Ryan Riley
Ryan Riley
  • 47
  • 309 697
15-112 CMU-Qatar Term Project Montage, Fall 2024
Video clips from the term projects from 15-112, Fall 2024 at Carnegie Mellon University in Qatar.
Music by: Bensound.com/free-music-for-videos
Artist: TURNIQUE
License code: ROQ8AKE2L54GOBA5
Music by Bensound.com/free-music-for-videos
Artist: Nick Petrov
License code: ZKA6TDGQL4SJOEIO
Music by: www.bensound.com
Artist: Roman Senyk
License code: SPJ37UO1FALMBHVF
มุมมอง: 99

วีดีโอ

15-121 Fall 2024: Graph Algorithms
มุมมอง 109หลายเดือนก่อน
This is a brief introduction to graph algorithms: Prim's, Kruskal's, and Dijkstra's. This is a recording of a lecture given at Carnegie Mellon University in Qatar. 00:00 Intro 14:35 Kruskal's Algorithm 25:01 Prim's Algorithm 29:48 Practice 40:35 Shortest Path 44:19 Dijkstra's Algorithm
15-112 CMU-Qatar Term Project Montage, Spring 2024
มุมมอง 1887 หลายเดือนก่อน
Video clips from the term projects from 15-112, Spring 2024 at Carnegie Mellon University in Qatar. Music I use: www.bensound.com License code: 1Y0WWHLBQZ3LHXY2 License code: CELP82R696CDWBSH License code: P3WDFG9PYHMTF85D
15-112 CMU-Qatar Term Project Montage, Fall 2021
มุมมอง 6763 ปีที่แล้ว
Video clips from the term projects from 15-112, Fall 2021 at Carnegie Mellon University in Qatar. Music: www.bensound.com/
15-112 CMU-Qatar Term Project Montage, Spring 2020
มุมมอง 7094 ปีที่แล้ว
Video clips from the term projects from 15-112, Spring 2020 at Carnegie Mellon University in Qatar. Music: www.bensound.com/
15-112 CMU-Qatar Term Project Montage, Spring 2019
มุมมอง 6205 ปีที่แล้ว
Video clips from the term projects from 15-112, Spring 2019 at Carnegie Mellon University in Qatar. Music: www.bensound.com/
Hashcat and the Maskprocessor
มุมมอง 8K8 ปีที่แล้ว
This is a quick video where I demonstrate how to use hashcat and the maskprocessor under Kali Linux to break some password hashes. The goal is to introduce how the maskprocessor can help you make basic modifications to your dictionary.
CMPS 485: Hashing
มุมมอง 1.2K8 ปีที่แล้ว
An introduction to hashing. This was originally produced for a course at Qatar University.
CMPS 485: Course Introduction
มุมมอง 2K8 ปีที่แล้ว
CMPS 485: Course Introduction
Introduction to Basic Cryptography: Public Key Cryptography
มุมมอง 13K9 ปีที่แล้ว
Introduction to Basic Cryptography: Public Key Cryptography
Introduction to Basic Cryptography: Hashing
มุมมอง 39K9 ปีที่แล้ว
Introduction to Basic Cryptography: Hashing
Introduction to Basic Cryptography: Diffie-Hellman
มุมมอง 7K9 ปีที่แล้ว
Introduction to Basic Cryptography: Diffie-Hellman
Introduction to Basic Cryptography: Operating Modes
มุมมอง 6K9 ปีที่แล้ว
Introduction to Basic Cryptography: Operating Modes
Introduction to Basic Cryptography: Symmetric Key Cryptography
มุมมอง 43K9 ปีที่แล้ว
Introduction to Basic Cryptography: Symmetric Key Cryptography
Introduction to Basic Cryptography: Modern Cryptography
มุมมอง 13K9 ปีที่แล้ว
Introduction to Basic Cryptography: Modern Cryptography
Introduction to Basic Cryptography: Simple Cryptography
มุมมอง 30K9 ปีที่แล้ว
Introduction to Basic Cryptography: Simple Cryptography
Introduction to Basic Cryptography
มุมมอง 9589 ปีที่แล้ว
Introduction to Basic Cryptography
CMPE370: Fritzing PCB Design Part 2
มุมมอง 18K10 ปีที่แล้ว
CMPE370: Fritzing PCB Design Part 2
CMPE370: Fritzing PCB Design Part 1
มุมมอง 25K10 ปีที่แล้ว
CMPE370: Fritzing PCB Design Part 1
CMPE370: Fritzing Schematics
มุมมอง 43K10 ปีที่แล้ว
CMPE370: Fritzing Schematics
CMPE370: Servo Motors
มุมมอง 30210 ปีที่แล้ว
CMPE370: Servo Motors
CMPE370: Operational Amplifiers
มุมมอง 23610 ปีที่แล้ว
CMPE370: Operational Amplifiers
CMPE370: DC Brushed Motors
มุมมอง 24410 ปีที่แล้ว
CMPE370: DC Brushed Motors
CMPE370: Soldering
มุมมอง 41410 ปีที่แล้ว
CMPE370: Soldering
CMPE370: 555 Timers
มุมมอง 29310 ปีที่แล้ว
CMPE370: 555 Timers
CMPE370: DC Power Supplies
มุมมอง 78510 ปีที่แล้ว
CMPE370: DC Power Supplies
CMPE370: DC Regulators
มุมมอง 26510 ปีที่แล้ว
CMPE370: DC Regulators
CMPS 485: Wi-Fi Security
มุมมอง 44210 ปีที่แล้ว
CMPS 485: Wi-Fi Security
CMPS 485: Symmetric Key Crypto
มุมมอง 1.1K10 ปีที่แล้ว
CMPS 485: Symmetric Key Crypto
CMPS 485: Wireless Networking Primer
มุมมอง 54310 ปีที่แล้ว
CMPS 485: Wireless Networking Primer

ความคิดเห็น

  • @adamrakab7327
    @adamrakab7327 23 วันที่ผ่านมา

    Goated

  • @eross21
    @eross21 5 หลายเดือนก่อน

    can you change the width of the cutouts around the traces?

  • @Arthur-ib2kq
    @Arthur-ib2kq 6 หลายเดือนก่อน

    Thx a lot dr.ryan , this video helps me to pass my exam.

  • @JagjitJaggi-mk3de
    @JagjitJaggi-mk3de 6 หลายเดือนก่อน

    Thx ji❤❤

  • @Christian-bv7yk
    @Christian-bv7yk 8 หลายเดือนก่อน

    Dude your tutorial is great I love it! It helps me much!

  • @spudnickuk
    @spudnickuk ปีที่แล้ว

    Your tutorial is great as didn't know about the ground and voltage connection for which I struggled with

  • @umerfarooq9828
    @umerfarooq9828 ปีที่แล้ว

    Great video Sir! Very easy to understand.

  • @PavelGnatyuk
    @PavelGnatyuk ปีที่แล้ว

    Fixed sample for 1:56: ``` #!/usr/bin/env python import hashlib m = hashlib.sha256() m.update("Hello".encode('utf-8')) m.update("Bye".encode('utf-8')) print(m.hexdigest()) ```

  • @danielamtz3614
    @danielamtz3614 ปีที่แล้ว

    Hi, I need help. I can't figure out why on my printed circuit board, I keep getting the warning of missing and/or incomplete external milling paths. I'm new to Fritzing.

  • @newdehan3889
    @newdehan3889 2 ปีที่แล้ว

    How technical bob get a key ?

  • @kristiannn57
    @kristiannn57 2 ปีที่แล้ว

    You have a gift, the way to teach is remarkable. I've been wathing many other videos and they are all very confsing and lack rebustness. Your videos are clear and full of terrific examples, cannot get any better....well done and thank you!

  • @samueloyinlola8914
    @samueloyinlola8914 2 ปีที่แล้ว

    can anyone help with computer security assignment

  • @abbasalirezaei6817
    @abbasalirezaei6817 2 ปีที่แล้ว

    Hi, thank you for sharing these videos ... where can I find these slides?

  • @bernym4047
    @bernym4047 2 ปีที่แล้ว

    Excellent. Thank you.

  • @LexChanKlaus
    @LexChanKlaus 2 ปีที่แล้ว

    HI, Could I know how to increase the speed of UDP Port Scanning? Thanks!

  • @hassanlearning4086
    @hassanlearning4086 2 ปีที่แล้ว

    Thank you. You make it so easy to understand.

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    So is the entropy source then the source that produces like a random sequence of something?

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    So the keys need to be random, as in, there is absolutely no pattern (no repetition), and therefore it is unbreakable? :)

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    These brute force attacks... they don't sound very elegant, really. Surely there can be other ways to attempt to break the patterns...

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    It seems to me it is all about the patterns...:)

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    By that logic, you would want to create a cipher where the pattern is not detectable?

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    so you are looking for patterns to break the cipher?

  • @BambiOnIce19
    @BambiOnIce19 2 ปีที่แล้ว

    so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?

  • @poiuqwerty1159
    @poiuqwerty1159 2 ปีที่แล้ว

    thank you very much dr

  • @humairamunawar2281
    @humairamunawar2281 2 ปีที่แล้ว

    Best Explanation👍

  • @spearchew
    @spearchew 2 ปีที่แล้ว

    Fantastic

  • @dahoyasmine2248
    @dahoyasmine2248 2 ปีที่แล้ว

    Thank you so much!

  • @meesiphht2769
    @meesiphht2769 2 ปีที่แล้ว

    Is someone talking?

  • @junaid_qadir
    @junaid_qadir 2 ปีที่แล้ว

    oh wow wow what a nice lecture. You have made it super easy like learning the alphabet "ABCDE....". Can you give us an example in Python code of how to implement it in code?

  • @jimparlett4099
    @jimparlett4099 2 ปีที่แล้ว

    Am I missing something? You wanted to connect C1 ground to U1 ground and struggled to find a path, but C2 ground was already connected to U1 groiund, so why didn't you connect C1 ground to C2 ground on the top or bottom layer, and then you'd have been there?

  • @Nerd4141
    @Nerd4141 2 ปีที่แล้ว

    Where can i get your full lectures on cryptography 😭😭 please sir your videos so good ,i have exams in 10 days i need your lecture videos please share

    • @ryanriley5591
      @ryanriley5591 2 ปีที่แล้ว

      I don't have longer versions of these videos, but you can use this playlist to see the things I do have broken out by topic: th-cam.com/play/PLBNihd1niYHuEGTj1GS3ZhTYDt6PxkyY7.html

  • @Rafat.M.Shaker
    @Rafat.M.Shaker 2 ปีที่แล้ว

    Thank you!

  • @Rafat.M.Shaker
    @Rafat.M.Shaker 2 ปีที่แล้ว

    Thank you!

  • @saarzaradez8
    @saarzaradez8 3 ปีที่แล้ว

    Thank you for this! Great explanation!

  • @quocbaonguyenluu6598
    @quocbaonguyenluu6598 3 ปีที่แล้ว

    Thank you professor. It is still a good lecture in 2021. Very clear and easy to understand.

  • @Derbauer
    @Derbauer 3 ปีที่แล้ว

    The audio is almost a whisper, unfortunately that means i cant hear it clearly on my Samsung phone at full volume.

  • @bolibardo1514
    @bolibardo1514 3 ปีที่แล้ว

    Good video. I learned the basics as a beginner. Thanks.

  • @arundhatipatil7391
    @arundhatipatil7391 3 ปีที่แล้ว

    How do I get the components to be coloued?

  • @Luca-gb1og
    @Luca-gb1og 3 ปีที่แล้ว

    Thanks buddy, the best video regarding this topic by far! You helped me a lot for my presentation

  • @reubydoobydoo1383
    @reubydoobydoo1383 3 ปีที่แล้ว

    Thank you sir! Im doing a cryptography class at university and your way of explaining things is really helping me understand the content. I really appreciate it

  • @ShermanSitter
    @ShermanSitter 3 ปีที่แล้ว

    126 Likes, 2 dislikes... = 128 bit encryption? :)

  • @ShermanSitter
    @ShermanSitter 3 ปีที่แล้ว

    This was amazing, thank you! Are there any good video series that show the math behind more of these theories? Or how to create such systems in code? That would be interesting as well.

    • @ryanriley5591
      @ryanriley5591 3 ปีที่แล้ว

      I appreciate your kind words. You should check out the wikipedia articles on the topics you are interested in. They are very well done, and tend to contain both the math and some sample implementations.

  • @maxpolaris99
    @maxpolaris99 4 ปีที่แล้ว

    Anyone know how to move all parts that were previously selected as all? Like lining up circuit fragments relative to each other.

  • @bensmith9253
    @bensmith9253 4 ปีที่แล้ว

    This video is GOLD

  • @Msg8981524780
    @Msg8981524780 4 ปีที่แล้ว

    Simple and Nice

  • @fayfeld5900
    @fayfeld5900 4 ปีที่แล้ว

    Thank you very much, Ryan! I woudn't have believed, someone could teach me the basics of PCB-Design in just 3 videos within an hour. But you did!

    • @ryanriley5591
      @ryanriley5591 4 ปีที่แล้ว

      I'm glad I could help! I wish I could take credit, but the truth is that if you already have a basic background in circuits/schematics, then basic PCB design isn't hard at all.

    • @fayfeld5900
      @fayfeld5900 4 ปีที่แล้ว

      @@ryanriley5591 Feel free to take these credits! What i meant was observing and following the whole process after(!) seeing some stuff running on the breadboard. I got my hands on the great Fritzing, but i think, its not that explanatory as a beginner would need. IMHO, they may have arragend the panels in the wrong order.. :-) The schematics should come first, followed by the breadboard (b.t.w. called "Steckplatine" in my german version...) I also got furios, when i tried to change the capacity-value of C3, but a moment later i learned, that this is a 'normal' Fritzing's behavior and how to work around. This was extremly useful! So thanks for that! And now i am looping over your 555-Lesson. Just to understand, what i (or we) actually did there an hour ago... :-)

  • @einsteinwallah2
    @einsteinwallah2 4 ปีที่แล้ว

    i downloaded keepassx software for windows ... it is available as zip of binaries etc ... how do you verify sinatures ... currently (2020-09-24) it shows a line like following: All downloads and Git tags are signed with the key 164C70512F7929476764AB56FE22C6FD83135D45 what does it mean and how i can use them to verify ... of course it has another link to a folder with a bunch of files and .sig files ... clicking on a .sig files simply saves it ... my problem is if verifying needs a software then that software itself may infect my computer ... i am irritated by whole bunch of software publisher giving these verify secion without any instruction on how to use them ... would it not be nice if i download a file or zip and upload to some site giving link to web page downloaded from and let that site determine integrity of software? like hybrid-analysis site does?

  • @Berghiker
    @Berghiker 4 ปีที่แล้ว

    Can you give your tangled files to JLC PCB?

  • @ragingpahadi
    @ragingpahadi 4 ปีที่แล้ว

    Best Explanation