Not all encryption algorithms are alike, and some are much better than others. In this video, you’ll learn how to evaluate encryption strength and how developers can use the bcrypt library to generate secure hashes.
The bad guys don’t need to know your password; they’ll figure it out themselves. In this video, you’ll learn the techniques that the bad guys use to reverse-engineer your password.
How can you tell if a digital file on a piece of storage media has been altered? In this video, you’ll learn about hashing, and I’ll demonstrate how to compare hashes with a file that has been altered.
Which of these events would commonly involve a hash?
We use authentication techniques many times a day to provide access to important resources. In this video, you’ll learn about user authentication and hash techniques that keep our passwords private.