Dude. Awesome explanation. I have a test tomorrow on this and you just saved me so much time. YOU ROCK!
@inarisound2 жыл бұрын
Florian, thank you so much for your great content/work, I really appreciate how you present information
@TheRagreis3 ай бұрын
The perfect tutorial!!! Thanks
@greatindia6330 Жыл бұрын
Thank for this
@yonatanbeyn85572 жыл бұрын
Very interesting Florian.
@angeloreyes7072 жыл бұрын
Why would we go with DES-3? Isn' that out dated?
@jissoune20092 жыл бұрын
Great job thank you !
@guilherme50942 жыл бұрын
Thanks!
@dafenshi24782 жыл бұрын
I love to watch you
@JarppaGuru8 ай бұрын
10:17 could use ceasar with key xD and postcard
@JarppaGuru8 ай бұрын
3:40 thats new file they not match. you can remove password and make other copy. so both with password and not password can decrypth same file and you not need give passphrase for first option too . before it was rsa now its genrsa. so what next command that do same thing and allways ssh-keygen do same things after pull hait off. it do if make so LOLsure it use same programs do it
@thepaulcraft9572 жыл бұрын
I think your account got hacked. There are some unusual answers to comments
@imdapoyoguy Жыл бұрын
Banana🍌
@JarppaGuru8 ай бұрын
and will decrypthing work after 5-10 years when they constatly update and couple year old command say deprecated. meaning it will moved lated should use new methods. could be freaky all crypted files. sry im linux you cant decrypth with this key LOL
@JarppaGuru8 ай бұрын
9:55 its public key there is non lol, but will another linux handle it it allways hair pulling. there is no backward compatibility and we just trust fine we encrypt LOLbut its fine woprks on single use messages. would not trurst my file on linux. update.....no boot. what its linux should not do this. windows not do it LOL
@JarppaGuru8 ай бұрын
11:19 its rsa you show public key and n is public and we can generate private key after fin p and q LOL. n is embed on public key now lets crack rsa LOL your rsa implemation suck that bad why n is public lol
@JarppaGuru8 ай бұрын
very useful if commands you using not recognice public key openssl rsa -pubin -in public.key -out public2.key -RSAPublicKey_out openssl rsa -pubin -in public.key -out public2.key -RSAPublicKey_in now have both -----BEGIN RSA PUBLIC KEY----- -----BEGIN PUBLIC KEY-----