Тёмный
No video :(

Security Attacks : Types Of Active Attacks Explained in Hindi 

5 Minutes Engineering
Подписаться 649 тыс.
Просмотров 243 тыс.
50% 1

📚📚📚📚📚📚📚📚
GOOD NEWS FOR COMPUTER ENGINEERS
INTRODUCING
5 MINUTES ENGINEERING
🎓🎓🎓🎓🎓🎓🎓🎓
SUBJECT :-
Discrete Mathematics (DM)
Theory Of Computation (TOC)
Artificial Intelligence(AI)
Database Management System(DBMS)
Software Modeling and Designing(SMD)
Software Engineering and Project Planning(SEPM)
Data mining and Warehouse(DMW)
Data analytics(DA)
Mobile Communication(MC)
Computer networks(CN)
High performance Computing(HPC)
Operating system
System programming (SPOS)
Web technology(WT)
Internet of things(IOT)
Design and analysis of algorithm(DAA)
💡💡💡💡💡💡💡💡
EACH AND EVERY TOPIC OF EACH AND EVERY SUBJECT (MENTIONED ABOVE) IN COMPUTER ENGINEERING LIFE IS EXPLAINED IN JUST 5 MINUTES.
💡💡💡💡💡💡💡💡
THE EASIEST EXPLANATION EVER ON EVERY ENGINEERING SUBJECT IN JUST 5 MINUTES.
🙏🙏🙏🙏🙏🙏🙏🙏
YOU JUST NEED TO DO
3 MAGICAL THINGS
LIKE
SHARE
&
SUBSCRIBE
TO MY RU-vid CHANNEL
5 MINUTES ENGINEERING
📚📚📚📚📚📚📚📚

Опубликовано:

 

23 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 167   
@neham2502
@neham2502 3 года назад
I mean .....I busted out with the sentence "Iss chotte ne kya kiya.... 2:34 such an easy, fun, and effective way to learn such technical stuff...... wah bhaiyya!!!! you people are really doing a great job. There is no silver or platinum play button that can prove your growth already you are sharing such a huge treasure of knowledge which is invaluable!! ithne logon ki duayein aur ithne logo ki zindgiyon ko sudharne ki koi keemat ho sakti hai??? we are truly gifted to get to know about your channel and cover our syllabus. THANK YOU SO MUCH !!! @5minuteengineering.
@theanuragchavan
@theanuragchavan Год назад
Chotte nahi chorte bola in Marathi it means thief 😂
@abhachaurasia
@abhachaurasia 11 месяцев назад
​@@theanuragchavansane in Hindi too
@sridharraj7300
@sridharraj7300 Месяц назад
I am here to let you know that you are the first and last teacher from college whom i can able to get this knowledge. The way you teach is really admiring. Keep providing your knowledge to the upcoming youngsters too. THANK YOU SIR FOR ALL YOU TEACHINGS. TMRW IS MY LAST EXAM HOPE I CLEAR MY PAPER BY THE TEACHINGS OF YOU.
@mrrishiraj88
@mrrishiraj88 2 года назад
Now I got to believe that Security concepts can be explained in so comprehensible words. Great work by you! 👍🙏
@shambhavitripathi4925
@shambhavitripathi4925 3 года назад
The second type of active attack is "Replay" not "Relay" . However your content and explanation both are awesome....Thanks for all these superb videos...:)
@aklgyan2074
@aklgyan2074 3 года назад
The second type of active attack is "Replay" not "Relay" yes
@Shortskidda127
@Shortskidda127 2 года назад
Sorry to interrupt but in other words, we can count it as a Relay as well just have a deep look at Replay in Active Type to understand
@shivshankarpatel9827
@shivshankarpatel9827 2 года назад
Yes it's replay
@sumitshivdaspura3058
@sumitshivdaspura3058 2 года назад
now may be you'll pass
@lokeshmishra2801
@lokeshmishra2801 2 года назад
Tried counting the number of times sir said "baraabar" ultimately I lost the count Sir - 1 Me - 0 Thanks for all this awesome content, sir :)
@shivatejamulaveesala5491
@shivatejamulaveesala5491 3 года назад
You have covered much useful information in less time span. But in the Denial of Service attack, the availability is compromised not because of congestion in network. It is mainly because the server is busy in accepting and servicing huge number of requests from attacker(thinking it to be a legitimate user but actually its illegitimate) so that it cannot further handle valid requests from legitimate users and so the availability gets compromised for legitimate users.
@Shortskidda127
@Shortskidda127 2 года назад
That's exactly what he meant.
@Devil-pv4zb
@Devil-pv4zb 2 года назад
Bro what a coincidence u r here also🙌🙌...Hope u have cleared IT officer exam...good luck for future journey☺☺☺.
@shivatejamulaveesala5491
@shivatejamulaveesala5491 2 года назад
@@Devil-pv4zb Cleared bro. I have been alloted in PNB. Wishing u too good luck for ur efforts..
@Devil-pv4zb
@Devil-pv4zb 2 года назад
@@shivatejamulaveesala5491 congrats😍😍...
@shivatejamulaveesala5491
@shivatejamulaveesala5491 2 года назад
@@Devil-pv4zb Tq..😀😀
@sudhanshujha5408
@sudhanshujha5408 4 года назад
Sir please get rid ur fan's noise, it is very much irritating its my humble request , th way you teach is faboulous even when i do not want to want to study you make it very much intresting and make me study , thank u for sharing ur kniwledge.
@aklgyan2074
@aklgyan2074 3 года назад
i see more and more videos about security attack but all are waste and time consuming for me i like your explain way is so unique thanks to help me and other students love you sir and salute for your knowledge
@sakshigholse9288
@sakshigholse9288 4 года назад
Sir u explain every topic in good way ..topic gets easily understood
@rituraut9227
@rituraut9227 4 года назад
ekdum dimag me ghuss gaya ....thank you sir and the way you explain those examples are ssly amazing and develops interest in learning
@tejaswiniapte3178
@tejaswiniapte3178 5 лет назад
Thank you sir! Your explanation is very easy to understand 😊
@ayushpanchal5960
@ayushpanchal5960 4 года назад
SIR WHAT A GREAT EXPLANATION WITH APPROPRIATE EXAMPLES, FASCINATING. I ALWAYS USED TO LIKE YOUR VIDEOS WITHOUT WATCHING IT BECAUSE I KNOWN THE VIDEOS WOULD BE IMPRESSIVE,AMAZING AND MESMERISING. THANK YOU THANK YOU THANK YOU SOO SOO SOO MUCH FOR THIS CHANNEL ........
@muhammedzeeshanbaqir553
@muhammedzeeshanbaqir553 2 года назад
Thanks, Shridhar Rajendra Mankar, For this topic and keep it up brother, my all praying for you...
@indukatheriya6778
@indukatheriya6778 4 года назад
Sir apne mera exam bacha liya cloud computing ka or ab y vala bhi bach jayega. Thanks a lot. So much thanks
@prasannajena5291
@prasannajena5291 5 лет назад
Exam k liye thodi nai bhot jyaada msfad kr doye aap sir...3 bjne ko aaya h svi tak aapke videos k wajah se kl liye prepare kr rhi hun...thanks sir..aap to Dev Manus ho Dev Manus😀
@DevavratPatelBCE
@DevavratPatelBCE Год назад
Jai Hind Best & Clear expaination i found, one of the very best Thank You Very Much Sir for such a knowledgable content
@MuhammadHussain-vy3zi
@MuhammadHussain-vy3zi 5 лет назад
Thanks for sharing such a good knowledge and explain all in detail in short period of time ( Saviour )
@bhaveshmandavkar4339
@bhaveshmandavkar4339 5 лет назад
Sir i suggest u one thing ..Sir please provide notes also. handwritten or printed or soft-copy anything if possible because sometimes we don't have time to watch the whole video for example during examination So if u provide written notes it will be easy for us to do revision too .... its ok to charge for the notes but the cost should be low so that the students like us can afford it... THANKYOU.. : )
@muhammadsaadmansoor7777
@muhammadsaadmansoor7777 5 лет назад
han to exam sy 2 din pehly mary pry thy?
@allyoursneeds7873
@allyoursneeds7873 2 года назад
😂😂😂 bhai video me itna clear bataya fir bhi raataaa marna hai 😂😂😂
@abeerafazal6700
@abeerafazal6700 Год назад
Bhai me class me absent thi Bukhar hone ki wja se..me pareshan thi k ab ye lecture muje Kon smjha dia.. shukkar he ap ne smjha dia..
@mdkawsarahmed9515
@mdkawsarahmed9515 2 года назад
Thank you sir. your explanation is very easy to understand
@rnjnmhta.catomato
@rnjnmhta.catomato Год назад
self note : 6:35 denial of service (DOS attack): is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
@dikshagupta5775
@dikshagupta5775 5 лет назад
Amazing 👌👌👌
@shiva_2277
@shiva_2277 Год назад
u make every topic so easy..thanku
@Remixmusicaofficialmusic
@Remixmusicaofficialmusic Год назад
Abhi dekh rhe ho
@shiva_2277
@shiva_2277 Год назад
@@Remixmusicaofficialmusic what
@BLACKWIZX
@BLACKWIZX 3 года назад
lov u sir , u r really so kind!! , & respected to me ..
@mohanlalchoudhary4958
@mohanlalchoudhary4958 3 года назад
c dhap leta h b ka information :):):):):) nice viedo
@shwettiwari12
@shwettiwari12 2 года назад
Thank you so much sir for this explanation
@kashishshukla23
@kashishshukla23 4 года назад
U r really an amazing teacher.
@AnuAnu-by4sb
@AnuAnu-by4sb 4 года назад
Hello sir..thank you for giving lecture flooded wit concepts & morals..
@muskanmishra1194
@muskanmishra1194 2 года назад
Thanks bhaiya, understood well. Jai Hind.
@ishup7696
@ishup7696 5 лет назад
very easy to understand 👌👌👌👌
@indraxios
@indraxios 2 года назад
Amazing, thanks for making to the point videos.
@prashantdwivedi7435
@prashantdwivedi7435 2 года назад
Thank you Sir, cz of this my security knowledge got enhanced
@nileshparkar4953
@nileshparkar4953 2 года назад
Superb explained sir i understood the concept behind these cyber attacks ..thank you so much
@surajprajapati4162
@surajprajapati4162 5 лет назад
Very helpful 👍
@UnboxingAlert
@UnboxingAlert 3 года назад
Barbar informative. Garda
@anjalibhardwaj5125
@anjalibhardwaj5125 Месяц назад
"Iss chotte ne kya kiya"😂😂 Sir Love the way you teach❤❤
@kajalmirje3010
@kajalmirje3010 5 лет назад
Please upload compiler and business intelligence videos as soon as possible
@dhruvakadipu
@dhruvakadipu 3 года назад
1:48 Lol, he was going to say "Masturbate" instead of "Masquerade" 😂🤣. Anyways, jokes aside, that was a great explaination!
@jyoti6682
@jyoti6682 5 лет назад
sorry to say sir,but its replay attack
@5MinutesEngineering
@5MinutesEngineering 5 лет назад
Yes you noticed correctly, it's Replay Attack.
@jyoti6682
@jyoti6682 5 лет назад
@@5MinutesEngineering thanks for reply
@udayshankar6741
@udayshankar6741 5 лет назад
@@jyoti6682 mtlb replay attack ka
@SahajOberoi
@SahajOberoi 3 года назад
@@5MinutesEngineering You should pin this comment so that others can also know this!
@indrakumari1854
@indrakumari1854 3 года назад
Sir, could you please provide me your contact number or Gmail I'd?
@manikant7m
@manikant7m 3 года назад
Sir the best channel and easy explained ☺️☺️🙏🙏💞💞
@jeetendra1578
@jeetendra1578 3 года назад
Thank you sir ...itna to IBM wale n smjhate h
@hibaafridi1264
@hibaafridi1264 Год назад
Outstanding
@sulaimankhan3652
@sulaimankhan3652 3 года назад
thank you it was amazing
@Sandeep_mz
@Sandeep_mz 2 года назад
chotte ne 🤣🤣😂😂
@nawrin6636
@nawrin6636 5 лет назад
Thank you so much brother
@raokashif6583
@raokashif6583 4 года назад
Hloooo
@navneetmishra6201
@navneetmishra6201 3 года назад
Barabar samajh me aa gya sir❤️
@ZARABEAT
@ZARABEAT 5 лет назад
Barabar Sir
@sidb9257
@sidb9257 4 года назад
Sir ap explain bohat acha kar te ho👌👌
@UDCOOLBUDDY07
@UDCOOLBUDDY07 4 года назад
Ye jo chotta "c" hai😂😂😂👌
@ritikbhardwaj4061
@ritikbhardwaj4061 3 года назад
level of energy...!~!!!
@shiva_2277
@shiva_2277 Год назад
love your teaching sir.............
@jigyasabhandarkar2325
@jigyasabhandarkar2325 Год назад
Really helpful sir thanks a lot 👏
@nayangourkar198
@nayangourkar198 4 года назад
c dhaap leta hai...sahi hai bhau ;)
@TFEmiee
@TFEmiee 2 года назад
Amazing
@moshiurislam7630
@moshiurislam7630 2 года назад
Beautiful Explanation
@eshikasaxena2254
@eshikasaxena2254 3 года назад
Excellent explanation 👍👍
@areebakousar4826
@areebakousar4826 Год назад
Thanks a lot Sir stay blessed ❤
@hindutav2973
@hindutav2973 Год назад
Tq u sir
@shraddhaagrahari2217
@shraddhaagrahari2217 3 года назад
Thank u sir for v.good content.
@pranavmahajan1923
@pranavmahajan1923 2 месяца назад
Thank you sir🎉
@anweshamitra6714
@anweshamitra6714 4 года назад
really thank you so much sir....not only for this vdo am writing. Am writing for all the videos.... your teaching is really very clear amd it helps a lot. The way teach is just fabulous...
@prashanthkumar4222
@prashanthkumar4222 4 года назад
nice one sir it's helping a lot
@pramodwankhedewankhede8088
@pramodwankhedewankhede8088 4 года назад
Very nicely explained...thnx sir
@mehrajrizvi5117
@mehrajrizvi5117 3 года назад
Very helpful sir...thnx 👍
@amankaur2701
@amankaur2701 4 года назад
Really helpful vedio ✌️✌️
@activebrains9205
@activebrains9205 4 года назад
Excellent explanation....
@aninditasarkar7182
@aninditasarkar7182 4 года назад
Sir, One question In Replay Attack, if the sender sends its data in encrypted form, then how the attacker respond? Thanks for your video. :)
@kaiserhameed7799
@kaiserhameed7799 4 года назад
That depends,which type of mechanism we r using whether a symmetrical or asymmetrical,integrity is always there in symmetrical cryptography as keys are private and in case asymmetrical cryptography it depends whether the CT is decrypted by Private key or public key.If it is done by Private key then, there is an integrity.
@lakshmiduvvada8632
@lakshmiduvvada8632 4 года назад
Hi sir , Can you explain Types of Security attacks in cloud computing. Like 1.Hijacking injection 2.Data breach 3. Insider threat 4.malware injection 5.abuse of cloud computing 6.insecure APIs 7.Denial of services attacks 8.insuffient due diligence 9.share vulnerability 10.Data loss And some more
@kaifshaikh1049
@kaifshaikh1049 4 года назад
Helpful video 🙏🙏
@rajputak-47rajput37
@rajputak-47rajput37 4 года назад
Sir u r very intelligent
@kelly-wl8bv
@kelly-wl8bv 5 лет назад
supb sir👌
@shivanibondre1429
@shivanibondre1429 5 лет назад
Thanku thanku thanku🤗
@anuzpatel4518
@anuzpatel4518 4 года назад
Superb'
@sudhanshupal4427
@sudhanshupal4427 5 лет назад
Thanks a lot Sir !!!
@aishwaryapani1255
@aishwaryapani1255 4 года назад
Sir you are awesome
@anurup2002
@anurup2002 2 года назад
Thank you sir
@iqraamin1001
@iqraamin1001 3 года назад
Thanku sir G
@raghavrajput95
@raghavrajput95 Год назад
Sir barabar
@uiui995
@uiui995 3 года назад
thanks sir
@anugupta8257
@anugupta8257 4 года назад
Thank you so much. .sir
@Harshita_Bhardwaj
@Harshita_Bhardwaj 4 года назад
Thankuu so so so much Sir!!
@manish4275
@manish4275 5 лет назад
is it "relay" or "replay"? bcoz my college material has replay
@atul5082
@atul5082 5 лет назад
Its REPLAY
@tahaali01
@tahaali01 5 лет назад
its replay
@sanketvijayramteke7402
@sanketvijayramteke7402 Год назад
Replay
@sreeranjininair9439
@sreeranjininair9439 5 лет назад
Thnkuuuuu😇
@swapnilchilwant174
@swapnilchilwant174 4 года назад
Thank you sir!!
@DevelopWithAnurag
@DevelopWithAnurag 17 дней назад
5:20 Sir vo relay attack nhi vo Replay attack hota hain I'm a right.
@N0ob__0
@N0ob__0 3 года назад
Sir DDos (Distributed Denial of service )and Dos(Denial of service )ek hi attack hai ya alag alag hai
@MJ-fj3ev
@MJ-fj3ev 2 года назад
THANK U SO MUCHH
@bankingasipirant362
@bankingasipirant362 4 года назад
In replay attack, If the message send by A is encrypted so that C couldn't get the info in the packet ... Then How the replay attack possible coz C couldn't abble to Modify the message send by A Need to know plss ans ASAP!
@aniruddhsinh1655
@aniruddhsinh1655 4 года назад
Thanks sir 😊 🙏
@geetaghanti1171
@geetaghanti1171 3 года назад
tqsm brother
@owaisfatmi5680
@owaisfatmi5680 Год назад
Masquerade and relay both are same ???
@vilasjoshi
@vilasjoshi 5 лет назад
2:33 dhapa😂😂
@yogeshdahake3045
@yogeshdahake3045 4 года назад
Hahahah
@rohanthakur3609
@rohanthakur3609 Год назад
barabar
@muskanrath7125
@muskanrath7125 4 года назад
Hi, please post videos on Cryptanalytic attacks
@mussabafridi
@mussabafridi 2 года назад
tysm ily bro
@Kishankumar-zt1sj
@Kishankumar-zt1sj 5 лет назад
Ya pdar ka mza aya
@muhammadahsan7414
@muhammadahsan7414 4 года назад
Excuse me, sir, i have a question that in the relay type of an active attack, the third person takes the message from the way and modifies it & forwards it but how he takes that message from the way?? however, this message is directly going to receiver!!
@vlogs7750
@vlogs7750 3 года назад
Same question
@Shortskidda127
@Shortskidda127 2 года назад
there are serval ways to snoof a traffic in between traffic flow just take a look at snoofing section you will understand that. and about Taking data from a user and send it to be is also an example of PHISHING where A doesn't know to who he actually sending information.
@newlife779
@newlife779 2 года назад
Baraabar😆
@allyoursneeds7873
@allyoursneeds7873 2 года назад
❤️❤️❤️❤️
@muhammadadnanahmed4995
@muhammadadnanahmed4995 2 года назад
baraber baraber
@n_pcreation1682
@n_pcreation1682 8 месяцев назад
Hy sir aap notes do to hame exam me padhane me bhi Kam aayegi please sir 🙏🙏
Далее
OBLADAET - BARMAN
03:06
Просмотров 129 тыс.
Security Attacks
15:54
Просмотров 281 тыс.
Security Attacks in cryptography
10:55
Просмотров 279 тыс.