i guess im asking randomly but does anyone know of a method to get back into an Instagram account? I was dumb lost my password. I appreciate any tricks you can offer me.
@Braxton Jakob Thanks for your reply. I found the site thru google and Im waiting for the hacking stuff now. Seems to take quite some time so I will reply here later when my account password hopefully is recovered.
Very simple explanation , thanks Learn Engineering. I had read about this twice and got confusion about private key and session key, this is more insightful.
I really want to appreciate admin or learn engineering team for easy explanations with good example... To learn this encrypt method my lecture took 3 classes...
encryption ( and those keys and signature) is very hard to understand at first and confusing after that if you don't have to work with it daily. As a normal software developer who study these things since 2005 but have been struggling to forget how they work. This video would help new comers alot and even "pro" like me
Man this video give clear insight about encryption, for more depth you have to go through wire shark/ packet tracer- where you can actually see private/public key certificates being exchanged in real-time
Good video, however , it presented whatsapp as an encrypted communications app, and it's not a good idea to present it as such. Because they don't encrypt your chats if you upload them to G.drive , and also, photos or videos are never encrypted, Neither on normal chatting nor when backuping . That's why it says "messages" are encrypted (referring to only text msgs.) instead of showing "this chat or conversation is encrypted". I understand the backup part is optional, but the photo&video thing is a dangerous one, and they kinda of mislead the users. It's just good to know what they avoid telling.
Great video. The only thing I don't get is at 5:30 how (26)^7 mod 33=104. This is impossible since 104 is greater than 33 and the mod operation only gives the remainder of any number when divided by 33. Shouldn't that be 5? How does one arrive at 104 by decryption? Appreciated
We need translation because your programs are very fun and very useful. I went to Google and translated my words to hear him you channel owner. Your channel is very useful and I love it a lot ... and I hope you translate it for us always we suffer a lot of translation. Even if we translate it does not lead to the right information you want. I repeat my thanks to you, our able teacher
In session key symmetric encryption, how are sessions keys transferred safely? What encryption mechanisms are used to make sure the session key is not stolen?
I have few questions: 1. What keeps someone from creating a list of factors for prime numbers and by that way making it quicker to figure out later? 2. How is the first private key tranfered without giving anybody a change to steal it?
Great explanations! I really enjoyed remembering all this stuff I did in college. However, I'm kind of disappointed that you didn't say that messages can be both signed and encrypted. I guess that would be a bit too much for someone who's not in the matter. Anyway, great video, thanks for making it. Cheers.
Yeah . Thank you for sharing knowledge of encryption and decryption. Can any one explain me in detail about symmetric encryption with advanced encryption standard?
📡 SMART SATILEET GESTION A DISTANCE IF A PALLET IN EMPLACEMENT IN P7 YOU HAVE THE POSIBILITY TO GETTING TPE BY ANY MOUVEMENT IS TFS SUPPORT TO ANOTHER SUPPORT INFORMATIQUEMENT AND AFTER CONFIRMED THE PROCESS IN PHYSICAL CONDITION
Hello good morning sir.ur video is very clear and it helped me a lot.currently iam working on a project dna cryptography so in that ism facing small problem how can i connect mealy machine to the cryptography..can u help me in this sir?
We truly appreciate your support at www.patreon.com/LearnEngineering . Even a $1 support can give us a big boost.
i guess im asking randomly but does anyone know of a method to get back into an Instagram account?
I was dumb lost my password. I appreciate any tricks you can offer me.
@Christopher Marcelo Instablaster ;)
@Braxton Jakob Thanks for your reply. I found the site thru google and Im waiting for the hacking stuff now.
Seems to take quite some time so I will reply here later when my account password hopefully is recovered.
@Braxton Jakob it did the trick and I now got access to my account again. I am so happy!
Thanks so much you saved my account!
@Christopher Marcelo you are welcome :)
I'm a software engineer and I can say that this really complicated concept is really well explained. Good job Learn engineer!
I am glad to know that a computer engineering finds our video helpful :)
The complicated concept of encryption explained in the most simplified manner.Brilliant work !
Thanks learn engineering and thankyou Sabin..
What a marvellous explanation guy's. I have been struggling to understand this concept since last 10years. This explanation is a gem.
Very simple explanation , thanks Learn Engineering. I had read about this twice and got confusion about private key and session key, this is more insightful.
I really want to appreciate admin or learn engineering team for easy explanations with good example...
To learn this encrypt method my lecture took 3 classes...
encryption ( and those keys and signature) is very hard to understand at first and confusing after that if you don't have to work with it daily. As a normal software developer who study these things since 2005 but have been struggling to forget how they work. This video would help new comers alot and even "pro" like me
😃Excellent channel with Excellent explanation 😃
Sir, We need more networking related videos in animation.
Aise videos se hard topic bhi Asani se clear ho jate hai.
🤗🤗🤗🤗🤗🤗🤗🤗🤗🤗
Thank you for these little videos. They really add up in engineering knowledge and principles!
Thanks That Was Difficult
Very knowledgeable video. Thanks to Learn Engineering.
Everyone Like and share the video.
So well explained!
clear understanding with super simple visualization very good
Man this video give clear insight about encryption, for more depth you have to go through wire shark/ packet tracer- where you can actually see private/public key certificates being exchanged in real-time
What a brilliant video!!
Great. Really great....presentation...
Click here for india punjabi sex movie HD 2016 FREE DOWNLOAD 👏👏 भारत पंजाबी सेक्स मूवी मुफ्त डाउनलोड
Two videos in one day. Your channel is the best
I couldn't understand this concept any better than after watching this video.
Love this! Explain 5G / millimeter wave and massive MIMO!
Good video, however , it presented whatsapp as an encrypted communications app, and it's not a good idea to present it as such. Because they don't encrypt your chats if you upload them to G.drive , and also, photos or videos are never encrypted, Neither on normal chatting nor when backuping . That's why it says "messages" are encrypted (referring to only text msgs.) instead of showing "this chat or conversation is encrypted". I understand the backup part is optional, but the photo&video thing is a dangerous one, and they kinda of mislead the users. It's just good to know what they avoid telling.
Thank you for making it so simple to understand!
Great video. The only thing I don't get is at 5:30 how (26)^7 mod 33=104. This is impossible since 104 is greater than 33 and the mod operation only gives the remainder of any number when divided by 33. Shouldn't that be 5? How does one arrive at 104 by decryption? Appreciated
Im a young Electronics Expert I'm Finding A Best Way Of Encryption So I Can Understand It Well Thank's To Technology :)
We need translation because your programs are very fun and very useful. I went to Google and translated my words to hear him you channel owner. Your channel is very useful and I love it a lot ... and I hope you translate it for us always we suffer a lot of translation. Even if we translate it does not lead to the right information you want. I repeat my thanks to you, our able teacher
You can enable TH-cam's auto-generated subtitles, but they are not perfect.
@@Gonza-lh2vo
do not know how ... Overall thank you very much
This is a good introduction to encryption used for web communications. Cheers, Russ
Awesome explanation👌👌👌
Clear explanation of public key, private key, KDC, Symmetric, Asymmetric
Excellent Explanation😊👍👍
Your channel always have something to learn
we really can't assume that the KDC doesn't decrypt our data while on transit but i feel great to have learned a lot in this explanation.
What a wonderful explanation
Your videos are the best
Amazing video!!
In session key symmetric encryption, how are sessions keys transferred safely? What encryption mechanisms are used to make sure the session key is not stolen?
Please make a video about formula1 cars.Your videos on automobile engineering were amazing
New find the channel of creatin' great contents 👌
Sir your videos are always awesome
Good job guys!!!!!!!
Thank for the clear and simple ideas you shared. the best one
I have few questions:
1. What keeps someone from creating a list of factors for prime numbers and by that way making it quicker to figure out later?
2. How is the first private key tranfered without giving anybody a change to steal it?
keeping a list of prime numbers will accelerate our brute force work and thats fine .
Anyone has some answer about 2nd question ?
الله يعطيك الصحة 🌹👍🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺🌺
Its very helpfull
Amazing explanation
Awesome video
I'm a 8th grade student was always thinking why we need to find factors in linear equations well now I got why it is a very imp thing
I am from Bihar India
And watch to luv your videos I am not engineer or college student .
That delivery guy be like "yo, wtf, I do not have the whole day"
Wow... thanks 👍
Thank You 😊
sir from long time you havent made a video for mechanical engineering related,, so please make some,,,by the way this video is awesome
Nice explain.
You secured the so much time of someone's to found all that things.
*Wow!* 2 videos a day!
You're really a hard worker
please make a video about how volte works
nice work
Bro, can u tell me what is graphics tool used by you
Great information 👍 thanks.
Can you please explain how the emails works?
hi sir. Your teaching technique is very good .. please make video's on networking.ccna
Awesome video, i learnd a lot. Hugs from colombia
Great explanations! I really enjoyed remembering all this stuff I did in college. However, I'm kind of disappointed that you didn't say that messages can be both signed and encrypted. I guess that would be a bit too much for someone who's not in the matter. Anyway, great video, thanks for making it. Cheers.
In senior secondary school this video helpful for me to understanding the modern physics with computer science
Are you using blender for these animations. I just saw in that laptop in the animation 😊
Yah, got it right :) We are using Blender
please making video internet protocols and circuit switching and packet switching
I watch many video of your channel. I really empress your voice. Please tell which software are use for voice. Thanks.
This was great . !
We need a video about SSO - Single Sign on
Super do more video in this content
👌👌👌Sir,pls make videos about Electronics and commutation engineering topics
Pls make video on Electric Vehicles Manufacturing
3:16 That's counter intuitive! How can a key that can close a lock not open it, while another one exactly similar to it can?
Good stuff!
Yeah . Thank you for sharing knowledge of encryption and decryption. Can any one explain me in detail about symmetric encryption with advanced encryption standard?
What keeps someone from creating a list of factors for large prime numbers, thus making it quicker to figure out later?
My favourite ❤️ animation
At 4:06 you show 33 and 3; was that second 3 a typo and supposed to have been -33?
need computer network series
Please make a video on how a combustion chamber works in rockets? 🙏🙏
📡 SMART SATILEET GESTION A DISTANCE
IF A PALLET IN EMPLACEMENT IN P7
YOU HAVE THE POSIBILITY TO GETTING TPE BY ANY MOUVEMENT IS TFS SUPPORT TO ANOTHER SUPPORT INFORMATIQUEMENT AND AFTER CONFIRMED THE PROCESS IN PHYSICAL CONDITION
8:14 this confidential message is
"Hi"
Great! Thanks:D
Keep doing this posting videos
The motercycle delivery guy has a very big head! It might be from storing all the data keys like the NSA.
I would store the keys in my ass
we could store the keys in the bra used by the huge breasted woman that is normally in the videos on this channel
@@An.Individual I wonder what happened to that sexy redhead girl, she doesn´t appear anymore
Nice video
Please make a video on IC in detail
Hello,
how can i made an animation like your excellent video!!!
I like your new graphics
What if a government can get the encryption key?
C h I n a
Though I took 1 drop after twelfth, but need to attend whole congruence modulo lecture ❤❤
Very good explanation.... 😎👍. Could you give me a hint which software do you use for these animations?
blender
damn, this video was too good
I was watching this and those numbers just broke my brain
Hello good morning sir.ur video is very clear and it helped me a lot.currently iam working on a project dna cryptography so in that ism facing small problem how can i connect mealy machine to the cryptography..can u help me in this sir?
Which software is used to make such videos?
Awesome
nice Video
Tq fr the video
Very nice
But if the key is sent as the first message and someone intercepts it, then he can view all of the following messages. How is this prevented?
You said the access point provider cannot see what we are looking at but then you said they can see that we have accessed a website? I am confused.
👏👏👏