You've done a great job explaining unexplainable! Thanks. Very thorough step by step tutorial based on examples for non-tech human beings.
@LearnCantrill2 жыл бұрын
thanks for the comment, glad you're enjoying the videos.
@Hari-q5b Жыл бұрын
I understood,, it was simple and straight forward ,, Thank you so much
@tameramin9216 Жыл бұрын
great work, great knowledge and great teaching
@LearnCantrill Жыл бұрын
Glad you liked it!
@nassozeebo11 ай бұрын
The hashing of passwords example seems a bit odd to me. It says that the client will hash the password and send the hash to the server. That seems like a bad practice. If an attacked gains access to the hashes of the server, they can just act as the users by sending the hashes that they gained access to, to the server. The better way would be for the client to send the password to the server (encrypted, over https or similar) and for the server to hash the password and then compare that to the stored hash. That way, the attacker won't gain access to anything if they gain access to the hashes (unless they bruteforce them). If the client sends the has to the server, the attacker is free to use the hashes to impersonate the user. When sending the hash from the client to the server, you have basically "gone full circle" and would have the exact same problem as you have when you store passwords as clear text in a database. Great video though. Love it! :) Many thanks. Deserves waaay more views.
@_ABHITIWARIАй бұрын
I thought the same that if that company's server gets hacked then the hacker can get the hash value and by login in theough hash value the server will let him in, it is nothing hut a apassword of password
@cgcrack46722 жыл бұрын
Hi,what caused the collision?
@LearnCantrill2 жыл бұрын
it was artificially generated, check the links attached to the video for details about how this is done. The issue is that it shouldn't be possible with a hashing algo which is working correctly.
@cgcrack46722 жыл бұрын
@@LearnCantrill yh,I will check the resources you added, please upload more videos like this. algorithms and data structures and diffrent methods of data processing very informative, thank u
@gauravgoel25972 жыл бұрын
How does the unhashing work on system?
@LearnCantrill2 жыл бұрын
you cannot 'unhash'
@gauravgoel25972 жыл бұрын
@@LearnCantrill thanks for the reply, understood, basically the actual data is never compared it is the hash value which is stored and compared.
@nassozeebo11 ай бұрын
@@gauravgoel2597 When you need to compare a value to a hash, the server has to first hash the value, using the same method as the has that it will be compared to was hashed. For a login: * user sends a password to the server * the server hashes that password and gets Hash A * the server loads the password hash for the user from the database; Hash B * If Hash A exactly matches Hash B, the user is authenticated And not password needed to be stored in the database, just a hash of the database. The password hashing example in the video is unfortunately a bit misleading.
@joshuaschmidlkofer97842 жыл бұрын
Imagine my surprise when I noticed your PowerLevel10k shell prompt - complete with emoji.
@LearnCantrill2 жыл бұрын
Is there any other way ?
@echongkan018 ай бұрын
Like No. 256 :-p which could be written as # (hash) 256 lol
@datvuong7420 Жыл бұрын
total number of data is a, total number of hash values is b, what if a>b. then two pieces of data could have the same hash???