Using GPG

  Рет қаралды 89,669

Computer and Network Security

Computer and Network Security

Күн бұрын

Пікірлер: 37
@roy04
@roy04 4 жыл бұрын
This was the only informative video I could find. All others kept repeating asymmetric encryption part of PGP, without actually telling how I could use it using GPG
@ElidioRodriguez-i5q
@ElidioRodriguez-i5q 2 ай бұрын
Hagan famoso a este señor, es un genio y un verdadero maestro. Thanks Dr. Philip Craiger.
@craiger.computersecurity
@craiger.computersecurity Ай бұрын
De nada. No hay problema amigo.
@LoganSchmidt
@LoganSchmidt 6 жыл бұрын
At 12:15 you mentioned "not knowing why VMs" take longer to generate entropy on mouse movements. It's because the "mouse updates" are far less than with actual mouse hardware connected direct to a machine. To save on I/O, VMs push mouse control data at a lower rate, therefore generating less entropy when using mouse movements inside a VM.
@imthebearimthebear3316
@imthebearimthebear3316 9 ай бұрын
Filling in the gaps like a pro
@TheSkepticSkwerl
@TheSkepticSkwerl 8 жыл бұрын
Thank you for this video. The training video i first followed was extremely convoluted, and didn't explain everything well. You're the man!
@antongeorgiev1089
@antongeorgiev1089 7 жыл бұрын
Thank you for this! I think there's a typo In the slide from 1st minute: it says public keys are to decrypt, and private to encrypt. It's the other way around (as diagrams later show).
@An.Individual
@An.Individual 5 жыл бұрын
Well spotted. Private key does encrypt when signing a message but I doubt that is what he intended to say.
@WmTyndale
@WmTyndale Жыл бұрын
Outstanding Pedagogy!
@savithari
@savithari 6 жыл бұрын
Very nice video. Really well done. Thank You for this great video. One request. Where is the second part of the video ? This video seems to end quite suddenly.
@kode_kommando
@kode_kommando 7 жыл бұрын
Great video professor, really helpful.
@Drugvigil
@Drugvigil 7 ай бұрын
Can I publish in my website the public keys?
@eekeipoh
@eekeipoh 7 жыл бұрын
Thanks for this tutorial! Simply the best tutorial on YT :)
@gabrielmarianogarciatrejo7417
@gabrielmarianogarciatrejo7417 7 жыл бұрын
I loved it!! Thanks for your great explanation!!
@toovit2
@toovit2 3 жыл бұрын
THANK YOU !!!
@JoaoPedro-vo2qy
@JoaoPedro-vo2qy 2 жыл бұрын
I love you
@sarweshyanamala3100
@sarweshyanamala3100 3 жыл бұрын
Thank you so much..it's very usefull
@unknown-vq1gj
@unknown-vq1gj 4 жыл бұрын
amazing video!!! I can surely recommend!!!
@bethells86
@bethells86 Жыл бұрын
Well done
@nickme93
@nickme93 5 жыл бұрын
Amazing content !!
@albanschmidt3517
@albanschmidt3517 7 жыл бұрын
Is there a chance to generate the same unique key in two different computers since these keys are not compared anywhere, and would be the fingerprint the same (I'm just curious) ?
@federicocergol3597
@federicocergol3597 7 жыл бұрын
Yes, but the chances of that happening are astronomically low ( < 1/10^80 iirc)
@BartonChittenden
@BartonChittenden 6 жыл бұрын
To put that in perspective, there are about a trillion (10^13) galaxies in the observable universe with, let's say a billion (10^10) stars each. Let's say that each star has a planet that has a billion computers on it, and each computer is generating a billion keys a second (that's about 10^14 keys per computer per year), and each computer ir running for the age of the universe (about 10^11 years)... that only gets us up to 10^68, so we would have about a 0.0000000001 % chance of a collision.
@An.Individual
@An.Individual 5 жыл бұрын
@@federicocergol3597 The actual odds are FAR lower. The number you quote exceeds the entropy of a PC
@kilmet8
@kilmet8 6 жыл бұрын
Can you post a video on how to encrypt using a public key?
@charlie-bucket
@charlie-bucket 5 жыл бұрын
I think the publi key is only for decryption
@An.Individual
@An.Individual 5 жыл бұрын
most any encryption will use the public key
@emmanueltekalign1361
@emmanueltekalign1361 9 жыл бұрын
i can't acces my gpg it can't open the port plz can u help
@XieQiu
@XieQiu 8 жыл бұрын
Very clear. Thank you !
@Pompiduskus
@Pompiduskus 9 жыл бұрын
Thank you!
@stephenkamenar
@stephenkamenar 5 жыл бұрын
12:35 i guess the mouse movements weren't working jlkfjlkf
@vacagonzalo
@vacagonzalo 3 жыл бұрын
thanks!
@DarrellWiley-q1c
@DarrellWiley-q1c 2 ай бұрын
Hernandez Anthony Smith George Lee David
@jeniusfronter6104
@jeniusfronter6104 5 жыл бұрын
$ man gpg bash: man :command not found
@abddba6507
@abddba6507 6 жыл бұрын
رايع يدا و الر
@BensonCleveland-v4p
@BensonCleveland-v4p 3 ай бұрын
Taylor Brian Johnson George Williams Ronald
@MorleyJamie-t5k
@MorleyJamie-t5k 3 ай бұрын
Lewis William Martin Shirley Clark Carol
A Pretty Good Introduction to Pretty Good Privacy
53:22
thoughtbot
Рет қаралды 56 М.
Creating and Managing a GPG Key Pair
22:34
Nick Janetakis
Рет қаралды 75 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 36 МЛН
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 6 МЛН
Basic File Encryption with GPG key pairs!
8:36
Luke Smith
Рет қаралды 140 М.
Using GPG to encrypt and decrypt a file
18:07
Melvin L
Рет қаралды 80 М.
Public Key Cryptography - Computerphile
6:20
Computerphile
Рет қаралды 908 М.
Using SNORT
30:19
Computer and Network Security
Рет қаралды 118 М.
Encrypted files in Windows with GPG and Kleopatra
15:22
DFIRScience
Рет қаралды 77 М.
GNU Privacy Guard (GPG) Linux Tutorial
21:23
Alphatech
Рет қаралды 10 М.
Pass - The Standard Unix Password Manager
18:26
DistroTube
Рет қаралды 66 М.
Managing Your PGP Keys
22:19
Infosec Bytes
Рет қаралды 89 М.
Creating SNORT Rules
38:52
Computer and Network Security
Рет қаралды 130 М.
Introduction to IPTables
42:55
Computer and Network Security
Рет қаралды 109 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 36 МЛН