Channel Avatar

Tech Trek @UC3W_6qM443wTdhdNn4zdI8w@youtube.com

282 subscribers - no pronouns :c

Welcome to Tech Trek, your ultimate destination for cutting-


04:59
WIDE AREA NETWORK
05:07
METROPOLITAN AREA NETWORK(MAN)
05:10
LOCAL AREA NETWORK
04:42
INTRODUCTION TO COMPUTER NETWORKS
05:02
CAMPUS COIN IN BLOCKCHAIN
05:15
Understanding Tokens in Blockchain
05:23
HYPER LEDGER
04:13
FOLDING COIN
04:00
GRID COIN (BLOCKCHAIN)
04:15
BITCOIN
05:21
DIGITAL IDENTITY VERIFICATION
06:14
BLOCKCHAIN NEUTRALITY
05:06
Financial Services Blockchain
05:01
BITCOIN PREDICTION MARKETS
04:32
HOW A CRYPTOCURRENCY WORKS
05:18
INTRODUCTION TO CRYPTOCURRENCY
05:22
OVERVIEW OF BLOCKCHAIN
05:25
BLOCKCHAIN STRUCTURE
04:55
BLOCKCHAIN VS TRADITIONAL DATABASE
04:47
INTRODUCTION TO BLOCKCHAIN TECHNOLOGY
05:37
DIFFIE - HELLMAN KEY EXCHANGE ALGORITHM
05:10
WI-FI SECURITY PROTOCOLS
05:26
INTERNET PROTOCOL SECURITY
05:35
SSL/TLS HANDSHAKE PROTOCOL
05:01
FIREWALLS
05:31
AUTHENTICATION
04:25
DSA ALGORITHM IN CRYPTOGRAPHY
05:03
RSA ALGORITHM IN CRYPTOGRAPHY
05:57
ADVANCED ENCRYPTION STANDARD
05:12
DATA ENCRYPTION STANDARD
04:47
INTRODUCTION TO CRYPTOGRAPHY
04:30
BASIC TERMINOLOGIES IN CRYPTOGRAPHY
05:47
parallel processing
04:26
MEMORY HIERARCHY
04:19
PIPELINING
04:51
INSTRUCTION SET ARCHITECTURE
05:06
DATA REPRESENTATION
05:11
CPU ORGANIZATION
04:45
BASIC STRUCTURE OF COMPUTER
05:59
EVOLUTION OF COMPUTERS
05:31
OVERVIEW OF COMPUTER
05:29
CYBER CRIMINALS
04:56
BOTNETS
04:47
ENUMERATION
04:49
SPOOFING
05:21
SNIFFERS
05:21
ATTACK VECTOR
05:25
PROXY SERVERS AND ANONYMIZERS
05:20
RANSOMWARE
05:10
COMPUTER FORENSICS
05:17
EMAIL INVESTIGATION
04:17
eDiscovery
04:11
SQL INJECTION
04:48
ATTACKS ON WIRELESS NETWORKS
05:09
DOS AND DDOS ATTACKS
04:54
STEGANOGRAPHY
04:31
TROJAN HORSES AND BACKDOORS
04:19
VIRUS AND WORMS
05:31
SPYWARE
05:13
KEYLOGGERS