Computer

Hashing Algorithms and Security – Computerphile

Audible free book: http://www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.

More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott

http://www.facebook.com/computerphile

This video was filmed and edited by Sean Riley.

Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/

Computerphile is a sister project to Brady Haran’s Numberphile. See the full list of Brady’s video projects at: http://bit.ly/bradychannels

Products You May Like

Articles You May Like

Why People Pleasing is Hurting You | Salma Hindy | TEDxUofT
Lawrence Krauss: Quantum Computing Explained | Big Think
10 Paranormal Abandoned Haunted Houses
Three strange river crossings
Why write? Penmanship for the 21st Century | Jake Weidmann | TEDxMileHigh

Leave a Reply

Your email address will not be published. Required fields are marked *