hi sharma thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you very much sir.Your videos are really helpful to so many students.I kindly requesting you to place videos on Intrusion techniques,password protection, Intrusion detection,viruses and related threats
hi priyanka thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel. intrusion , viruses and all are theory concepts and it would be very easily understandable while reading the text book so i am planning to ignore those concepts but i will try to upload them and i am sure about that.
Hi it's really awesome video but missing some information like how ciphers are checked and how public key and private key got exchanged and encrypted. This will be helpful if you add these stuff.
Hi Sandeep , the exponentiation was nice here .. can you please upload videos on troubleshooting scenario that will help us to better understand ..Thanks is advance.
Sir every client web browser for example google chrome has it's certificate signed by trusted authority, because for server certificate we need to pay money for third party who is signing certificate so my question is we don't purchase certificate for web browser so how web browser's are identified in the network
Hi Sundeep its a very nice video. I have a one query here when client will send its hello first time the hello will be in plain text or encrypted ? these days automatcally http is redirected to HTTPS if i am talking to HTTP site it will be redirected to https automatically but client hello would be send on port 80 or 443 ? second question is when server will send its certificate with port num 443 and in this case client doesn't have the ssl certificate what will happen ?
Hi Sir. First of all excellent work! I have a question about SSL stack protocol. The SSL Record Protocol is above TCP and under the Handshake Protocol. I know that the SSL Record Protocol is used to provide authentication and confidentiality for the application message. Now, my (stupid) question is: when the SSL Handshake Protocol to create the session is used? I mean, is the SSL Record Protocol used before or after the exchange of parameters for MAC and cipher suite is make?? Thanks :)
Sundeep Saradhi Kanthety I think you were wrong. The handshake protocol is used before any application data is transmitted. So first share the encryption suite with handshake and then use the record protocol to send the application data
hi kunal sorry to say i cant upload more videos on Computer Graphics as many of them are theory related and almost the problematic concepts have been uploaded.
hi prasanna sure i will upload it in a couple of days. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.