Тёмный
Securemetric
Securemetric
Securemetric
Подписаться
Securemetric is certainly one of Southeast Asia’s leading regional players in the field of digital security with core focus into Software Licensing Protection (Software License Dongle, Software Protection Dongle), 2-Factor Authentication (2FA), Advanced Identity and Access Management, Public Key Infrastructure (PKI System) and Cryptography. Since incorporated in 2007, Securemetric has expanded strong local footprints with local establishment in Indonesia, Singapore, Vietnam and Philippines.

The brand name of Securemetric has been built with market respect in the area we hold strong domain expertise. Securemetric is headquartered in Kuala Lumpur with oversea branches in Hanoi, Ho Chi Minh City, Jakarta, Manila and Singapore. Our commitment is to invest on localisation (solution, legal entity and talents) into any Southeast Asia country whenever the need arises.
Комментарии
@SullyFan123
@SullyFan123 8 дней назад
Comments about Mary bob and alice: 100% Comments about Party Communist Indonesia: 0%
@mufcabbage7116
@mufcabbage7116 21 день назад
Can you turn the music up I can still barely hear the woman explaining PKI to me
@arkfreight92
@arkfreight92 25 дней назад
What about if someone else is pretending to be bob?
@JamieVesco
@JamieVesco Месяц назад
6725 Margot Isle
@NishitaKhatun-h7i
@NishitaKhatun-h7i Месяц назад
Anderson Kimberly Moore Kevin Thomas Scott
@cyber-guru2552
@cyber-guru2552 Месяц назад
I am wondering too..Bob must be messing around🤣🤣🤣
@長谷川雄太-b6e
@長谷川雄太-b6e Месяц назад
Jones Jeffrey Miller Lisa Moore Dorothy
@HannahMartinez-z1f
@HannahMartinez-z1f 2 месяца назад
Taylor Christopher Miller Sarah Jones Eric
@sirk3v
@sirk3v 3 месяца назад
thanks for the great video, so how about that lunch?
@БЕЗВИЗОВЫЙ
@БЕЗВИЗОВЫЙ 6 месяцев назад
Ппа
@nicole.9889
@nicole.9889 7 месяцев назад
Most helpful video explaining PKI. Thanks
@chintamanibadekar8459
@chintamanibadekar8459 Год назад
😃
@kalmkaos
@kalmkaos Год назад
thanks queen
@shivamanand8998
@shivamanand8998 Год назад
Thanks nice video
@shubhambohra2643
@shubhambohra2643 Год назад
Very nice explanation. Thank you.
@satishmurugan6008
@satishmurugan6008 2 года назад
Great. And I am eager to be an employee at secure matric one day 😊
@loftondarps
@loftondarps 2 года назад
Simple, concrete, and to-the-point! Thanks!
@a.t.p.engineer7154
@a.t.p.engineer7154 2 года назад
PKI GOBLOK
@saadeddine6418
@saadeddine6418 3 года назад
good video thanks
@443TRELL
@443TRELL 3 года назад
I would use their public key to encrypt an email and they would use their private to decrypt it right?
@yehiaabuelnasr7243
@yehiaabuelnasr7243 5 месяцев назад
ye
@Polerface774
@Polerface774 3 года назад
A Story for another time.... Stupid girl
@connorcink3972
@connorcink3972 3 года назад
How DO you validate certificates though
@furkan9864
@furkan9864 3 года назад
wonderful video, great explanation, saved me a lot of time and frustration
@UralaTAO
@UralaTAO 3 года назад
Let's talk about it over lunch then Haha. Good video.
@BortPlate
@BortPlate 3 года назад
Maybe Bob wouldn't need to hide his messages if he'd simply stay faithful to Alice...
@jackiethompson4369
@jackiethompson4369 2 года назад
laughing
@mahnoorahmad8575
@mahnoorahmad8575 2 года назад
Bob is very sus sometimes!
@pervasivedoubt150
@pervasivedoubt150 3 года назад
Fantastic lesson!
@gracefriasforonda8457
@gracefriasforonda8457 3 года назад
what is the difference between PKI and a digital signature
@gauridanish
@gauridanish 4 года назад
This question is in the UPSC prelims exam 2020....
@fabitooopestana7541
@fabitooopestana7541 4 года назад
I only understand with Bob and Alice...
@nikhildaga996
@nikhildaga996 4 года назад
Can i get the exploit file?
@AbdulSamad-hd1sr
@AbdulSamad-hd1sr 4 года назад
why is the music required ?????
@SimonLausch
@SimonLausch 4 года назад
To trigger us. A more serious answer (amateur) : The video itself is a very simple explanation. It is easier to invest on concentrating when there is either something to think about (a more demanding explanation) or if you need to invest not to get destracted by the jingle. Ever heard an explanation and thought along the lines of "uh. So boring. What was the answer to the fish riddle again?" ?
@aaronjohnson8715
@aaronjohnson8715 4 года назад
That loud intro scared my dog...
@mohitgadekar7365
@mohitgadekar7365 4 года назад
Very good explanation...Simple and easy to understand...thnx
@ultrablack3638
@ultrablack3638 4 года назад
In order to obtain such malware on android do you have to install the app outside of the google store?
@sketchy_loco
@sketchy_loco 4 года назад
Yes, i assume so, whenever i look for apks online some of them are malware and adware... google play apps have to be verified by google but to be safe always check permissions for general invasions or suspicious activity, for example, a weather app should need camera access
@anapodnebesova9716
@anapodnebesova9716 4 года назад
ok
@anapodnebesova9716
@anapodnebesova9716 4 года назад
wou wowe
@anapodnebesova9716
@anapodnebesova9716 4 года назад
ok
@mohamedfawzy6463
@mohamedfawzy6463 4 года назад
thank you that was really useful!
@tamilcinematics342
@tamilcinematics342 4 года назад
how to do that....................
@rootbeersodapopparodies9245
@rootbeersodapopparodies9245 5 лет назад
Ok for one this no good video. People who have businesses should not use this at the CEO and Board Levels. Who's to say criminals are not already integrated into the networks of those organizations of that are certification authority . Couldn't Bob use the public key to build his own parent host attack based on the fact that Mary is known for sure we know she is going to open what ever you send her its really bad plan full of loopholes and endless codes that could nullify this shit. maybe bob doesnt know that he is part of a Man In the Middle who is mad at mary, so he decides to hack mary's work. oh shit i know her public key to. I guess the way to safe gaurd is have a closed network loop that run the program outside the reach of any data and run the code while a Dedicated Program verifies its contents
@rootbeersodapopparodies9245
@rootbeersodapopparodies9245 5 лет назад
so good luck
@SmartSula
@SmartSula 5 лет назад
Who the hell is Mary? Is Bob cheating on Alice?
@yinyangutopia5537
@yinyangutopia5537 5 лет назад
This is GOLD!!!
@mohamed_5765
@mohamed_5765 5 лет назад
maybe lol
@rootbeersodapopparodies9245
@rootbeersodapopparodies9245 5 лет назад
what I like about you is your eye to detail. Is bob cheating Mary.Mary probably cheats thats why she thinks she need this clown level security measures
@abanur3163
@abanur3163 4 года назад
hahahahahaha
@rahuldey2780
@rahuldey2780 4 года назад
Naiceeeee
@vipinv8004
@vipinv8004 5 лет назад
super explanation
@Atomo
@Atomo 5 лет назад
Njir PKI XD
@jsonkody
@jsonkody 5 лет назад
One of worst names is "public key" .. wtf? Why it's called key? It's more like "public opened trezor" .. once u put something in and close it, it can be opened only by it's owner with his private key ...
@SMJSmoK
@SMJSmoK 5 лет назад
The key analogy is uses because it's something you combine with the message to generate the encrypted message.
@889bball
@889bball 5 лет назад
My key can't encrypt messages, it can only open my door. Why do all these videos keep showing an actual key? What exactly is the key in this scenario..... is it an app?
@SMJSmoK
@SMJSmoK 5 лет назад
in this case, key is a sequence of bits
@danieleberhardt235
@danieleberhardt235 5 лет назад
This is by far the MOST complete and easy to understand explanation for PKI!! THANK YOU!
@shyvoski
@shyvoski Год назад
True!!!
@AfterBurner369
@AfterBurner369 6 лет назад
Enemy of the Planet Exposed Rigged Elections - Public Key Infastructure Who Has The Keys? Hillary Rotten Clinton These People Are Sick truthbits.blog/2018/11/08/enemy-of-the-planet-exposed/
@doctorasulmohammedigunheal7505
Those 14 dislikes were definitely coming from angry Indonesians.
@kartaLaLa
@kartaLaLa 6 лет назад
Is this topic related to SSL/TLS connection??
@Mirdclawer
@Mirdclawer 6 лет назад
totally
@MelancholyMadoka
@MelancholyMadoka 6 лет назад
Video starts @ 0:15