Very pleasing to watch your vids even though I got some knowledge (being a CS Student over in Germany, so greets from there ;) ) You guys really helped to still my hunger for DC stuff!
Thanks for the video! I've been watching the series on my machine at work to pass the time :) One small addition (correction?) - during the first stage of a TLS handshake, it is not "the whole message" that is encrypted with a public key. The Client is actually encrypting a Symmetrical key with the public key, and sending *that* back to the server. From that point on, the Client and Server both use the symmetrical key (which has been securely communicated via the public/private keys), which is much faster.
Love these bids also need a bit of help I use a dell power edge r710 running windows server 2012 r2 what kind of free security options do I have other than windows defender as my usual won’t work on it (avg and avast)
My goodness. In 2018 watched some really good videos you put out but there weren't many. Now there are plenty and I loved all of the ones I've watched. Thank you for the informational videos and behind the scenes looks. Keep em coming. Thanks again, from Texas.
How can a client verify that the certificate is from the correct server and is not spoofed,apart from verifying with CA verification or chain of trust.
@Custodian Data Centres, We had a gal explain Security with IT in a basic concept. We chose to use the analogy of Post Box offices to explain it. Where the Letter is placed in a box at the post office. The post office sends this off into a larger centre for sorting, where it is packed into a pallet. This pallet contains the 'address' and once it is unloaded at the right node, the box specific address is read and sent along. Till it makes its hands to the recipient vice versa.