Computer

Hashing Algorithms and Security – Computerphile

Audible free book: http://www.audible.com/computerphile
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out.

More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott

http://www.facebook.com/computerphile

This video was filmed and edited by Sean Riley.

Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/

Computerphile is a sister project to Brady Haran’s Numberphile. See the full list of Brady’s video projects at: http://bit.ly/bradychannels

Products You May Like

Articles You May Like

FTX Disaster – 7 Unbelievable Bankruptcy Discoveries
What’s A Rescue Swimmer? – U.S. Coast Guard – Smarter Every Day 279
A Change to Togetherness: How to Make Change Through Adversity | Nick Watson | TEDxOudMetha
The Deepest Hole in the World, And What We’ve Learned From It
How To Capture Black Holes

Leave a Reply

Your email address will not be published. Required fields are marked *