hash
Strong vs. Weak Encryption – CompTIA Security+ SY0-401: 6.2
Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.
Strong vs. Weak Encryption – CompTIA Security+ SY0-401: 6.2 Read More »
Password Attacks – CompTIA Security+ SY0-401: 3.2
The bad guys don’t need to know your password; they’ll figure it out themselves. In this video, you’ll learn the techniques that the bad guys use to reverse-engineer your password.
Password Attacks – CompTIA Security+ SY0-401: 3.2 Read More »
Taking Hashes – CompTIA Security+ SY0-401: 2.4
How can you tell if a digital file on a piece of storage media has been altered? In this video, you’ll learn about hashing, and I’ll demonstrate how to compare hashes with a file that has been altered.
Introduction to User Authentication – CompTIA Network+ N10-005: 5.3
We use authentication techniques many times a day to provide access to important resources. In this video, you’ll learn about user authentication and hash techniques that keep our passwords private.
Introduction to User Authentication – CompTIA Network+ N10-005: 5.3 Read More »