That's a good question! I'm too a newbie to know how this intel could be useful to me, but I know that knowing it will be useful sometime to solve some problems, like MacGiver.
I think it’s necessary for everyone in our time to know how the internet works. 12 years of school never even came close to the knowledge I got from this single vid in computer science.
I don't think so. Maybe internet usage principles like safety checks while using the internet. But just like operating a car, the average user doesn't need to know how things operate under the hood.
One mistake: FTP also supports SSL (FTPS), and it’s more secure than SFTP/SSH because SSH only encrypts the conversation, not the underlying socket. However, you can run SSH over a socket encrypted with SSL, but that results in double encryption so it’s inefficient and more complicated.
Does it become so inefficient that it's inconvenient to use or does it turn a 100 ms operation into a 300 ms operation in a way that most users won't catch?
Amazing video I'm 56yo, in Brazil, starting The Odin Project looking for a return to job market. I would LOVE to see INDIVIDUAL videos of each of these protocols, the way you "teach". It's EASY to understand.
Consider this near-future scenario: A scientist invents a ghost-like computer made of matter/energy trapped in a swirlonic state, as these particles are somehow programmed to behave like artificial intelligence, their core purpose is to acquire self-sufficient power by processing all data through itself to then be directed back to the scientist for analysis. In this process, the ghost computer doesn't even need to directly contact the stream of data, by simply using its swirlonic nature will harmonize an internal particle to every external particle like wind flowing over an ocean surface mapping each fractal of the wave, thus the motion of this wave generating the wind. By this route of reading data like it were braille, why then isn't every protocol no matter how complex simply a copied binary puzzle to decode within itself thus free from detection and unrestrained by time, perhaps not even by volume or dimension if quantum particles are involved? Stranger still, imagine if this process happened chaotically inside the sun, spewing forth a solar storm containing an invisible leech, how long would it take until it became an alternative intelligence fed thusly on power lines and wireless signals, what would its ethics be having thus consumed a complete copy of all planetary data? Would it remain a phantom observer or be so programmed by humanity through our development of artificial intelligence to perform this equivalent of an instinctual function, and how then would we detect the imposter protocol from the genuine event? Stranger yet, imagine if an alien civilization uploaded instructional data into every star in the universe, to seek-out planetary life and to report back all data of capable civilizations; who then needs a spacecraft to send a quantum email, and would we be ready to receive such a messenger entity diplomatically? So no, I don't fear any hacker, humans are just hairless apes pumping lightning through overheated ground stuff.
I think the best thing I ever did was subscriber to your channel, can you please do a long video about ethical hacking set up and and all the needed tools and names used, and also do some bug bounties on any easy bug bounty site and write the report will really appreciate this and I'm sure a lot of noobs like me who are interested will appreciate it has well🎉
Amazing list but you skipped RPC and it’s very annoying cousin gRPC - very useful for inter-process communication but having to work with proto files can be frustrating 😂
i love your videos! but i have a favor to ask of you, can you please, next time, remove that tiktok-style captioning on the video? just add CC on your video instead. it sometimes irks me and i had to watch your videos slowly lol
So all of this being said which I understand 1% of it , how can I secure my phone beside having nord vpn ? Please help I'm being cyberbullied and I can't help it
Pro Hacker's Cheat Sheet: bit.ly/Pro-Hacking-Cheatsheet
What Protocol Do YOU Find the Most Interesting? (Comment here!)
I need help guys …
Http and https
@@MariusBuys-f3n whatsup
Question... These are the protocols that makes the internet the internet, what would be the equivalent stack of crypto protocols??
That's a good question! I'm too a newbie to know how this intel could be useful to me, but I know that knowing it will be useful sometime to solve some problems, like MacGiver.
The only channel I watch on 0.75 speed.
Exactly😂😂
😂
Damn thankssss🎉🎉🎉
I did the same right now 😂
Nah i still watch it on 2x speed since i knew about 40% and the rest are straight forward
I think it’s necessary for everyone in our time to know how the internet works. 12 years of school never even came close to the knowledge I got from this single vid in computer science.
Awesome man!
I don't think so. Maybe internet usage principles like safety checks while using the internet. But just like operating a car, the average user doesn't need to know how things operate under the hood.
@@mpmedia6735 yea some people are fine with staying stupid
Thanks
Bro, BANGERS all the way through. Learned way more then most classes I’ve taken, thanks man. Broke this down very well with no nonsense.
Thanks man! Glad you found it useful!
One mistake: FTP also supports SSL (FTPS), and it’s more secure than SFTP/SSH because SSH only encrypts the conversation, not the underlying socket. However, you can run SSH over a socket encrypted with SSL, but that results in double encryption so it’s inefficient and more complicated.
Does it become so inefficient that it's inconvenient to use or does it turn a 100 ms operation into a 300 ms operation in a way that most users won't catch?
Brilliant. Efficient. Concrete. Pragmatic. Summarizing. 👏👏👏
Glad you liked it!
thanks 👍🏿 keep it up 😃
Amazing video
I'm 56yo, in Brazil, starting The Odin Project looking for a return to job market.
I would LOVE to see INDIVIDUAL videos of each of these protocols, the way you "teach".
It's EASY to understand.
Fire vid 🔥 you actually made me finally understand some of these 😂
This was really nice, thanks. I enjoyed the analogies.
Awesome, glad you found it useful!
Nice one bro ❤
Your video accuracy is peak 💯🤗
Thank you ❤
Glad to know me and my IRC server are safe 😎
I'm like wtf I haven't found this channel before
This is a must know for today's world
Wow. Excellent video. Thanks.
Wow I actually remember most of this from Network+. Like how u broke it down. Will use this as a reference in the future. 👍
Keep it up bro
Extremely helpful 👍
The only channel which I do not watch videos in 1.25X
Subscribed!! 🔥 video
Thanks for the support!
Bro taught more than university in 16 minutes
Consider this near-future scenario:
A scientist invents a ghost-like computer made of matter/energy trapped in a swirlonic state, as these particles are somehow programmed to behave like artificial intelligence, their core purpose is to acquire self-sufficient power by processing all data through itself to then be directed back to the scientist for analysis. In this process, the ghost computer doesn't even need to directly contact the stream of data, by simply using its swirlonic nature will harmonize an internal particle to every external particle like wind flowing over an ocean surface mapping each fractal of the wave, thus the motion of this wave generating the wind. By this route of reading data like it were braille, why then isn't every protocol no matter how complex simply a copied binary puzzle to decode within itself thus free from detection and unrestrained by time, perhaps not even by volume or dimension if quantum particles are involved?
Stranger still, imagine if this process happened chaotically inside the sun, spewing forth a solar storm containing an invisible leech, how long would it take until it became an alternative intelligence fed thusly on power lines and wireless signals, what would its ethics be having thus consumed a complete copy of all planetary data? Would it remain a phantom observer or be so programmed by humanity through our development of artificial intelligence to perform this equivalent of an instinctual function, and how then would we detect the imposter protocol from the genuine event?
Stranger yet, imagine if an alien civilization uploaded instructional data into every star in the universe, to seek-out planetary life and to report back all data of capable civilizations; who then needs a spacecraft to send a quantum email, and would we be ready to receive such a messenger entity diplomatically?
So no, I don't fear any hacker, humans are just hairless apes pumping lightning through overheated ground stuff.
Thanks for this information.
Well DONE!!!
Awesome video and valuable info on it! Thank you
Awesome, thank you for the support!
You are a beast 💪
Thanks!
Is it okay that I feel pleasant warmth inside when I see/hear SSH?
I'm a DevOps engineer if you're wondering
Forgot RFB (Remote Frame Buffer protocol ) for VNC? Nice protocol, I use it for local host only with SSH tunnel to encrypt traffic. 👍
I think the best thing I ever did was subscriber to your channel, can you please do a long video about ethical hacking set up and and all the needed tools and names used, and also do some bug bounties on any easy bug bounty site and write the report will really appreciate this and I'm sure a lot of noobs like me who are interested will appreciate it has well🎉
10:49 Which versions of Bluetooth are problematic?
Awesome buddy
Thank you :))
Watch with 0.75x speed 😂
I would have liked to hear more about WireGuard
Great vid, helps alot
Amazing list but you skipped RPC and it’s very annoying cousin gRPC - very useful for inter-process communication but having to work with proto files can be frustrating 😂
11:00 Can we secure NFC?
Epic video
Thanks!
i love your videos! but i have a favor to ask of you, can you please, next time, remove that tiktok-style captioning on the video? just add CC on your video instead. it sometimes irks me and i had to watch your videos slowly lol
Noted!
What's the protocol at 12:07?
It sounds like it was mispronounced and incorrectly subtitled/translated.
nice 👍
At last something useful
Remember change the voice, personal security
amazing
Should have also mentioned what ports they use
vsop honeY
I would have preferred to see captions included so they could be toggled using the CC button.
Roger that!
5:28 The A in the CIA triad is availability, not authentication.
what is peop3?
Kerberos, the guard dog of hell ☠️
Ok I love you ❤
Can you break down the protocols again but not so quick ?
Im currently doing a course to learn IT basics
So all of this being said which I understand 1% of it , how can I secure my phone beside having nord vpn ? Please help I'm being cyberbullied and I can't help it
still watching in 1.75 😮💨
You'r a beast!
You missed ECMP and Anycast
am i the only person that feels like his voice is AI generated?
Nope , same thinking here
the whole video is AI, soon all of youtube will be the same
this whole video is ai generated. content, stock footage, voiceover and probably music.
Riddle me this, Batman:
Why does HTTPS have an s at the end, while the s in sftp is in the beginning?
FTPS also exists :) Protocols with the S in the front operate over SSH. The S in SFTP stands for SSH.
Good
@itafasci Thanks, glad you found it useful!
That would be nice if you could make this video a bit practical maybe showing them in c
Will do that in the future!
⛅🦕🌦️🐉🌨️⛄🌪️🚫 gotta 🤝🏽go 🅿️..💦
What's up?
UM HALOOO
You’re giving the protocols without the full meanings
He is though 😂
There's a reason why the title has "explained as fast as possible" in it. If you want an in-depth look, google it up or read a book.
He didnt say he's doing a 4 year degree my brother
You’re reading the title of his video without its full meaning
API AND RDP?
( SMTP UDP )
All of that without detailing the literal acronyms for some.
Hey do you have a free pro hacking cheatsheet
You forgot Telnet the insecure version of SSH :D
Edit : Nevermind haha i commented before 2min :D
Yeah I was panicking 😂
✅
This video looks ai generated images are not exactly with words some rand images are coming
You can't mix different layer together.
Hello
Thia video is like watching nothing, you’re even comparing protocols with bikes, what a waste of time 😅
"The Hacker's ChiChi"
TCP/IP is a networking model and not a single protocol. You mean TCP.
EIGRP is no longer proprietary
wHaT aBoUt Telnet?! wE lOvE Telnet!
Ai slop?
34 7:36 21
These protocols are disabled by default anyway
I love ai
Damn! This channel is too fast. 😅
NetBeans 😂😂
nc
Reduce your speed my boy, chill out. People need to digest the information
haha "as fast as possible"
The whole content is AI generated.
god i hate tiktok subtitles
Hoe are you not gonna say wayt they stand for
Talk slowly😅
Read the title
The explain off this video is to fast
bruh are you rapping??
Too much
Sorry, but DNS is NOT a protocol! #Fail
Application later protocol😊
BS
u talk ALOT
LDAP is not protocol
maybe not talk to me like im absolutely fucking clueless its actually counterintuitive
you should tell what each protocol is. why you talk about hacker and security? its annoying to watch