MoviesDB

accidentally racist - Order by Related Videos

NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)

Channel: Sundeep Saradhi Kanthety & Total View: 44440


Tags:
SUNDEEP, SARADHI, KANTHETY, CONFIDENTIALITY, INTEGRITY, AUTHENTICATION, ENCRYPTION, DECRYPTION, SECRET KEY, INFORMATION SECURITY, IP SECURITY, AH PROTOCOL, ESP PROTOCOL, AUTHENTICATION HEADER, ENCRYPTION ALGORITHMS, AUTHENTICATION ALGORITHMS, KEY MANAGEMENT, OAKLEY, ISAKMP, UNAUTHORIZED ACCESS, TRANSPORT MODE, TUNNEL MODE, IP V4, IP V6, SECURITY ASSOCIATION, SECURITY PARAMETR INDEX, IP PROTOCOL, IPSEC PROTOCOL, SOURCE, DESTINATION, SECURITY ASSOCIATION DATABASE


Add Date: March 16, 2018, 11:47 pm & Duration: 00:31:22


Likes: 606 | Dislike: 27


IP SECURITY SERVICES
1. AUTHENTICATION WITH INTEGRITY
2.CONFIDENTIALITY
IP SECURITY ARCHITECTURE
1. AUTHENTICATION HEADER PROTOCOL
2.ENCAPSULATING SECURITY PAYLOAD PROTOCOL
3.KEY MANAGEMENT

C PROGRAMMING - INCREMENT & DECREMENT OPERATORSC PROGRAMMING - INCREMENT & DECREMENT OPERATORS
00:16:42August 7, 2017, 9:05 am
C PROGRAMMING - INCREMENT & DECREMENT OPERATORS

Channel: Sundeep Saradhi Kanthety & Total View: 39432


Tags:
INCREMENT & DECREMENT OPERATORS, INCREMENT OPERATORS, DECREMENT OPERATORS, A++, A--, ++A, --A, OPERATORS IN C, SUNDEEP, SARADHI, KANTHETY, pre increment and post increment in c examples, how to solve increment and decrement operators in c, increment and decrement operators in c with examples, increment and decrement operators examples, PREINCREMENT, POST INCREMENT, PRE DECREMENT, POST DECREMENT, c language, c programming


Add Date: August 7, 2017, 9:05 am & Duration: 00:16:42


Likes: 668 | Dislike: 42


Increment and Decrement Operators are represented by ++ & --
Pre Increment ++a
Post Increment a++
Pre Decrement --a
Post Decrement a--

NETWORK SECURITY - PUBLIC KEY DISTRIBUTIONNETWORK SECURITY - PUBLIC KEY DISTRIBUTION
00:32:28February 19, 2018, 11:46 am
NETWORK SECURITY - PUBLIC KEY DISTRIBUTION

Channel: Sundeep Saradhi Kanthety & Total View: 22903


Tags:
sundeep, saradhi, kanthety, network security, access control, authentication, authorization, confidentiality, integrity, non-repudiation, unauthorized access, third party, security services, mechanisms, encryption, decryption, attacks, cryptography, sender, receiver, secure transmission, computer network, computer security, data security, KEY DISTRIBUTION, key management, private key, public announcement, certificate authority, time stamp, nonce, digital certificates, certificates


Add Date: February 19, 2018, 11:46 am & Duration: 00:32:28


Likes: 329 | Dislike: 9


There are four ways to distribute the public keys among the users.
1) Public Announcement
2) Public Key Directory
3) Public Key Authority
4) Certificate Authority

NETWORK SECURITY - RSA ALGORITHMNETWORK SECURITY - RSA ALGORITHM
00:23:04January 18, 2018, 10:02 am
NETWORK SECURITY - RSA ALGORITHM

Channel: Sundeep Saradhi Kanthety & Total View: 68158


Tags:
sundeep, saradhi, kanthety, network security, information security, access control, authentication, authorization, confidentiality, integrity, non-repudiation, unauthorized access, encryption, decryption, attacks, cryptography, sender, receiver, network, computer network, computer security, data security, RSA, RSA algorithm, Prime Number, Eulers totient, Gcd, public key, private key, coprime, relative prime, Public Key Cryptography, Asymmetic algorithm, rivest, shamir, adleman


Add Date: January 18, 2018, 10:02 am & Duration: 00:23:04


Likes: 950 | Dislike: 27


RSA Algorithm is the example for Public Key Encryption algorithm.
Here we are supposed to find two keys
1) Public Key which is used at encryption
2) Private Key which is used at decryption
step 1: Select two large Primes P , Q
Step 2: Calculate n=P*Q & O(n) = (P-1)*(Q-1)
Step 3: Assume e and d (Public and Private Key).
Step 4: Encrypt the Plain Text using Public Key e.
Step 5: Decrypt the Cipher Text using Private Key d.

C PROGRAMMING - SWITCH CASE WITH EXAMPLEC PROGRAMMING - SWITCH CASE WITH EXAMPLE
00:21:58August 29, 2017, 11:22 am
C PROGRAMMING - SWITCH CASE WITH EXAMPLE

Channel: Sundeep Saradhi Kanthety & Total View: 41781


Tags:
sundeep, saradhi, kanthety, c programming, c language, programming, switch case, switch statement, case, break, default, multiway selection statement, case labels, condition, decision control statements, switch syntax, switch example, simple calculator


Add Date: August 29, 2017, 11:22 am & Duration: 00:21:58


Likes: 714 | Dislike: 21


Switch case is known as Multi-Way Selection Statement having number of cases.

NETWORK SECURITY - MD5 ALGORITHMNETWORK SECURITY - MD5 ALGORITHM
00:31:30April 18, 2018, 1:09 pm
NETWORK SECURITY - MD5 ALGORITHM

Channel: Sundeep Saradhi Kanthety & Total View: 30701


Tags:
SUNDEEP, SARADHI, KANTHETY, CONFIDENTIALITY, INTEGRITY, DIGITAL SIGNATURE, AUTHENTICATION, ENCRYPTION, DECRYPTION, SECRET KEY, PUBLIC KEY, PRIVATE KEY, INFORMATION SECURITY, CLIENT, SERVER, message digest, md5, authenticator, md5 algorithm, block cipher, buffers, 32 bit, 4 buffers, constant, hash code, message authentication, mac, self learning


Add Date: April 18, 2018, 1:09 pm & Duration: 00:31:30


Likes: 448 | Dislike: 21


The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
Step 1. Append Padding Bits. The message is "padded" (extended) so that its length (in bits) is congruent to 448, modulo 512. ...
Step 2. Append Length. ...
Step 3. Initialize MD Buffer
Step 4. Process Message in 16-Word Blocks. ...
Step 5. Output.

Usha Kanthety, MBBS, Family Medicine - CHI Health Clinic

Channel: CHI Health & Total View: 203


Tags:
No Video Tags


Add Date: November 30, 2015, 11:32 am & Duration: 00:00:59


Likes: 0 | Dislike: 0


Usha Kanthety is a family medicine physician at CHI Health Clinic.

C PROGRAMMING INTERVIEW QUESTIONS - PART 10C PROGRAMMING INTERVIEW QUESTIONS - PART 10
00:08:49January 13, 2019, 6:30 pm
C PROGRAMMING INTERVIEW QUESTIONS - PART 10

Channel: Sundeep Saradhi Kanthety & Total View: 78


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, computer training, c language trainee, c language training, cp training, cp sessions, interview questions, faq, objective questions, mcq, break, continue, keywords, variable, array, structures, strings, character arrays, homogeneous, hetrogeneous, elements, members, struct, technical interview, placement questions, fresher, placements


Add Date: January 13, 2019, 6:30 pm & Duration: 00:08:49


Likes: 8 | Dislike: 0


C PROGRAMMING INTERVIEW QUESTIONS

#cinterviewquestions, #clanguageobjectivequestions, #cprogrammingquestions

NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
00:33:00February 23, 2018, 2:41 pm
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)

Channel: Sundeep Saradhi Kanthety & Total View: 43417


Tags:
sundeep, saradhi, kanthety, network security, information security, access control, authentication, authorization, confidentiality, integrity, non-repudiation, unauthorized access, security services, mechanisms, encryption, decryption, gaining access, attacks, cryptography, resources, permissions, sender, receiver, computer network, computer security, data security, dsa algorithm, dss approach, digital signature, signature, private key, public key, global key, signature components


Add Date: February 23, 2018, 2:41 pm & Duration: 00:33:00


Likes: 612 | Dislike: 22


Digital Signature : If the Sender Private key is used at encryption then it is called digital signature. This digital Signature is implemented two approaches
1) RSA Approach
2) DSS Approach.

C PROGRAMMING - LINEAR SEARCHC PROGRAMMING - LINEAR SEARCH
00:10:15October 11, 2017, 11:42 am
C PROGRAMMING - LINEAR SEARCH

Channel: Sundeep Saradhi Kanthety & Total View: 36461


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, onedimensional arrays, single dimensional arrays, searching, linear search, binary search, search element, 1D array, applications of 1D array, Linear search program, c program, c training, programming c


Add Date: October 11, 2017, 11:42 am & Duration: 00:10:15


Likes: 751 | Dislike: 22


Searching is the procedure to find the search element in the array of elements.

Searching can be performed using two methods

1) Linear Search
2) Binary Search

In Linear Search the search element will be compared with all the elements in an array from index 0 to n-1.

C PROGRAMMING - ONE DIMENSIONAL ARRAYS DECLARATION, INITIALIZATION AND ACCESSING

Channel: Sundeep Saradhi Kanthety & Total View: 29498


Tags:
sundeep, saradhi, kanthety, computer, programming, computer programming, c programming, c language, arrays, one dimensional arrays, two dimensional arrays, multi dimensional arrays, numerical arrays, character arrays, declaration, initialization, accessing, elements of array, index of arrays, array initialization, array declaration, accessing elements of arrays, example for one dimensional arrays


Add Date: September 20, 2017, 1:50 pm & Duration: 00:41:34


Likes: 552 | Dislike: 18


An Array is defined as group of elements with same datatype.
Two types of arrays
1) Numerical Arrays
2) Character Arrays
Arrays can be implemented by using different dimensions.
One Dimensional Array
Two Dimensional Array
Multi Dimensional Array

C PROGRAMMING - BUBBLE SORTC PROGRAMMING - BUBBLE SORT
00:24:47November 1, 2017, 11:44 am
C PROGRAMMING - BUBBLE SORT

Channel: Sundeep Saradhi Kanthety & Total View: 71197


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, c programming trainee, c language training, sort, bubble sort, swaping, interchange of elements, nested loops, iterative statements., array applications, single dimensional array, array example, ascending order, descending order


Add Date: November 1, 2017, 11:44 am & Duration: 00:24:47


Likes: 1114 | Dislike: 50


Compare first element with second element if first element is greater than second element those elements will be interchanged. We have to repeat the procedure until reaches the last element.
If there are n elements all the elements will be arranged in sorted order in n-1 passes.

NETWORK SECURITY - DES (DATA ENCRYPTION STANDARD) ALGORITHM

Channel: Sundeep Saradhi Kanthety & Total View: 128013


Tags:
sundeep, saradhi, kanthety, network security, information security, authentication, confidentiality, unauthorized access, security services, encryption, decryption, cryptography, sender, receiver, secure transmission, computer security, data security, des algorithm, encryption standard, data encryption, block cipher, symmetric cipher, s-boxes, permutations, expansion permutation, permuted choice, xor operation, circular shift, round function, rounds, block size, sub keys


Add Date: January 4, 2018, 12:27 pm & Duration: 00:49:38


Likes: 1945 | Dislike: 75


DES algorithm follows the Feistel Structure
Most of the Block cipher algorithms follows Feistel Structure

BLOCK SIZE - 64 bits Plain Text
No. of Rounds - 16 Rounds
Key Size - 64 bits
Sub Key Size - 48 bits
No. of Sub Keys - 16 Sub Keys
Cipher Text - 64 bits

NETWORK SECURITY - TYPES OF ATTACKSNETWORK SECURITY - TYPES OF ATTACKS
00:18:03October 24, 2017, 12:17 pm
NETWORK SECURITY - TYPES OF ATTACKS

Channel: Sundeep Saradhi Kanthety & Total View: 95903


Tags:
sundeep, saradhi, kanthety sundeep saradhi, networks, security, information security, network security, attacks, unauthorized access, destroy message, access message, modify message, passive attack, active attack, release content, eavesdropping, traffic analysis, masquerade, replay, modification, denial of service, dos attacks, sender, reciever, data modification


Add Date: October 24, 2017, 12:17 pm & Duration: 00:18:03


Likes: 1520 | Dislike: 54


Two Categories of attacks
1) Passive Attacks
a) Release of the content
b) Traffic Analysis
2) Active Attacks
a) Masquerade
b) Replay
c) Modification of Message
d) Denial of Service

C PROGRAMMING - BREAK AND CONTINUE KEYWORDSC PROGRAMMING - BREAK AND CONTINUE KEYWORDS
00:19:58September 12, 2017, 9:30 am
C PROGRAMMING - BREAK AND CONTINUE KEYWORDS

Channel: Sundeep Saradhi Kanthety & Total View: 13670


Tags:
Computer, Computer programming, c programming, c language, sundeep, saradhi, kanthety, break, continue, break example, continue example, working of break, working of continue, break program, continue progam, break in loops, continue in loops, while loop, for loop, do while loop, iterations, iterative statemens, break & continue, keywords, break keyword, continue keyword


Add Date: September 12, 2017, 9:30 am & Duration: 00:19:58


Likes: 227 | Dislike: 8


Break statement is used to bring the control out from the loop.
Continue statement is used to bring te control out from the current iteration.Continue statement will skip the current iteration where the continue has been written.

C PROGRAMMING - INSERTION SORTC PROGRAMMING - INSERTION SORT
00:45:58June 8, 2018, 1:25 pm
C PROGRAMMING - STRINGS or CHARACTER ARRAYSC PROGRAMMING - STRINGS or CHARACTER ARRAYS
00:39:22October 14, 2017, 11:45 am
C PROGRAMMING - STRINGS or CHARACTER ARRAYS

Channel: Sundeep Saradhi Kanthety & Total View: 32119


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, strings, character arrays, arrays, array with character elements, printf, scanf, getchar, gets, putchar, puts, string handling, null character, one dimensional array, %s control specifier, string array, c training, programming c


Add Date: October 14, 2017, 11:45 am & Duration: 00:39:22


Likes: 409 | Dislike: 9


Strings is a collection of characters.
Strings are implemented using character arrays.
Input Functions to read string
1) scanf()
2) getchar()
3) gets()
Output Functions to print string
1) printf()
2) putchar()
3) puts()

C PROGRAMMING - INTRODUCTION TO FILESC PROGRAMMING - INTRODUCTION TO FILES
00:24:55November 13, 2017, 9:00 am
C PROGRAMMING - INTRODUCTION TO FILES

Channel: Sundeep Saradhi Kanthety & Total View: 22988


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, computer training, c language training, files, file pointer, fopen(), EOF, endof file, mode of operation, a mode, r mode, w mode, filename, text file, binary file, .exe, .txt, .bin, .c file, programming trainee, FILE structure, fclose(), rb mode, wb mode, ab mode


Add Date: November 13, 2017, 9:00 am & Duration: 00:24:55


Likes: 374 | Dislike: 16


File Operations
1) Create a file
2) Open a file
3) Input / Output
4) Access the content of file
5) Closing the file

C PROGRAMMING - STRUCTURESC PROGRAMMING - STRUCTURES
00:27:00October 31, 2017, 9:41 am
C PROGRAMMING - STRUCTURES

Channel: Sundeep Saradhi Kanthety & Total View: 55857


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, Structure Definition, Structure variable Declaration, Structure Initialization, Accessing the members of structure, dot operator, tag name, structure name, structure variable, different datatypes, strucutre, union, c programming training, c training


Add Date: October 31, 2017, 9:41 am & Duration: 00:27:00


Likes: 813 | Dislike: 21


Structure Definition
Structure variable Declaration
Structure Initialization
Accessing the members of structure

NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATIONNETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
00:26:15April 18, 2018, 11:47 am
NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION

Channel: Sundeep Saradhi Kanthety & Total View: 36221


Tags:
SUNDEEP, SARADHI, KANTHETY, CONFIDENTIALITY, INTEGRITY, DIGITAL SIGNATURE, AUTHENTICATION, ENCRYPTION, DECRYPTION, SECRET KEY, PUBLIC KEY, PRIVATE KEY, INFORMATION SECURITY, sender, receiver, MODES OF OPERATION, BLOCK CIPHER, ECB, CBC MODE, OFB MODE, CFB MODE, COUNTER MODE, OUTPUT FEEDBACK, CIPHER FEEDBACK, BLOCK CHAINING, INITIALIZATION VECTORS, XOR, PLAIN TEXT, CIPHER TEXT, KEY, ENCRYPT, DECRYPT, SHIFT REGISTER, starting variable


Add Date: April 18, 2018, 11:47 am & Duration: 00:26:15


Likes: 903 | Dislike: 9


1. Electronic Code Book Mode
2. Cipher Block Chaining Mode
3. Output Feedback Mode
4. Cipher Feedback Mode
5. Counter Mode

C PROGRAMMING - ITERATIVE STATEMENTS PART-1C PROGRAMMING - ITERATIVE STATEMENTS PART-1
00:26:04August 31, 2017, 10:40 am
C PROGRAMMING - ITERATIVE STATEMENTS PART-1

Channel: Sundeep Saradhi Kanthety & Total View: 20493


Tags:
sundeep, saradhi, kanthety, c language, c programming, computer, computer programming, loops, iterations, iterative loops, while loop, do while loop, while, do while, for loop, loop variable, condition, rounds, condition termination, loops example, while exammple, do while example


Add Date: August 31, 2017, 10:40 am & Duration: 00:26:04


Likes: 367 | Dislike: 7


Loops can be defined as a process of executing a block of statements repeatedly .
While Loop
Do While Loop
For Loop

NETWORK SECURITY- AES (ADVANCED ENCRYPTION STANDARD) Algorithm

Channel: Sundeep Saradhi Kanthety & Total View: 77281


Tags:
sundeep, saradhi, network security, information security, authentication, authorization, confidentiality, integrity, encryption, decryption, attacks, cryptography, receiver, data security, aes algoithm, advanced encrption, shift rows


Add Date: January 10, 2018, 11:41 am & Duration: 00:49:01


Likes: 1075 | Dislike: 38


AES algorithm is the Block Cipher Symmetric Algorithm
Block Size is 128 bits
Key Size is 128 bits ( 4 words or 16 Bytes )
Sub Key Size is 1 Word (32 bit)
Number of Sub keys 44 Words
Number of Rounds 10
Cipher Text Size is 128 bits

C PROGRAMMING - BITWISE OPERATORSC PROGRAMMING - BITWISE OPERATORS
00:35:20August 19, 2017, 10:40 am
C PROGRAMMING - BITWISE OPERATORS

Channel: Sundeep Saradhi Kanthety & Total View: 55926


Tags:
C PROGRAMMING, SUNDEEP, SARADHI, KANTHETY, C COMPILER, PROGRAMMING, C LANGUAGE, OPERATORS, OPERANDS, VARIABLES, BITWISE OPERATORS, AND, XOR, NOT, LEFT SHIFT, IGHT SHIFT, COMPLEMENT, 2'S COMPLEMENT, BINARY CONVERSION, DECIMAL TO BINARY, BINARY TO DECIMAL, BITWISE AND, BITWISE OR, BITWISE XOR, BITWISE NOT, bitwise operators in c, shift operators in c


Add Date: August 19, 2017, 10:40 am & Duration: 00:35:20


Likes: 885 | Dislike: 46


BITWISE AND
BITWISE OR
BITWISE XOR
BITWISE NOT
RIGHT SHIFT
LEFT SHIFT

NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM

Channel: Sundeep Saradhi Kanthety & Total View: 54451


Tags:
sundeep, saradhi, kanthety, network security, information security, access control, authentication, authorization, confidentiality, integrity, non-repudiation, unauthorized access, security services, mechanisms, encryption, decryption, attacks, cryptography, sender, receiver, secure transmission, computer security, data security, public key, private key, diffie hellman, key exchange, algorithm, primitive root, secret key, prime number, user A, user B, deffie hellman, key interchange


Add Date: January 20, 2018, 2:21 pm & Duration: 00:34:11


Likes: 748 | Dislike: 20


This Algorithm is used to exchange the secret /symmetric key between sender and receiver.
This exchange of key can be done with the help of public key and private key

step 1 Assume prime number p
step 2 Select a such that a is primitive root of p and a less than p
step 3 Assume XA private key of user A
step 4 Calculate YA public key of user A with the help of formula
step 5 Assume XB private key of user B
step 6 Calculate YB public key of user B with the help of formula
step 7 Generate K secret Key using YB and XA with the help of formula at Sender side.
step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.