Channel Avatar

Pritesh Prajapati @UCNwgIYqMd5FOrSK9JY9-y_A@youtube.com

2.6K subscribers - no pronouns :c

WARNING: "Please note, these videos are just for educationa


01:31
AES Mix Column Example with GF(2^8) Polynomial Method
32:01
NAT, Bridged and Internal Networking in VirtualBox
07:20
#PNP CryptoCalc-App-Demo
01:18:47
2. Classical Encryption Techniques
01:07:28
11. RSA Summary and Examples || Open SSL
01:10:00
10. Public Key Crypto with RSA
37:06
12. Attacks on Diffie Hellman Key Exchange
01:08:20
9. Fermat's Theorem, Euler's Theorem and Discrete Logs
01:09:39
8. Divisibility, Primes and Modular Arithmetic
58:54
Bitcoin (Part 2)
01:40:31
Bitcoin (Part 1)
57:57
7. Pseudo Random Number Generators
01:14:33
Internet Privacy with Proxies, VPNs and Tor (Part 2)
01:31:01
Internet Privacy with Proxies, VPNs and Tor (Part 1)
01:01:07
6. Block Cipher Modes of Operation
02:58
FileZilla for File Transfer with Linux in VirtualBox
04:49
Best Ever Google Doodle | Let's Play ICC Champions Trophy 2017 | 200 Runs | Double Century
07:17
Cyber Law || Information Technology Act 2000 || Cyber Crimes | Cyber Frauds
11:02
Interpersonal Issues Online | Cyber Security
10:03
Reading URLs | Cyber Security
14:57
Social Engineering | Cyber Security
10:01
Social Media and Privacy | Cyber Security
10:42
Social Media and Security | Cyber Security
34:03
Wireless Network | Security Threats | Public Networks | Administering Wireless | Cyber Security
46:28
How Web Browsing works? | Safely Navigating the Web | Online Shopping | Cyber Security
40:47
Malware, Functions of Malware, Sources of Malware, Layers of Defense Against Malware |Cyber Security
22:58
How Email Works & Email Security | Cyber Security
29:14
Passwords | Hash Function | Common Password Threats | Cyber Security
13:45
Creating, Managing Strong Passwords | Cyber Security
33:30
Demystifying the Internet || About Internet || Cyber Security
21:12
Demystifying Computers || About Computers || Cyber Security
15:58
Cyber Security Terminology
06:40
Why Study Cyber Security?
11:00
#PNP #13 #SQL Injection Attack in Virtual Network
49:05
Introduction to Firewalls
44:34
5. Simplified Data Encryption Standard (SDES) | Simplified DES | With an Example
01:09:21
4.Transposition Ciphers and Steganography
01:13:49
3. Caesar Cipher
34:02
#PNP #12 #Wireshark - Packet Capture - Tutorial
50:33
1. Introduction to Security
03:41
What is a Blog?
09:47
CyberSecurity Definitions
09:54
Free Step by Step Guide for e-Filing Income Tax Return (ITR) Online (India)
01:17
Learn Hill Cipher in 76 Seconds only || With 3x3 Matrix Multiplicative Inverse Example in Mod 26
11:15
Hill Cipher || With 3x3 Matrix Multiplicative Inverse Example in Mod 26
01:48
Known Plaintext Attack || Chosen Plaintext Attack
04:00
Caesar Cipher || Shift Cipher || Additive Cipher
01:08
What is Penetration Testing?
16:26
Public Key Cryptography: RSA Algorithm
07:30
How to Secure WordPress with Better WP Security Plugin ?
06:27
Why Physical Security and Password are Important ?
03:55
Why is Information Security Important ?
11:43
#PNP #10 #Parrot Security OS 2.1 Installation Steps in Virtual Box - Hacking OS - Tutorial
04:19
#PNP #01 #Kali Linux 2.0 Installation Steps in Virtual Box - Hacking OS - Tutorial
02:59
#PNP #06 #Nmap - Network Mapper - Kali Linux - Hacking OS - Tutorial