Пікірлер
@TriPham-j3b
@TriPham-j3b 2 күн бұрын
Sensitive information like banking , airline , or works are better had separate internal email for each member and client so better communication. It cost less than data breach
@LeenaKamran
@LeenaKamran 2 күн бұрын
Amazing explanation. Thank you so much!
@MustafaHoda
@MustafaHoda 15 күн бұрын
Lovely!
@ombhamare522
@ombhamare522 23 күн бұрын
Another way of shrinking down the requirement of 5 different email ids to 3 is by combining personal and financial together Social Media and shopping together, important newsletters Junk, high risk or random website sign ups.
@MADDILAKSHMINARAYANA
@MADDILAKSHMINARAYANA 23 күн бұрын
kept a great effort in video editing...very well explained...Thank you for easy understanding
@fourzerothree
@fourzerothree 23 күн бұрын
Glad you liked it.
@vimalchawla6740
@vimalchawla6740 24 күн бұрын
Too fast. You could hve slowed down and explained it better... slides are very nice
@hasanusllu
@hasanusllu 26 күн бұрын
Great explanation form indian guy! Thanks sir
@EugeneLeslieAcquaye
@EugeneLeslieAcquaye 27 күн бұрын
3:32 has got my head spinning haha
@InformativeResearch-bt3su
@InformativeResearch-bt3su 27 күн бұрын
Would gaming fit in the social category or should I create a new category?
@fourzerothree
@fourzerothree 26 күн бұрын
At the end of the day there are no hard and fast rules. The idea behind the whole email hygiene concept is to prevent as much damage as possible if your email address gets breached. Having said that, I would recommend to always keep social separate. Don't use your social media credentials for anything else.
@user-ff3su7rf6b
@user-ff3su7rf6b 29 күн бұрын
accent.. so hard to understand. Thanks for the subtitles
@k.k.harjeeth5422
@k.k.harjeeth5422 Ай бұрын
GREAT !
@EyosiyasDemsew
@EyosiyasDemsew Ай бұрын
Thank you for this video!
@EyosiyasDemsew
@EyosiyasDemsew Ай бұрын
3:19 "Ip address of google for God's sake" killing me lol it should say so after requesting to all bunch of these requests 😂
@Azam0244
@Azam0244 Ай бұрын
i have one account for my social media and banking the second one is for junk things and emails 3rd one extra which is i never use for anything yet thats it ! its simple
@baasithfazil498
@baasithfazil498 Ай бұрын
Great explanation and visual .
@yunmulu1659
@yunmulu1659 Ай бұрын
thank you. I understood without using much brain energy
@avantijoshi1488
@avantijoshi1488 Ай бұрын
The whole logic makes sense in every way.. only difficult to implement it. Nice video creation and simple language of explanation.
@abhineetsaxena8310
@abhineetsaxena8310 Ай бұрын
Searching for best explanation stopped here ! Great content
@faizizsnacks
@faizizsnacks Ай бұрын
happili can accept and digest, me from Pak lol (lots of love)
@prakritisaraf6124
@prakritisaraf6124 Ай бұрын
super crisp and clear!
@106_mugdhahazra3
@106_mugdhahazra3 Ай бұрын
content is amzing but the background music is very irritating
@fourzerothree
@fourzerothree Ай бұрын
Hey thanks for the feedback. Yes, I have since toned down on the background music in my other videos.
@richardzysk
@richardzysk Ай бұрын
man , u did a great job, fab fab ❤❤
@stalkerofintellect
@stalkerofintellect 2 ай бұрын
very good thanks for video
@scottxiong5844
@scottxiong5844 2 ай бұрын
Woot woot! Good video! Keep it up!
@Abhinavkumar-og3xd
@Abhinavkumar-og3xd 2 ай бұрын
Please say in hindi.
@Abhinavkumar-og3xd
@Abhinavkumar-og3xd 2 ай бұрын
Please speak in hindi.
@shivamrunthala2165
@shivamrunthala2165 2 ай бұрын
Writing my Master's thesis on the cookie less world and this was the best explanation I found. Looking forward to more content on the future of digital advertising and possible substitutes of the cookies.
@peacefulcat3578
@peacefulcat3578 2 ай бұрын
it's always a random KZbinr that saves the day. But the quality of the animation... it is so great that it's hard to believe you have so little subscribers. Anyway, thanks a lot.
@hemasundarkasturi5439
@hemasundarkasturi5439 2 ай бұрын
we need more videos like things ❤❤❤❤❤
@JashanKapoor-ug8ih
@JashanKapoor-ug8ih 2 ай бұрын
The great explanation and presentation!
@W_gang
@W_gang 2 ай бұрын
N1
@40and42
@40and42 2 ай бұрын
Well done job!!!!!!
@thellaidhinesh8929
@thellaidhinesh8929 2 ай бұрын
Wow. Great visual works and explanation. Thank you !!
@pranavarshnukala8931
@pranavarshnukala8931 3 ай бұрын
loved the way u explained like a piece of cake
@isabear478
@isabear478 3 ай бұрын
Would you say siging in with google is better because their was no password created for the account but then you depend on your email
@РассадинАлександр-к6к
@РассадинАлександр-к6к 3 ай бұрын
Great video! It is a good work.
@РассадинАлександр-к6к
@РассадинАлександр-к6к 3 ай бұрын
There are many wise adn useful advices in this video. Thank you!
@DuraiRaj-ve7qv
@DuraiRaj-ve7qv 3 ай бұрын
Can anyone tell the name of the software that he used to show request and response?
@fourzerothree
@fourzerothree 3 ай бұрын
Portswigger's "Burp Suite"
@sebs178
@sebs178 3 ай бұрын
very nice video
@minecakechase20
@minecakechase20 3 ай бұрын
Does anyone have a link to that podcast episode? I went looking for it and while I could find it in a list of episodes of the podcast, I couldn't find an actual audio recording anywhere
@GG-vh8kz
@GG-vh8kz 4 ай бұрын
Excellent videos!
@SuperMaker.M
@SuperMaker.M 4 ай бұрын
perfection!
@rodneyvalentine1345
@rodneyvalentine1345 4 ай бұрын
Wonderful explanation
@alittax
@alittax 4 ай бұрын
If one email address is the recovery address of all others, and one of them gets hacked, doesn't the hacker see the email address that was set as the recovery email address for the hacked email address? Perhaps one way of solving this would be the following: X would be the recovery email address of one half of your normal email addresses (A, B, C), and Y would be the recovery email address of the other half of your normal email addresses (D, E, F). Z would be the recovery email address of X and Y. All of these email addresses would have randomly generated passwords with the longest possible lengths. So they would be as secure as possible. If someone breaks into A, they will know about X, and if they break into X, they will know about B and C. But, they won't know about Y, D, E, F. They must first break into Z as well. So, in order to hack into all of your accounts, they'd have to figure out at least three passwords which are the most difficult to break. And how would you log into these email addresses? You'd have email address O, which you'd log into every time you'd want to log into any of the other accounts. You wouldn't use it for anything else. It would have a difficult, but easy to remember password. It wouldn't be the recovery email address of any of the other email addresses. What do you think?
@mohamedchatila-xy6tg
@mohamedchatila-xy6tg 4 ай бұрын
never commented on a youtube video but this explanation needs it. top one
@ExtremeRidersJodhpur
@ExtremeRidersJodhpur 4 ай бұрын
Explain cookies hijacking by hackers!
@RashadPrince
@RashadPrince 4 ай бұрын
This is awesome and I hope you take your own advice from the example with Gary Vee #patience 🙏 Subscribed and looking forward to more 😊
@mananahuja4656
@mananahuja4656 4 ай бұрын
great video!!
@sahasplays934
@sahasplays934 4 ай бұрын
Good and crisp explanation. Well done 👏
@Aiz3nSk
@Aiz3nSk 5 ай бұрын
zbii slow down nikmok