Computer

Hashing Algorithms and Security – Computerphile

Audible free book: http://www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.

More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott

http://www.facebook.com/computerphile

This video was filmed and edited by Sean Riley.

Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/

Computerphile is a sister project to Brady Haran’s Numberphile. See the full list of Brady’s video projects at: http://bit.ly/bradychannels

Products You May Like

Articles You May Like

Atari 2600 VCS & Adventure – Computerphile
Could You Survive ALIEN?
Split The Square Game #shorts
Footnote †: Unstable Equilibrium
Spinning Tube Trick Answer

Leave a Reply

Your email address will not be published.