1. simple key technique

    02:25

    from Jerry Whiting / Added

    5 Plays / / 0 Comments

    Easy ways to make weak passwords stronger by using key lengthening. Use a dollar bill with keys, salts, and nonces.

    + More details
    • Verivo Software and Good Dynamics

      02:02

      from Verivo Software / Added

      809 Plays / / 0 Comments

      An overview of the enterprise level of security with the joint Verivo and Good Dynamics offering.

      + More details
      • Socket.IO on PubNub - Encryption

        04:20

        from PubNub / Added

        946 Plays / / 0 Comments

        Encrypt your data from client-to-client using Stanford AES Encryption. This is different from SSL because the message you transmit is unreadable to everyone unless they have a PASSWORD…

        + More details
        • Don't Share Drives! English subtitles

          02:53

          from Tibet Action Institute / Added

          33 Plays / / 0 Comments

          གློག་ཀླད་འདྲ་མིན་གྱི་དབར་ལ། ཐེབ་འཇུག་བེད་སྤྱོད་གཏོང་བ་དེས་དྲ་འབུ་ཁྱབ་བརྡལ་གཏོང་གི་ཡོད། དེ་ལྟར་མི་བྱེད་པར།དེའི་ཚབ་ལ། Dropbox.com དང་ Ge.tt ཡང་ན། GoogleDocs སོགས་བེད་སྤྱོད་ཐོངས། Sharing flash drives…

          + More details
          • gKrypt Demo

            02:06

            from Jawad Masood / Added

            846 Plays / / 0 Comments

            gkrypt is the easiest and fastest way to protect your files. It uses state-of-the-art military grade encryption. Once the files are protected by gKrypt, no one can decode them without…

            + More details
            • Keep Your Enemies OUT of Your Inbox! English subtitles

              02:40

              from Tibet Action Institute / Added

              41 Plays / / 0 Comments

              སོ་སོའི་དགྲ་བོ་ཡིག་སྒམ་གྱི་ཕྱི་ལ་བསྐྲོད། ཁྱེད་ཀྱི་གློག་འཕྲིན་དེ་བདེ་འཇགས་དང་ཉེན་སྲུང་། སྒེར་གནས་ཡོད་ཆེད། གློག་འཕྲིན་ཁ་བྱང་ Gmail ལྟ་བུ་བེད་སྤྱོད་ཐོངས། Switch to an email provider like Gmail –…

              + More details
              • Computer Security 101, part 1

                31:05

                from Jerry Whiting / Added

                7 Plays / / 0 Comments

                An overview of computer security including risk analysis, traffic analysis, password generation, and key managment.

                + More details
                • Xoom File

                  03:18

                  from Plus Associates / Added

                  836 Plays / / 0 Comments

                  A Safe Way to Send Large Files

                  + More details
                  • Cracking hashed passwords with John the Ripper and UNIQPASS

                    03:56

                    from Aselya / Added

                    285 Plays / / 0 Comments

                    This video shows John the Ripper (http://www.openwall.com/john/) dictionary attack in action. I use the password list from http://dazzlepod.com/site_media/txt/passwords.txt (1.7 million entries) and…

                    + More details
                    • MD5 SHA1 SHA256 encryption decryption online secure messaging

                      00:56

                      from CRYPT SECURITY / Added

                      607 Plays / / 1 Comment

                      NEW ADRESS : WWW.CRYPT-SECURITY.NET WWW.CRYPT-SECURITY.NET MD5, SHA1, SHA2 (SHA256, SHA384, SHA512,..) Encryption Decryption Online !!! Secure Messages or Email Haval, Ripemd,…

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."