🤯
0:22
FATA MORGANA
Переглядів 766 тис.