can you change the width of the cutouts around the traces?
@Arthur-ib2kq6 ай бұрын
Thx a lot dr.ryan , this video helps me to pass my exam.
@JagjitJaggi-mk3de7 ай бұрын
Thx ji❤❤
@Christian-bv7yk9 ай бұрын
Dude your tutorial is great I love it! It helps me much!
@spudnickuk Жыл бұрын
Your tutorial is great as didn't know about the ground and voltage connection for which I struggled with
@umerfarooq9828 Жыл бұрын
Great video Sir! Very easy to understand.
@PavelGnatyuk Жыл бұрын
Fixed sample for 1:56: ``` #!/usr/bin/env python import hashlib m = hashlib.sha256() m.update("Hello".encode('utf-8')) m.update("Bye".encode('utf-8')) print(m.hexdigest()) ```
@danielamtz3614 Жыл бұрын
Hi, I need help. I can't figure out why on my printed circuit board, I keep getting the warning of missing and/or incomplete external milling paths. I'm new to Fritzing.
@newdehan38892 жыл бұрын
How technical bob get a key ?
@kristiannn572 жыл бұрын
You have a gift, the way to teach is remarkable. I've been wathing many other videos and they are all very confsing and lack rebustness. Your videos are clear and full of terrific examples, cannot get any better....well done and thank you!
@samueloyinlola89142 жыл бұрын
can anyone help with computer security assignment
@abbasalirezaei68172 жыл бұрын
Hi, thank you for sharing these videos ... where can I find these slides?
@bernym40472 жыл бұрын
Excellent. Thank you.
@LexChanKlaus2 жыл бұрын
HI, Could I know how to increase the speed of UDP Port Scanning? Thanks!
@hassanlearning40862 жыл бұрын
Thank you. You make it so easy to understand.
@BambiOnIce192 жыл бұрын
So is the entropy source then the source that produces like a random sequence of something?
@BambiOnIce192 жыл бұрын
So the keys need to be random, as in, there is absolutely no pattern (no repetition), and therefore it is unbreakable? :)
@BambiOnIce192 жыл бұрын
These brute force attacks... they don't sound very elegant, really. Surely there can be other ways to attempt to break the patterns...
@BambiOnIce192 жыл бұрын
It seems to me it is all about the patterns...:)
@BambiOnIce192 жыл бұрын
By that logic, you would want to create a cipher where the pattern is not detectable?
@BambiOnIce192 жыл бұрын
so you are looking for patterns to break the cipher?
@BambiOnIce192 жыл бұрын
so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?
@poiuqwerty11592 жыл бұрын
thank you very much dr
@humairamunawar22812 жыл бұрын
Best Explanation👍
@spearchew2 жыл бұрын
Fantastic
@dahoyasmine22482 жыл бұрын
Thank you so much!
@meesiphht27692 жыл бұрын
Is someone talking?
@junaid_qadir2 жыл бұрын
oh wow wow what a nice lecture. You have made it super easy like learning the alphabet "ABCDE....". Can you give us an example in Python code of how to implement it in code?
@jimparlett40992 жыл бұрын
Am I missing something? You wanted to connect C1 ground to U1 ground and struggled to find a path, but C2 ground was already connected to U1 groiund, so why didn't you connect C1 ground to C2 ground on the top or bottom layer, and then you'd have been there?
@Nerd41412 жыл бұрын
Where can i get your full lectures on cryptography 😭😭 please sir your videos so good ,i have exams in 10 days i need your lecture videos please share
@ryanriley55912 жыл бұрын
I don't have longer versions of these videos, but you can use this playlist to see the things I do have broken out by topic: kzbin.info/aero/PLBNihd1niYHuEGTj1GS3ZhTYDt6PxkyY7
@Rafat.M.Shaker2 жыл бұрын
Thank you!
@Rafat.M.Shaker2 жыл бұрын
Thank you!
@saarzaradez83 жыл бұрын
Thank you for this! Great explanation!
@quocbaonguyenluu65983 жыл бұрын
Thank you professor. It is still a good lecture in 2021. Very clear and easy to understand.
@Derbauer3 жыл бұрын
The audio is almost a whisper, unfortunately that means i cant hear it clearly on my Samsung phone at full volume.
@bolibardo15143 жыл бұрын
Good video. I learned the basics as a beginner. Thanks.
@arundhatipatil73913 жыл бұрын
How do I get the components to be coloued?
@Luca-gb1og3 жыл бұрын
Thanks buddy, the best video regarding this topic by far! You helped me a lot for my presentation
@reubydoobydoo13833 жыл бұрын
Thank you sir! Im doing a cryptography class at university and your way of explaining things is really helping me understand the content. I really appreciate it
@ShermanSitter3 жыл бұрын
126 Likes, 2 dislikes... = 128 bit encryption? :)
@ShermanSitter3 жыл бұрын
This was amazing, thank you! Are there any good video series that show the math behind more of these theories? Or how to create such systems in code? That would be interesting as well.
@ryanriley55913 жыл бұрын
I appreciate your kind words. You should check out the wikipedia articles on the topics you are interested in. They are very well done, and tend to contain both the math and some sample implementations.
@maxpolaris994 жыл бұрын
Anyone know how to move all parts that were previously selected as all? Like lining up circuit fragments relative to each other.
@bensmith92534 жыл бұрын
This video is GOLD
@Msg89815247804 жыл бұрын
Simple and Nice
@fayfeld59004 жыл бұрын
Thank you very much, Ryan! I woudn't have believed, someone could teach me the basics of PCB-Design in just 3 videos within an hour. But you did!
@ryanriley55914 жыл бұрын
I'm glad I could help! I wish I could take credit, but the truth is that if you already have a basic background in circuits/schematics, then basic PCB design isn't hard at all.
@fayfeld59004 жыл бұрын
@@ryanriley5591 Feel free to take these credits! What i meant was observing and following the whole process after(!) seeing some stuff running on the breadboard. I got my hands on the great Fritzing, but i think, its not that explanatory as a beginner would need. IMHO, they may have arragend the panels in the wrong order.. :-) The schematics should come first, followed by the breadboard (b.t.w. called "Steckplatine" in my german version...) I also got furios, when i tried to change the capacity-value of C3, but a moment later i learned, that this is a 'normal' Fritzing's behavior and how to work around. This was extremly useful! So thanks for that! And now i am looping over your 555-Lesson. Just to understand, what i (or we) actually did there an hour ago... :-)
@einsteinwallah24 жыл бұрын
i downloaded keepassx software for windows ... it is available as zip of binaries etc ... how do you verify sinatures ... currently (2020-09-24) it shows a line like following: All downloads and Git tags are signed with the key 164C70512F7929476764AB56FE22C6FD83135D45 what does it mean and how i can use them to verify ... of course it has another link to a folder with a bunch of files and .sig files ... clicking on a .sig files simply saves it ... my problem is if verifying needs a software then that software itself may infect my computer ... i am irritated by whole bunch of software publisher giving these verify secion without any instruction on how to use them ... would it not be nice if i download a file or zip and upload to some site giving link to web page downloaded from and let that site determine integrity of software? like hybrid-analysis site does?