Пікірлер
@pjf7044
@pjf7044 Күн бұрын
Awesome video !
@sharonbaker9278
@sharonbaker9278 20 күн бұрын
What a great video
@user-ev6fj4bt7x
@user-ev6fj4bt7x Ай бұрын
Great video, helped a lot!
@kellymoses8566
@kellymoses8566 Ай бұрын
I've never heard of any ransomware that was able to delete snapshots on a enterprise storage array like Pure, EMC, Infinidat, Netapp, etc.
@novianindy887
@novianindy887 Ай бұрын
is it ever flagged by antivirus ? did you find any AV flagged it?
@practicing1
@practicing1 Ай бұрын
Excellent video
@ehasaranga
@ehasaranga Ай бұрын
Thanks for the knowledge. Was looking for this explaination for a while now.
@rodneyarnold8110
@rodneyarnold8110 2 ай бұрын
This was a fantastic explanation. Thank you!!
@ptsai514
@ptsai514 2 ай бұрын
Great video. This helps me on MFA requirements.
@suxrob1884
@suxrob1884 2 ай бұрын
IBM laboratory online use ?
@dandele123
@dandele123 2 ай бұрын
Subbed, awesome content mate
@bardockecool
@bardockecool 3 ай бұрын
hi i have a very specific ctf that i just cant get my head around wouldyou be interested to take a look ,, all examples i find seem to have more misconfigs
@lightningninja8585
@lightningninja8585 3 ай бұрын
Good point! Would you say that creating an inventory can only be done by cybersec professionals, or are there tools available to do it as a private person in small companies/ IT systems?
@jorgebarroso2496
@jorgebarroso2496 3 ай бұрын
Great video! I have just started working around DNS tunneling and your video was very helpful :)
@paulstubbs7678
@paulstubbs7678 4 ай бұрын
It would be nice if websites gave the user the ability to enable the mitigations as shown here, for instance I'd be mostly fine if I have to re-login on IP address changes. I'm a residential user, so yes my address does change, but not that often. Actually that would be a lot less of a pain than the two factor authentication stuff being forced on me, as in their version with no options.
@mylife3003
@mylife3003 4 ай бұрын
Good
@denverm7909
@denverm7909 4 ай бұрын
Hi, please, if we think the cookies get hacked, what we do? please, thanks
@GOTHAM21
@GOTHAM21 4 ай бұрын
Yes, more detail on virtual monitoring, please.
@johnkrishnay6607
@johnkrishnay6607 6 ай бұрын
We need more about lattice based cryptography sir
@EXQEX9
@EXQEX9 6 ай бұрын
This content is great brother, thank you so much for making it! I'm learning so much, my imposter syndrome might just vanish someday! Lol.
@rogue3123
@rogue3123 6 ай бұрын
Excellent video, great explanation
@thiagogo1995
@thiagogo1995 6 ай бұрын
Great video! Thanks a lot!
@PritiKumari-sb3mx
@PritiKumari-sb3mx 7 ай бұрын
why are you using RSA when creating Chain of Trust?
@user-ue1vp1ep8q
@user-ue1vp1ep8q 7 ай бұрын
I am impressed by your work..i wanted to know like ..do you have a roadmap into hacking ?
@keshavsingh2411
@keshavsingh2411 7 ай бұрын
can anybody guide me how to install liboqs please, i am trying for the past month and not a lot of resources available. Getting multiple errors and in the end when i use it with python code it says import oqs module not available
@robcab3725
@robcab3725 7 ай бұрын
these videos are great ! what's next ? more implementation vids ?
@robcab3725
@robcab3725 7 ай бұрын
p256 mentioned at ~10:00
@Heeby-Jeebies
@Heeby-Jeebies 8 ай бұрын
Your presentation is clear, concise, and very well laid out. Thanks!
@PubRunner
@PubRunner 8 ай бұрын
I have a web server running that has a gps server that has a self signed certificate and I use TailScale to bypass where I works firewall that disallowed connections to sites with self signed or invalid certificates. While what I am running is benign, I could in theory and anything running. I also use TailScale to access Files I need from time to time that I don’t want to keep a copy on the laptop (which I own) that I use for work. I cannot connect to my GPS server at all if I use its full URL but can if I use its local host name of their network. I use my GPS server to calculate mileage on my personal vehicles which I get compensated for use during work hours and I can prove my location and route between sites if that is ever questioned. I should also add that the portion of the network I have access to at where I work isn’t the main secure backbone only authorised company owned PCs have access that.
@parkrw
@parkrw 8 ай бұрын
I'm trying to run "docker run - p 4433:4433 -v --------------" to see the " Welcome to Nginx !!" but I have met some error , like belows prw@prw-5:~/oqschrome$ docker run -p 4433:4433 -v `pwd`/server-pki:/opt/nginx/pki -v `pwd`/server-conf:/opt/nginx/nginx-conf openquantumsafe/nginx error message is here,, 2023/11/23 04:10:10 [emerg] 1#0: SSL_CTX_set1_curves_list("p256_kyber90s512") failed (SSL: error:0A080106:SSL routines::passed invalid argument:group 'p256_kyber90s512' cannot be set) nginx: [emerg] SSL_CTX_set1_curves_list("p256_kyber90s512") failed (SSL: error:0A080106:SSL routines::passed invalid argument:group 'p256_kyber90s512' cannot be set)
@topleads9748
@topleads9748 8 ай бұрын
Bro, Never give up making these videos....I been doing Cyber sec for almost 2 years got security+ and Google cert...and your videos got more meat that all those certs...Thanks a lot...
@topleads9748
@topleads9748 8 ай бұрын
Thank You! you rock
@parkrw
@parkrw 8 ай бұрын
quite interesting , thanks for full explanation
@Rundik
@Rundik 8 ай бұрын
Maybe we should layer different encryptions. It gives us same security as we currently have and will provide quantum resistent as well. So for example in a key exchange we could compute a common key for each encryption and then combine them (bitwise or something like that).
@SergenK
@SergenK 9 ай бұрын
how could I create files that are quantum encrypted using liboqs?
@rabitsec
@rabitsec 9 ай бұрын
great video man ... wait for new ones.. thanks
@VIPMakhana
@VIPMakhana 9 ай бұрын
Thanks mate!
@boolve
@boolve 9 ай бұрын
I do like you enthusiasm. Well done. Carry on. Myself looking at those videos as a beginer security ethusiats, more simplistic approach are welsom for upcoming videos. thanks.
@wendy_113
@wendy_113 10 ай бұрын
I appreciate your help so much.
@cafeden6868
@cafeden6868 10 ай бұрын
Wow, such a high quality information and presentation. Thank you.
@LryuzakiLN
@LryuzakiLN 11 ай бұрын
Can you do a video on how to use it with Nginx? Thanks!
@muhammadhassoub299
@muhammadhassoub299 11 ай бұрын
Thanks for the great video ❤
@MrSuhailmt
@MrSuhailmt 11 ай бұрын
Great information delivered in exceptional quality. Superb.
@CallName-zm1cd
@CallName-zm1cd 11 ай бұрын
One video only I got what I wanted. thanks
@tihanswanepoel7629
@tihanswanepoel7629 11 ай бұрын
Thanks for videos, so interesting!!
@para-be4bf
@para-be4bf 11 ай бұрын
Incredible video!!
@BDCAT-PhamThiThuHa
@BDCAT-PhamThiThuHa 11 ай бұрын
I created a service but when I restart my computer this service not running. Whyyyyy ??😇😇😇
@lancemarchetti8673
@lancemarchetti8673 11 ай бұрын
Great upload Andy! Today I found out the hard way that a Fisher-Yates shuffle cannot be 'unshuffled' unless you know the sequential key that was applied in the original shuffle. After getting ChatGPT4 to understand my predicament, it's response was the following: 'While it is not impossible that your obfuscated Base64 string can be reconstructed, it is highly unlikely due to the length of the string being 116 characters in length. To break it down mathematically: For a 116 character Base64 string that has been shuffled, it would take approximately 9.4x10^197 random tries on average to shuffle it back into it's original order, without the shuffle key. So it turns out that my idea to shuffle Base64 data for obfuscation purposes is pretty solid. Unfortunately I had to trash my shuffled Base64 string because I forgot to save the key sequence to a separate file. So it was basically useless. Your thoughts would be appreciated
@lancemarchetti8673
@lancemarchetti8673 11 ай бұрын
Most insightful
@lancemarchetti8673
@lancemarchetti8673 11 ай бұрын
Nice