i guess im asking randomly but does anyone know of a method to get back into an Instagram account? I was dumb lost my password. I appreciate any tricks you can offer me.
@Braxton Jakob Thanks for your reply. I found the site thru google and Im waiting for the hacking stuff now. Seems to take quite some time so I will reply here later when my account password hopefully is recovered.
I really want to appreciate admin or learn engineering team for easy explanations with good example... To learn this encrypt method my lecture took 3 classes...
Very simple explanation , thanks Learn Engineering. I had read about this twice and got confusion about private key and session key, this is more insightful.
encryption ( and those keys and signature) is very hard to understand at first and confusing after that if you don't have to work with it daily. As a normal software developer who study these things since 2005 but have been struggling to forget how they work. This video would help new comers alot and even "pro" like me
Man this video give clear insight about encryption, for more depth you have to go through wire shark/ packet tracer- where you can actually see private/public key certificates being exchanged in real-time
Great video. The only thing I don't get is at 5:30 how (26)^7 mod 33=104. This is impossible since 104 is greater than 33 and the mod operation only gives the remainder of any number when divided by 33. Shouldn't that be 5? How does one arrive at 104 by decryption? Appreciated
In session key symmetric encryption, how are sessions keys transferred safely? What encryption mechanisms are used to make sure the session key is not stolen?
We need translation because your programs are very fun and very useful. I went to Google and translated my words to hear him you channel owner. Your channel is very useful and I love it a lot ... and I hope you translate it for us always we suffer a lot of translation. Even if we translate it does not lead to the right information you want. I repeat my thanks to you, our able teacher
Good video, however , it presented whatsapp as an encrypted communications app, and it's not a good idea to present it as such. Because they don't encrypt your chats if you upload them to G.drive , and also, photos or videos are never encrypted, Neither on normal chatting nor when backuping . That's why it says "messages" are encrypted (referring to only text msgs.) instead of showing "this chat or conversation is encrypted". I understand the backup part is optional, but the photo&video thing is a dangerous one, and they kinda of mislead the users. It's just good to know what they avoid telling.
I have few questions: 1. What keeps someone from creating a list of factors for prime numbers and by that way making it quicker to figure out later? 2. How is the first private key tranfered without giving anybody a change to steal it?
Great explanations! I really enjoyed remembering all this stuff I did in college. However, I'm kind of disappointed that you didn't say that messages can be both signed and encrypted. I guess that would be a bit too much for someone who's not in the matter. Anyway, great video, thanks for making it. Cheers.
Yeah . Thank you for sharing knowledge of encryption and decryption. Can any one explain me in detail about symmetric encryption with advanced encryption standard?
Hello good morning sir.ur video is very clear and it helped me a lot.currently iam working on a project dna cryptography so in that ism facing small problem how can i connect mealy machine to the cryptography..can u help me in this sir?
📡 SMART SATILEET GESTION A DISTANCE IF A PALLET IN EMPLACEMENT IN P7 YOU HAVE THE POSIBILITY TO GETTING TPE BY ANY MOUVEMENT IS TFS SUPPORT TO ANOTHER SUPPORT INFORMATIQUEMENT AND AFTER CONFIRMED THE PROCESS IN PHYSICAL CONDITION
Hi Orton - In real digital encryption, the user creates their own public/private key pair and shares the public key with whomever they want to receive encrypted messages from. In order to "hack" them, you would have to compromise the device they are storing their private key on.
1:15 I would add however that the person who installed the router could produce a Man in the Middle attack by making the router/DNS route the request to a fake copy of it, and make you think that you are connected to the real one while in reality you are not. Using HTTPS websites prevents this thanks to digital signature.
We truly appreciate your support at www.patreon.com/LearnEngineering . Even a $1 support can give us a big boost.
i guess im asking randomly but does anyone know of a method to get back into an Instagram account?
I was dumb lost my password. I appreciate any tricks you can offer me.
@Christopher Marcelo Instablaster ;)
@Braxton Jakob Thanks for your reply. I found the site thru google and Im waiting for the hacking stuff now.
Seems to take quite some time so I will reply here later when my account password hopefully is recovered.
@Braxton Jakob it did the trick and I now got access to my account again. I am so happy!
Thanks so much you saved my account!
@Christopher Marcelo you are welcome :)
I'm a software engineer and I can say that this really complicated concept is really well explained. Good job Learn engineer!
I am glad to know that a computer engineering finds our video helpful :)
The complicated concept of encryption explained in the most simplified manner.Brilliant work !
Thanks learn engineering and thankyou Sabin..
What a marvellous explanation guy's. I have been struggling to understand this concept since last 10years. This explanation is a gem.
I really want to appreciate admin or learn engineering team for easy explanations with good example...
To learn this encrypt method my lecture took 3 classes...
Very simple explanation , thanks Learn Engineering. I had read about this twice and got confusion about private key and session key, this is more insightful.
encryption ( and those keys and signature) is very hard to understand at first and confusing after that if you don't have to work with it daily. As a normal software developer who study these things since 2005 but have been struggling to forget how they work. This video would help new comers alot and even "pro" like me
Thank you for these little videos. They really add up in engineering knowledge and principles!
Man this video give clear insight about encryption, for more depth you have to go through wire shark/ packet tracer- where you can actually see private/public key certificates being exchanged in real-time
Very knowledgeable video. Thanks to Learn Engineering.
Everyone Like and share the video.
Sir, We need more networking related videos in animation.
Aise videos se hard topic bhi Asani se clear ho jate hai.
🤗🤗🤗🤗🤗🤗🤗🤗🤗🤗
Love this! Explain 5G / millimeter wave and massive MIMO!
Thanks That Was Difficult
Great video. The only thing I don't get is at 5:30 how (26)^7 mod 33=104. This is impossible since 104 is greater than 33 and the mod operation only gives the remainder of any number when divided by 33. Shouldn't that be 5? How does one arrive at 104 by decryption? Appreciated
Im a young Electronics Expert I'm Finding A Best Way Of Encryption So I Can Understand It Well Thank's To Technology :)
In session key symmetric encryption, how are sessions keys transferred safely? What encryption mechanisms are used to make sure the session key is not stolen?
Two videos in one day. Your channel is the best
We need translation because your programs are very fun and very useful. I went to Google and translated my words to hear him you channel owner. Your channel is very useful and I love it a lot ... and I hope you translate it for us always we suffer a lot of translation. Even if we translate it does not lead to the right information you want. I repeat my thanks to you, our able teacher
You can enable UA-cam's auto-generated subtitles, but they are not perfect.
@@Gonza-lh2vo
do not know how ... Overall thank you very much
😃Excellent channel with Excellent explanation 😃
I couldn't understand this concept any better than after watching this video.
Good video, however , it presented whatsapp as an encrypted communications app, and it's not a good idea to present it as such. Because they don't encrypt your chats if you upload them to G.drive , and also, photos or videos are never encrypted, Neither on normal chatting nor when backuping . That's why it says "messages" are encrypted (referring to only text msgs.) instead of showing "this chat or conversation is encrypted". I understand the backup part is optional, but the photo&video thing is a dangerous one, and they kinda of mislead the users. It's just good to know what they avoid telling.
clear understanding with super simple visualization very good
This is a good introduction to encryption used for web communications. Cheers, Russ
So well explained!
Clear explanation of public key, private key, KDC, Symmetric, Asymmetric
I have few questions:
1. What keeps someone from creating a list of factors for prime numbers and by that way making it quicker to figure out later?
2. How is the first private key tranfered without giving anybody a change to steal it?
keeping a list of prime numbers will accelerate our brute force work and thats fine .
Anyone has some answer about 2nd question ?
What a brilliant video!!
Thank you for making it so simple to understand!
Your channel always have something to learn
3:16 That's counter intuitive! How can a key that can close a lock not open it, while another one exactly similar to it can?
Great. Really great....presentation...
Click here for india punjabi sex movie HD 2016 FREE DOWNLOAD 👏👏 भारत पंजाबी सेक्स मूवी मुफ्त डाउनलोड
What keeps someone from creating a list of factors for large prime numbers, thus making it quicker to figure out later?
What if a government can get the encryption key?
C h I n a
Thanks a lot and best explanation
Your videos are the best
we really can't assume that the KDC doesn't decrypt our data while on transit but i feel great to have learned a lot in this explanation.
I am from Bihar India
And watch to luv your videos I am not engineer or college student .
Please make a video about formula1 cars.Your videos on automobile engineering were amazing
Awesome explanation👌👌👌
Excellent Explanation😊👍👍
What a wonderful explanation
I'm a 8th grade student was always thinking why we need to find factors in linear equations well now I got why it is a very imp thing
Bro, can u tell me what is graphics tool used by you
Sir your videos are always awesome
At 4:06 you show 33 and 3; was that second 3 a typo and supposed to have been -33?
*Wow!* 2 videos a day!
You're really a hard worker
Thank for the clear and simple ideas you shared. the best one
8:14 this confidential message is
"Hi"
Amazing video!!
الله يعطيك الصحة 🌹👍🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺
New find the channel of creatin' great contents 👌
The motercycle delivery guy has a very big head! It might be from storing all the data keys like the NSA.
I would store the keys in my ass
we could store the keys in the bra used by the huge breasted woman that is normally in the videos on this channel
@@An.Individual I wonder what happened to that sexy redhead girl, she doesn´t appear anymore
That delivery guy be like "yo, wtf, I do not have the whole day"
Great information 👍 thanks.
Can you please explain how the emails works?
You secured the so much time of someone's to found all that things.
please make a video about how volte works
sir from long time you havent made a video for mechanical engineering related,, so please make some,,,by the way this video is awesome
Great explanations! I really enjoyed remembering all this stuff I did in college. However, I'm kind of disappointed that you didn't say that messages can be both signed and encrypted. I guess that would be a bit too much for someone who's not in the matter. Anyway, great video, thanks for making it. Cheers.
Pls make video on Electric Vehicles Manufacturing
Good job guys!!!!!!!
Awesome video, i learnd a lot. Hugs from colombia
Yeah . Thank you for sharing knowledge of encryption and decryption. Can any one explain me in detail about symmetric encryption with advanced encryption standard?
Its very helpfull
Hello good morning sir.ur video is very clear and it helped me a lot.currently iam working on a project dna cryptography so in that ism facing small problem how can i connect mealy machine to the cryptography..can u help me in this sir?
You said the access point provider cannot see what we are looking at but then you said they can see that we have accessed a website? I am confused.
In senior secondary school this video helpful for me to understanding the modern physics with computer science
But if the key is sent as the first message and someone intercepts it, then he can view all of the following messages. How is this prevented?
Please make a video on how a combustion chamber works in rockets? 🙏🙏
Are you using blender for these animations. I just saw in that laptop in the animation 😊
Yah, got it right :) We are using Blender
But public keys cant open the lock. They could only be used to lock. then how did it open at the end of video
hi sir. Your teaching technique is very good .. please make video's on networking.ccna
Wow... thanks 👍
I watch many video of your channel. I really empress your voice. Please tell which software are use for voice. Thanks.
My favourite ❤️ animation
Thank You 😊
This was great . !
We need a video about SSO - Single Sign on
Amazing explanation
please making video internet protocols and circuit switching and packet switching
Guys how to create animation like this ? Which software to use?
Can someone please tell me how this animations are done on this channel? Which software?
More precisely the mechanical one the gear and car ones....
hey do this channel have any video on cloud computing infrastructure
Very good explanation.... 😎👍. Could you give me a hint which software do you use for these animations?
blender
Awesome video
👌👌👌Sir,pls make videos about Electronics and commutation engineering topics
Which software is used to make such videos?
📡 SMART SATILEET GESTION A DISTANCE
IF A PALLET IN EMPLACEMENT IN P7
YOU HAVE THE POSIBILITY TO GETTING TPE BY ANY MOUVEMENT IS TFS SUPPORT TO ANOTHER SUPPORT INFORMATIQUEMENT AND AFTER CONFIRMED THE PROCESS IN PHYSICAL CONDITION
and who is the key maker???. can he be easily hacked???
Hi Orton - In real digital encryption, the user creates their own public/private key pair and shares the public key with whomever they want to receive encrypted messages from. In order to "hack" them, you would have to compromise the device they are storing their private key on.
I was watching this and those numbers just broke my brain
Dude how regulating governors are function in the automobile plz put the video for that......
👏👏👏
1:15 I would add however that the person who installed the router could produce a Man in the Middle attack by making the router/DNS route the request to a fake copy of it, and make you think that you are connected to the real one while in reality you are not.
Using HTTPS websites prevents this thanks to digital signature.
Please make a video on IC in detail
PLEASE HOW DOES DATA WORK PLEASE...?
I WANT TO KNOW , MANY PEOPLES WANT TO KNWO HOW DOES DATA WORK?🙏🙏🙏 PLEASE EXPLAIN..IT
What do you mean exactly
@@sal_strazzullo How does Data Work ( Mb)
Muryar Hausa24 Online Media mb is a measure of storage. 100mb is 1 gb
@@Nikkk6969 This is not what i mean..
How the DATA (MB) working on our Mobile Phone/Computer?
need computer network series
I like your new graphics
But what if, as the thief, when Nina ask for Alex private key, I make her think I'm the KDC and send my public key to her?
No one
literally no one
.
.
.
That man on scooter : Aa shit here we go again
Would have upvoted your comment if you hadn't written that cringey "literally no one" line.
These jokes are played out dude.
Hello,
how can i made an animation like your excellent video!!!
If anybody know which editing app this is plss tell me??
I maked a program, that can divide a number to prime numbers (it is a very simple program) but it is very slow at high numbers.