In cryptography, a keyring stores known encryption keys (and, in some cases, passwords). For example, GNU Privacy Guard makes use of keyrings. (Wikipedia).
An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org
From playlist Cryptography
Symmetric Key Cryptography: The Keyword Cipher
This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene
From playlist Cryptography
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct
From playlist Blockchain
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct
From playlist Blockchain
Primality (1 of 2: Fermat's Test)
From playlist Cryptography
Live CEOing Ep 255: Security-Related Functions in Wolfram Language
Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about Security-Related Functions in the Wolfram Language.
From playlist Behind the Scenes in Real-Life Software Design
Kernel Recipes 2017 - Modern Key Management with GPG - Werner Koch
Although GnuPG 2 has been around for nearly 15 years, the old 1.4 version was still in wide use. With Debian and others making 2.1 the default, many interesting things can now be done. In this talk he will explain the advantages of modern key algorithms, like ed25519, and why gpg relaxed s
From playlist Kernel Recipes 2017
Introduction - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Correctness And Security - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Live CEOing Ep 82: Long-term Design Decisions for Wolfram Language
Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about Long-term Design Decisions in the Wolfram Language.
From playlist Behind the Scenes in Real-Life Software Design
Dreambooth Vs Embeddings - who will win?
Stable Diffusion. It has a lot of things going for it, but how do some of these things compare? Dreambooth SD? Textual Inversion? Dreambooth Diffusers? Which is better? What does better even mean anyway? All these questions and more are answered right here, right now... Dreambooth Diffuse
From playlist Popular Videos
Garage - Genie Garage Remote Battery Replacement
A Quick Tutorial! Music: http://www.bensound.com/royalty-free-music
From playlist Animal Videos
Kernel Recipes 2018 - TPM enabling the Crypto Ecosystem for enhanced Security - James Bottomley
For decades, all laptops have come with a TPM. Now with Microsoft forcing the transition to the next generation, Linux faces a challenge in that all the previous TPM 1.2 tools don’t work with 2.0. Having to create new tools for TPM 2.0 also provides the opportunity to integrate the TPM
From playlist Kernel Recipes 2018
Inspiring science books of 2017 with Brian Cox
Join Professor Brian Cox as we look at the best science writing of 2017, and announce this year’s winning book. Explore the shortlist from the Royal Society Insight Investment Science Book Prize and discover the most inspirational popular science books and authors of the year. Selected
From playlist Latest talks and lectures
DEFCON 18: Black Ops Of Fundamental Defense: Web Edition 4/4
Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all th
From playlist DEFCON 18-1
Black Hat USA 2010: Black Ops of Fundamental Defense: Web Edition 5/6
Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all thei
From playlist BH USA 2010 - INFRASTRUCTURE
This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis
From playlist Cryptography and Coding Theory
22C3: Breaking Down the Web of Trust
Speaker: Seth Hardy Even with tutorials on the WoT and good trust policies the concept of "trust" can still be hard to grasp. Here we'll look at trust metrics, ways of using current trust systems better, and some non-crypto applications of trust. For more information visit: http://bit.ly
From playlist 22C3: Private Investigations