Hashing vs Encryption Differences

preview_player
Показать описание
How is hashing used in computer security? Hashing can be used to verify a document or file download. Hashing can also be used to store passwords in an application without using clear text.

Рекомендации по теме
Комментарии
Автор

Eloquent but simple. All the hashing vids that I watched before this were so confusing. You did a wonderful job, thank you so much!

darrengreene
Автор

You earned a sub. I really love the way you explain what hashing is and even gave an example on how to use it for storing passwords. I didn't even notice that it was almost 20 minutes that I was listening to your lecture. 10/10 would recommend this channel to other people again.

holo
Автор

Loved the way you simplified everything! Great work

ranas
Автор

This is such an amazingly created video. Thanks for covering the multiple related aspects in one crisp video.

SoorajKumarR
Автор

This is a great video! Your explanation is very to the point without any fluff and presented in a way that doesn't make me wander to the next video. Thank you for the information in such a presentable way!

skjaldr
Автор

The fact that I can listen to a programming professor for free is incredible

georgeosborn
Автор

This in one of the simplest and perfect explainations that i have ever seen in my life

omarsharaf
Автор

Really enjoyed this presentation, very clear and easy to understand. Great Job. I am subscribing!

hmdz
Автор

Finally a video that explains it clearly!! Thank you!

marevalo
Автор

Thank you professor Shad! Very thorough and easy to understand.

vinht
Автор

Very concise and crystal clear. Thank you!

artemsmirnov
Автор

Well laid out. Easy to understand. Your voice wasn't monotone. Thank you. Good video.

stealthyfern
Автор

Great explanation, Professor Sluiter. I am studying for CISSP and this saved me a lot of time and cleared up confusion from the useless study guides. Thank you!

hardbanger
Автор

This lecture is golden!!
Helped me clear a lot of basics and really understand the concepts!

parthmangalkar
Автор

thank you so much for a simple easy to comprehend answer with no filler. nice

desiaclementslewis
Автор

Thanks for the video Professor. Very clear explanation to follow. Hashing technique was particularly useful for us in de-duplicating big data sets. Have shared it in a video.

python
Автор

Clear and well explained video, the work of a professional :-) Thank you

ggeducation
Автор

This is so good. Thank you professor Sluiter!

patrickdenkyi
Автор

I love this thorough explanation of Hashing and Encryption. This is awesome work.


Thank you so much!

PrivateYouTubeE
Автор

1:57 So we are going to ignore the subtle shade Mr Shad Sluiter pulled here against windows and mac?..xD really good video too

RezoanurRahman