Hashing vs Encryption Differences
Вставка
- Опубліковано 1 чер 2024
- Go to StudyCoding.org to subscribe to the full list of courses and get source code for projects.
How is hashing used in computer security? Hashing can be used to verify a document or file download. Hashing can also be used to store passwords in an application without using clear text.
Information Security playlist • Information Security 1...
Web Development Security playlist • 00 Web and Database Se...
Eloquent but simple. All the hashing vids that I watched before this were so confusing. You did a wonderful job, thank you so much!
You're very welcome!
Saya manma aa dheytherey and then read this is
Mi Mi haaru haaru haaru kihineh adhives I have never ate thag saan i hope so too so too much yoh can you deliver a big big big big answers are are we gonna do you know know know know how many pounds in a business question and i i saw that you get a chance to make vanilla ice cream is a language and its
I completely agree, I watched so many videos trying to understand why SHA would even be used, and none of them answered it until I watched yours. And you had fantastic content through the whole video as well, so thank you.
This in one of the simplest and perfect explainations that i have ever seen in my life
The fact that I can listen to a programming professor for free is incredible
Loved the way you simplified everything! Great work
You earned a sub. I really love the way you explain what hashing is and even gave an example on how to use it for storing passwords. I didn't even notice that it was almost 20 minutes that I was listening to your lecture. 10/10 would recommend this channel to other people again.
I had the same thing. At first I thought that this video is veeeery long. But the end come much sooner that I had hope for. Very useful information without any stupid nonsense and intros
Great explanation, Professor Sluiter. I am studying for CISSP and this saved me a lot of time and cleared up confusion from the useless study guides. Thank you!
1:57 So we are going to ignore the subtle shade Mr Shad Sluiter pulled here against windows and mac?..xD really good video too
still...he is using mac
This is such an amazingly created video. Thanks for covering the multiple related aspects in one crisp video.
My english is not that good but i did understand almost everything. Thank you sir. Greetings from Morocco
This is a great video! Your explanation is very to the point without any fluff and presented in a way that doesn't make me wander to the next video. Thank you for the information in such a presentable way!
Really enjoyed this presentation, very clear and easy to understand. Great Job. I am subscribing!
This is my first time watching one of your videos and I loved your teaching style. Subscribed!!
This lecture is golden!!
Helped me clear a lot of basics and really understand the concepts!
Thank you professor Shad! Very thorough and easy to understand.
Very concise and crystal clear. Thank you!
I love this thorough explanation of Hashing and Encryption. This is awesome work.
Thank you so much!
This is so good. Thank you professor Sluiter!
Finally a video that explains it clearly!! Thank you!
thank you so much for a simple easy to comprehend answer with no filler. nice
Thanks for the video Professor. Very clear explanation to follow. Hashing technique was particularly useful for us in de-duplicating big data sets. Have shared it in a video.
I wish I have found this channel earlier. It's much clear and precise compared to the many hyped 'super programmer' UA-camrs.
Well laid out. Easy to understand. Your voice wasn't monotone. Thank you. Good video.
Glad you liked it! What other things are you studying lately?
Highly valuable and with great and ilustrative examples.
Thanks a lot Shad ....was simple and easy to digest.Thanks for your time.Laughed at the last joke
Thank you, your videos are very enlightening and entertaining as well as practical, I got great help from you
Clear and well explained video, the work of a professional :-) Thank you
Commendable explanation.
Thanks for sharing.
Wow! Awesome explanation sir.
Awesome video. Was totally not expecting to see judaiism/rabiis mentioned. Very cool history insight!
Thank you for all your work and even more for educating here on youtube your explanation is so good even I could understand it
Thanks so much Pr. Shad! This is a great presentation. Needless to say that I subscribe to your chanel
Awesome explanation, was always wonder what is Salting!
Amazing video, learned so much!
Thank you, the explanation was easy and valuable at the same time.
Fantastic explanation. Thank you!
Even a child can understand this .
Very well explained sir
Great explanation, Thank you very much
Amazingly well explained sir. Very grateful for it. Subscribed.
Thanks for your teaching, wonderful job!
Great explanation... Thank you very much!!!
Wow - that was fantastic! Really well presented - thanks!
very good and nicely presented content
Thank you for this. This is very helpful and easy to understand.
Superb, thank you for sharing
Great explanation, thanks sir!
Thank you very much. I enjoyed your way of explaining. Clear simple and straight to the point. Thanks again
Thank you. What kinds of things are you trying to learn?
I'm so glad I found this video. You did an incredible job explaining this.
Glad you enjoyed it! What are you studying?
simple, crisp and clear ...
subscribed...
Thanks for the sub!
Great job, useful video, simple explanation, thank you very much!
I really enjoying learning this, thank you!
Great explanations, thanks a lot!
Thank you so much for your explaination.
This was such a great explanation. Thanks!
Thank you Sir for your valuable information.
Thank you professor Sluiter
Finally understood this. Thank you Shad!
Thank you for visiting.
That video is gold, thank you!
Excellent, just excellent.
Thank you so much for this video! Enjoyed it
Awesome explanation ++++++++++++ Thank you
Great explanation....very easy language used which helps in understanding quick...thank you professor sir
You are most welcome. Thank you for coming
thank you very much for this! very helpful!
Amazing lacture. Thanks
Excellent material. Thank you!
Glad it was helpful!
This was super informativem thank you!
Excellent content and examples, definitely going to continue checking your videos professor ^^
Thank you. What kind of things are you studying?
@@shadsluiter Well, I am a Network Engineer and Linux Engineer, I am currently exploring blockchain infrastructures, cryptocurrencies and IPv6, all of them require security. Do you broadcast live via UA-cam from time to time?
Looking forward to an easy explanation on SHA algorithm!!
Quality information ..i must say...subscribed...thanks a lot!
Awesome info dude.
Thanks lots Pro you make it clear even though im not computer background
well explained video, learnt a lot ..
Thanks , very simple and easy complained 🌹
Nice video, helped me understand a lot
Awesome Awesome 🤩 . I’ve learned a lot!🤝
Hello! Thanks for the great video and explanation!
Love this channel
great explain thank you sir
Excellent. Thanks.
Great video.
Great video. A pleasure to watch.
Glad you enjoyed it! What kind of things are you currently studying?
@@shadsluiter Nothing in particular. I know about using check sums to verify a file's integrity, and I was curious how it works. You also give a lot of contextual additional information, such as what rainbow tables are and why md5 is to be avoided, which was really helpful.
brilliantly explained.. thanks a lot
Thank you. Any topics you are wanting to study?
Excelente vídeo!
very informative
Aaaaand, now I get it. THANK YOU!
the common practical way:
1) encrypt+hash+salter
2) Data send through encrypted package
3) Unencrypt the received data
4) Check on the hash and token should return valid/true.
5) do the things...
Regarding MD5, shouldn't really use it, if still insisted, must merge with add-on unique hashing algorithm to generate the only unique result.
In reality, there are still tons of systems still using the MD5 hashing basis but they modified with other unique hashing algorithm.
Thank you so much, sir, it was a great speech and very helpful
Thanks and welcome
Thank you for making this video. good presentation
My pleasure! Are you studying computer science or something similar?
wow, thank you so much. "... never see a windows or Mac ..." joke cracked me up 🤣
Thank you sir!
thank you, very good explanation 🙏
You are welcome!
Thank you Sir
Very well explained, Thanks Sir ~ ~
So nice of you. Hope to see you again.
Masterful!!
Thank you so much this is super informative and clear
Glad it was helpful! Are you learning about cyber security, bitcoin or something similar?
What is the difference between digital signature and hashing? Can be both used at the same time? Tahnk you for this very good video!
Thank you for the great video! I found it really helpful! I have one question regarding the fraud using hash function collisions. How can an attacker "take" the signature of the original document and transfer it to the document prepared for fraud if we talk about a digital signature using private/public keys?
great video, but I am also wondering the same thing.
Amazing!
Great video ! Thank you !
Glad you liked it! Are you doing this for school work?
@@shadsluiter It is just for my general knowledge, thanks again for sharing this !
Hi, how can 64 units represent all the combination of all the files and or passwords in the world? thank you
Amazing