Monthly Archives: April 2014

PHP XSS Attacks

April 30th, 2014 📆 | 3896 Views ⚑

More videos like this online at http://www.theurbanpenguin.com Demonstrating the importance of sanitizing user data submitted with PHP forms we look

Tagged with:




Cyber Security

April 30th, 2014 📆 | 1867 Views ⚑

The tuition free international Master’s programme with two main specialties – Cyber Security and Digital Forensics – provides students with

Tagged with:




Fermat's little theorem | Journey into cryptography | Computer Science | Khan Academy

April 30th, 2014 📆 | 8280 Views ⚑

Introduction to a key result in elementary number theory using a visualization with beads Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/random-algorithms-probability/v/fermat-primality-test-prime-adventure-part-10?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed

Tagged with:




Sieve of Eratosthenes | Journey into cryptography | Computer Science | Khan Academy

April 30th, 2014 📆 | 3784 Views ⚑

Sieve of Eratosthenes allows us to generate a list of primes. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/comp-number-theory/v/trial-division-primality-test-using-a-sieve-prime-adventure-part-5?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson?

Tagged with:




The discrete logarithm problem | Journey into cryptography | Computer Science | Khan Academy

April 28th, 2014 📆 | 3679 Views ⚑

A mathematical lock using modular arithmetic Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange-part-2?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange-part-1?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan

Tagged with:




Diffie-hellman key exchange | Journey into cryptography | Computer Science | Khan Academy

April 28th, 2014 📆 | 3384 Views ⚑

Walkthrough of Diffie-Hellman Key Exchange Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/intro-to-rsa-encryption?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/discrete-logarithm-problem?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy:

Tagged with:




RSA encryption: Step 1 | Journey into cryptography | Computer Science | Khan Academy

April 28th, 2014 📆 | 3906 Views ⚑

Introduction to why we would need RSA Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/rsa-encryption-step-2?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange-part-2?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on

Tagged with:




Euler's totient function | Journey into cryptography | Computer Science | Khan Academy

April 28th, 2014 📆 | 5525 Views ⚑

Measuring the divisibility of a number Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/rsa-encryption-part-4?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/rsa-encryption-step-3?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan

Tagged with:




Public key cryptography: What is it? | Computer Science | Khan Academy

April 28th, 2014 📆 | 4273 Views ⚑

Why do we need public key cryptography? Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/discrete-logarithm-problem?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/the-fundamental-theorem-of-arithmetic-1?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on

Tagged with:




Copy of SQL Injections

April 28th, 2014 📆 | 3691 Views ⚑

http://www.techgig.com/expert-speak/SQL-Injections-529 One of the most notorious technique trouble almost all the application over the internet is SQL Injection. In this

Tagged with: