Computer

Digital currency, how does it work, what’s a data miner and will Bitcoin last? We asked Professor Ross Anderson of the University of Cambridge Computer Laboratory. The Problem with BitCoin: https://youtu.be/s2XHyzPA9Zc Chip & PIN Fraud: https://youtu.be/Ks0SOn8hjG8 $5 Computer – Raspberry Pi Zero: https://youtu.be/WR0ghM3U0M4 Why Computers Use Binary: https://youtu.be/thrx3SBEpL8 Public Key Cryptography: https://youtu.be/GSIDS_lvRv4 http://www.facebook.com/computerphile Tweets by
0 Comments
Just what is a pipeline in the computer science sense? We asked Computer Science guru Professor Brian Kernighan Why Asimov’s Laws of Robotics Don’t Work: https://youtu.be/7PKx3kS7f4A Brian Kerninghan on Bell Labs: https://youtu.be/QFK6RG47bww Don Knuth on Email: https://youtu.be/QS8qwMna8_o Computer That Changed Everything: https://youtu.be/6LYRgrqJgDc http://www.facebook.com/computerphile Tweets by computer_phile This video was filmed and edited by Sean Riley.
0 Comments
One of the most elegant solutions for cryptography. Dr Mike Pound explains one of his most favourite ciphers. https://www.facebook.com/computerphile Tweets by computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com
0 Comments
Substitution-permutation networks are the basis for almost all modern symmetric cryptography. Dr Mike Pound explains. https://www.facebook.com/computerphile Tweets by computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com
0 Comments
Cookies are controversial and new laws governing them have been introduced in Europe. Extra footage: http://youtu.be/_d0G6FZ_kR4 Featuring Tom Rodden from the University of Nottingham’s Department of Computer Science. http://bit.ly/nottscomputer Follow Computerphile… http://www.facebook.com/computerphile Tweets by computer_phile Video by Sean Riley. Computerphile is a sister project to Brady Haran’s Numberphile. See the full list of Brady’s video
0 Comments
Byte ordering, or boiled egg orientation, endianness is important! Dr Steve Bagley on the computer science topic named after something from an 18th century novel…. The copy of Gulliver’s Travels used in the graphics was found at archive.org and can be viewed here: http://bit.ly/C_Gulliver The animations of the hex to binary have a classic ‘out
0 Comments
Correction : as oodles of commenters have pointed out, the clock face should go from 0 to n-1. Also, worth reminding people that Mike has simplified the notation in this video (as he mentions). Mike explains the mathematics behind one of the most important pieces of computer security. (Simplified version with colour mixing analogy linked
0 Comments
Kerberos is an authentication method – Dr Mike Pound explains how it works so neatly. EXTRA BITS: Kerberos Q&A https://youtu.be/QN4WmZXi4tg https://www.facebook.com/computerphile Tweets by computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com
0 Comments
The back door that may not be a back door… The suspicion about Dual_EC_DRBG – The Dual Elliptic Curve Deterministic Random Bit Generator – with Dr Mike Pound. EXTRA BITS: https://youtu.be/XEmoD06_mZ0 Nothing up my sleeve Numbers: https://youtu.be/oJWwaQm-Exs Elliptic Curves: https://youtu.be/NF1pwjL9-DE https://www.facebook.com/computerphile Tweets by computer_phile This video was filmed and edited by Sean Riley. Computer Science
0 Comments
Making yourself the all-powerful “Root” super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike Pound details how it’s done. Formerly titled “Buffer Overflow Attack” -Aug 2021 The Stack: https://youtu.be/7ha78yWRDlE Botnets: https://youtu.be/UVFmC178_Vs The Golden Key: iPhone Encryption: https://youtu.be/6RNKtwAGvqc 3D Stereo Vision: https://youtu.be/O7B2vCsTpC0 Brain Scanner: https://youtu.be/TQ0sL1ZGnQ4 http://www.facebook.com/computerphile Tweets by computer_phile This video was
0 Comments