National Security Agency encryption devices
Over-the-air rekeying (OTAR) refers to transmitting or updating encryption keys (rekeying) in secure information systems by conveying the keys via encrypted electronic communication channels ("over the air"). It is also referred to as over-the-air transfer (OTAT), or over-the-air distribution (OTAD), depending on the specific type, use, and transmission means of the key being changed. Although the acronym refers specifically to radio transmission, the technology is also employed via wire, cable, or optical fiber. As a "paperless encryption key system" OTAR was originally adopted specifically in support of high speed data communications because previously known "paperless key" systems such as supported by Diffie-Hellman key exchange, or Firefly key exchange technology (as used in the now obsolete STU-III "scrambled" telephone) were not capable of handling the high speed transmission volumes required by normal governmental/military communications traffic. Now also adopted for civilian and commercial secure voice use, especially by emergency first responders, OTAR has become not only a security technology, but a preferred basis of communications security doctrine world-wide. The term "OTAR" is now basic to the lexicon of communications security. (Wikipedia).
Installing a messaging hook through binary manipulation 1/2
Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 1/2
From playlist overige
In this video, we take a look at how you can quickly create the LaTeX logo on overleaf.
From playlist Tech Ideas
Stirling Engine with Rhombic Drive Part 1
Refurbishment of old project
From playlist STIRLING CYCLE ENGINES HOT AIR ENGINES
22C3: Covert channels in TCP/IP: attack and defense
Speaker: Steven J. Murdoch Creation and detection of IP steganography for covert channels and device fingerprinting This talk will show how idiosyncrasies in TCP/IP implementations can be used to reveal the use of several steganography schemes, and how they can be fixed. The analysis can
From playlist 22C3: Private Investigations
Installing a messaging hook through binary manipulation 2/2
Credits go out to IDEspinner, checkout his website: http://www.crackingislife.com/ clip 2/2
From playlist overige
A liquid pumpjack. The 4-bar mechanism converts continuous rotation to reciprocating rotation that the cable drive converts to reciprocating translation of a pump piston. The ball valves open and close automatically due to fluid pressure alteration in the space under the piston. When the
From playlist Mechanisms
DEFCON 18: Insecurity Engineering of Physical Security Systems: Locks Lies and Videotape 2/4
Speakers: Marc Weber Tobias, Tobias Bluzmanis, Matt Fiddler Many lock manufacturers do not understand the relationship and intersection between "mechanical engineering" and "security engineering" in their products. Typically, design engineers are fairly adept at making things work prope
From playlist DEFCON 18-2
Please Do Not Duplicate Attacking the Knox Box
Knox Boxes, along with other rapid entry systems are increasing in popularity, as they allow first responders such as police, fire, and paramedics to quickly gain access to a building in the event of an emergency without having to force entry. These devices rely on the security and key con
From playlist Security
IDEspinner Buffer Overflows pt1
This movie tries to show how you can create a bufferoverflow Credits go out to IDEspinner
From playlist Buffer overflow
Electromagnetic induction and Antigravity!!!
Physics demonstrations (la physique)!!!
From playlist physics
Salesforce Tutorial - Importing data
Learn the process of migrating data into Salesforce. Explore more Salesforce courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/crm-software?trk=sme-youtube_M141136-08-01_learning&src=yt-other This is an excerpt from "Salesforce for Marketers,"
From playlist Salesforce
DevOpsDays Boston 2017- Iterative Security... by Tom McLaughlin
DevOpsDays Boston 2017- Iterative Security: Security when you're not ready for the difficult stuff by Tom McLaughlin Many of the poor security stances we see are the result of security paralysis. We’re presented with two options, being insecure or being secure, with little understanding o
From playlist DevOpsDays Boston 2017
DEFCON 18: Attack the Key Own the Lock 4/4
Speakers: Schuyler Towne, datagram Locks restrict access to anyone lacking the correct key. As security components, we depend on locks to secure our most valuable possessions. Most attacks demonstrated in recent years involve manipulation of the lock components with special picking too
From playlist DEFCON 18-2
Double Dwell Reciprocating 3D Model
Based on a video from https://www.youtube.com/user/thang010146. This user has hundreds of amazing videos with mechanisms. This one can be seen here: https://www.youtube.com/watch?v=8h9mjKA5SjQ. Free 3D model at https://skfb.ly/onUTn.
From playlist Mechanisms
Activation Functions - EXPLAINED!
We start with the whats/whys/hows. Then delve into details (math) with examples. Follow me on M E D I U M: https://towardsdatascience.com/likelihood-probability-and-the-math-you-should-know-9bf66db5241b REFERENCES [1] Amazing discussion on the "dying relu problem": https://www.quora.com
From playlist Deep Learning 101
NOTACON 5: Lock Picking into the New Frontier: From Mechanical to Electronic Locks
Speaker: dosman We will start with a brief introduction to demonstrated lock picking fundamentals moving quickly towards how more advanced mechanical locks operate. Several high security cutaway locks will be shown with their additional security features explained in full view. We will th
From playlist Notacon 5
Yield to Maturity: Brief explanation (FRM T3-10b)
In case this is more helpful, I recorded a SHORTER version (trying to cut to the chase) of my previous video's explanation of bond yield (aka, yield to maturity). I make the the same four (4) points about how to interpret that yield. Discuss this video here in our FRM forum: https://trtl.b
From playlist Financial Markets and Products: Intro to Derivatives (FRM Topic 3, Hull Ch 1-7)
Samsung Galaxy S5 customization - set up lock screen
In this video we teach you how to set up the Samsung Galaxy S5 lock screen to provide some security for your phone.
From playlist Technology
Yield to Maturity Interpretations (FRM T3-10)
[my xls is here https://trtl.bz/2HifflO] Superficially, the yield to maturity (YTM, aka yield) simply inverts the usual time value of money (TVM) inputs by solving for the yield as a function of four inputs: face (future) value, coupon (payment), maturity (time), and current price (present
From playlist Financial Markets and Products: Intro to Derivatives (FRM Topic 3, Hull Ch 1-7)