Prof. Sims: Remarkable as always. A second video would be great. How do, assuming that they do, MD5 and SHA fit into encryption? Is our use to ensure uncorrupted file transfers a spinoff of their use in encryption?
Gary, your videos are always informative and interesting. This is so much better than rumors about phones and app reviews. Your hard work is very much appreciated.
Im studying a course abt cryptography at my uni... I just finished my class and then came across this video.. Totally refreshed my memory .. What i have studied in three class u explained in 20 minutes .. Good work gary
Well, you have my permission to do part 2 :) I don't think anyone around internet can explain more simple and understandable for end product consumer as you do.
Today my Supervisor's computer has been attacked by malware. It has encrypted all files in the computer destroying 10 years of research work. It has encrypted all files to convert .ZEPTO type. I tried a lot, but could not recover/decrypt them. Finally, I have reset the whole system. It is extremely unfortunate for me, because it has severely affected our research work.
I needed to change my encryption code. I seemed to activated my sims lock with a new code. Did I re-encrypt my phone? Against the person(hacker) who has my original encrytion code? Am I safe now? Which is more powerful sims lock or the encryption code feature on android?
hello sir i am from india and my gf is doing her higher studies in greece. We dont know much about hacking because its very rare here in india. but recently my gf laptop ws hacked with all the file renamed to ".cyber3" she had very important files on her lapto and also her back up hd files were encrypted as it ws connected at the time of hacking.. is there any way to get her files back?? She had her whole thesis it too ws encrypted. can you help sir?
The background track is at such a level that I thought it was coming from a different video. Probably better off without it - good content and delivery though!