Комментарии:
too much bullshit. what is "fin"?
Ответитьhow the server ensure security of red key, can't it be generated by some random third party and get hand of the (blue+pink) key and generate the golden key??
ОтветитьThanks Hussein. All your explanations make these complexities easy to grasp.
ОтветитьThis video length and format I would say as well but the length mainly is perfect because at the end of the 24 minutes if you spend about 6 minutes reviewing everything and then you watch the video again one more time you're getting about three times the retention rate
ОтветитьSo with TLS 1.2 the only thing you would have to deal with if you are a hacker would be the SYN ACK stuff the TCP generates (spoofing ot whatever is necessary here?) And that's principally why it is insecure?
Ответитьsoup nazi
ОтветитьVery good video, but I think you stated 2-RTT for handshake when you want to say 1-RTT in TLS 1.3.
Ответитьyou just showed the very true world very clearly :)
ОтветитьHi Hussein. Just a small question. How can server send back red key, pink key back. You said no one can break blue, pink key pair.
All answers are welcomed. Please do write if you know the answer.
THANK YOU SO MUCH amazing explanation !
ОтветитьAladin .... hahha (y)
Ответитьi just wanted to know about osi model and you keep saying in middle of video to watch some other video in order to grasp this one correctly i have 9 tabs of your videos open rn
Ответитьnice video
ОтветитьExcellent
ОтветитьHow to configure TLS 1.2 version in Arista SW...?...is anyone knows.... Thanks
ОтветитьGreat video and effort. Could you share the titles of books you have read which help us to improve the fundamentals.
ОтветитьI got my CKAD after learned from your videos about infrastructures and now I am learning backward.. lol
Salute from South Korea.. :D
Nice video. I am not able to find link to video by professor. I searched in description. Would you please post link?
ОтветитьThank you SO MUCH. This is amazing
ОтветитьHi all
Is anyone can help me here if i disable TLS 1.0 and enable TLS 1.1 and 1.2 then my crystal reports is not working
Your explanation is good however you drag your statements making video long and boring
ОтветитьI think you can become the the best prof ever, trust me, you are making a heavy impact in the community of developers helping us developers grow with quality content
ОтветитьDoe the regeneration of the keys happen with every request with TLS1.3? And do we still speak of certificates?
ОтветитьWhere is the implementation of certificate authority?
ОтветитьSir, rigth now im using metabase to make connection between metabase and our server. But, unfortunately the connection from the metabase is interrupted, here is an error message from the metabase : The driver could not establish a secure connection to SQL Server by using Secure Sockets Layer (SSL) encryption. Error: "The server selected protocol version TLS10 is not accepted by client preferences [TLS13, TLS12]".
do you know this problem?
Dude, Awesomely Explained!
ОтветитьWhat if middleman gets that key during the handshake part? Then he will be able to decrypt all the data. Is there anything special during handshaking?
Ответитьsorry but this is not the best explanation
Ответитьhi could you please share the source code as well
ОтветитьHi Hussein, your videos are of great source of learning, thanks a lot, it would be even better if you could create a blog of the video and share the link by this way it would be way comfortable for people like me to read than to watch
Ответитьthank you sir u explained very well and your way to teach is amazing!
Ответитьthose who disliked what were your reasons?
Ответитьvery nice thanks
ОтветитьIn this VIDEO :D <3
ОтветитьYou do an terrible job of explaining this
ОтветитьThank you very much for your video. One question, in TLS 1.3, how does the client get the blue and pink key?
ОтветитьHi Hussain, just wondering if you share something on intercepted proxy. In my current org they use the same. Whenever I make any bank connection via chrome I could see the certificate says intercepted proxy. I think it is for any connection I make. What are they and what kind of info my org is getting.Are they see my credentials.
ОтветитьSSL is outdated?!?!?
Ответить