- 20
- 7 190 199
Anthony Vance
Приєднався 18 кві 2010
Lenz Professor and Commonwealth Cyber Initiative Fellow, Pamplin College of Business, Virginia Tech
What Shall We Give to the Babe in the Manger?
Music by the Tabernacle Choir at Temple Square.
Footage from "The Life of Jesus Christ Bible Videos" (churchofjesuschrist.org/bible-videos) and "The Christ Child" (comeuntochrist.org/light-the-world-2020/the-christ-child).
Lyrics:
What shall we give to the babe in the manger,
What shall we offer the child in the stall?
Incense and spices and gold we've a-plenty-
Are these the gifts for the king of us all?
Tan ta tan tan ta ta tan ta ta tan ta
Ta ta tan tan ta ta tan ta ta ta
What shall we give to the boy in the temple,
What shall we offer the man by the sea?
Palms at his feet and hosannas uprising;
Are these for him who will carry the tree?
Tan ta tan tan ta ta tan ta ta tan ta
Tan ta tan tan ta ta tan ta ta ta
What shall we give to the lamb who was offered,
Rising the third day and shedding his love?
Tears for his mercy we'll weep at the manger,
Bathing the infant come down from above.
(via www.musixmatch.com)
Footage from "The Life of Jesus Christ Bible Videos" (churchofjesuschrist.org/bible-videos) and "The Christ Child" (comeuntochrist.org/light-the-world-2020/the-christ-child).
Lyrics:
What shall we give to the babe in the manger,
What shall we offer the child in the stall?
Incense and spices and gold we've a-plenty-
Are these the gifts for the king of us all?
Tan ta tan tan ta ta tan ta ta tan ta
Ta ta tan tan ta ta tan ta ta ta
What shall we give to the boy in the temple,
What shall we offer the man by the sea?
Palms at his feet and hosannas uprising;
Are these for him who will carry the tree?
Tan ta tan tan ta ta tan ta ta tan ta
Tan ta tan tan ta ta tan ta ta ta
What shall we give to the lamb who was offered,
Rising the third day and shedding his love?
Tears for his mercy we'll weep at the manger,
Bathing the infant come down from above.
(via www.musixmatch.com)
Переглядів: 1 931
Відео
NCIS ridiculous hacking scene: one keyboard, two typists HD
Переглядів 148 тис.3 роки тому
NCIS ridiculous hacking scene: one keyboard, two typists HD
Visualizing Third-party Cookies for the U.S. Alexa.com top 50 websites
Переглядів 2784 роки тому
This video shows the relationships among third-party cookies for many of the U.S. Alexa.com top 50 websites using the excellent (and unfortunately no longer maintained) Lightbeam extension for Mozilla Firefox.
How to Conduct an fMRI Study to Examine Usable Privacy and Security
Переглядів 1,3 тис.8 років тому
This is a presentation I gave at the Symposium on Usable Privacy and Security (SOUPS) 2015 held July 22-24 in Ottawa, Canada.
Using fMRI and Mouse Cursor Tracking to Explain Habituation to Security Warnings
Переглядів 8309 років тому
This video is a 4-minute overview of our research on habituation to security warnings using fMRI and mouse cursor tracking. For more information about this study, visit neurosecurity.byu.edu/chi_fmri_habituation.
30-second Preview: How Habituation to Security Warnings Occurs in the Brain-An fMRI Study
Переглядів 4949 років тому
This is a 30-second preview of the CHI 2015 paper, "How Polymorphic Warnings Reduce Habituation in the Brain-Insights from an fMRI Study." You can read about this paper here: neurosecurity.byu.edu/chi_fmri_habituation.
KSL Video Summarizing Malware EEG Study
Переглядів 4159 років тому
News station KSL summarizes the study, "Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)," published in the Journal of the Association for Information Systems.
How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)
Переглядів 323 тис.9 років тому
This video explains how to compute the RSA algorithm, including how to select values for d, e, n, p, q, and φ (phi).
How to Make a Computer 100% Secure, Version 2
Переглядів 6999 років тому
With the coda "Can a computer ever be 100% secure?," suggested by Tadayoshi Kohno.
How to Make Your Computer 100% Secure Part 2
Переглядів 5889 років тому
How to Make Your Computer 100% Secure Part 2
How to Make your Computer 100% Secure Part 1
Переглядів 4479 років тому
How to Make your Computer 100% Secure Part 1
How to Make Your Computer 100% Secure
Переглядів 33 тис.9 років тому
How to Make Your Computer 100% Secure
I love NCIS but god this scene lmao
My girlfriend is really into this show and I can’t stop laughing at how stupid it is. That goth girl has the skill set of ten professionals! Most of them would’ve been fired for non professional behaviour at least.
Idk if i should laugh or throw up
數學真有趣!
Hahaha beyond absurd
Dumb as this scene is, I like sandwich guy. Wander into points of interest, ask about video games, eat sandwich I mean it's a philosophy that can last you a lifetime.
really well chosen footage to one of my favorite Christmas songs. Going to use in a lesson, too.
I heard Mr. Robot has the most accurate (if slightly stylized) hacking so seeing this is like someone threw in the very opposite direction lmao
thanks
Unplug computer hacker still in network doing his thing. Come on director any idiot knows thats not how this works.
Naw, you'd be surprised at how dumb many "not idiot" people are about computers, cars, hell, anything that requires more than 2 parts to work.
This is one of the greatest scenes of Television Comedy of all time.
This is honestly the most boomer depiction of hacking. Like look at these dweebs, all you needed was a wise older man who just unplugs it like it’s a wonky toaster
bro what lmfao
the people who write stuff like this are currently striking for more money. p.s. they make far more than the vast majority of you. per hour, roughly lawyer/doctor tier i hate them and hope ai replaces them all
No. They don't. The people who run them do, but not the writers or general TV actors. Only the "stars" make the big bucks.
pfft Isolate the node. Totes.
Could not get the answer for p=23, q=19, and e=283 with the steps. Can someone try n lmk?
most accurate hacking scene ever produced by hollywood.
"theyve already burned through the NCIS *public* firewall" what
OMG THAT'S NOT HOW IT WORKS...that's not how any of it works.... I know you all know that. I can't help but be annoyed at the smugness. I'm weak.
π
I still refuse to believe that this was aired. Seriously, the actors did not see anything wrong with... with that?!
Actors just read lines my man. We attribute to them a lot more than is actually there, good and bad. Also I think this aired in like 2005, the internet was only beginning to go mainstream
@@eiaboca1 This episode was 2004, like you said, internet was just starting to become mainstream
Why didn't they just type "Cookie" that worked on hackers.
Ha ha ha what is happening here.
that's also how they wrote this scene: à quatre main in 0:58secs
A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video: e = 7 φ(n) = 40 7^-1 mod 40 = 23 and that's how you can get it without going through the steps of the Extended Euclidean Algorithm
How to choose e, just a small prime that doesn't share a factor with φ(n) ?
This is really well researched work that has practical value.
Love this so much! Used it in a Sunday School lesson. Thank you! ❤
OMG! That is hilarious!
HAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!
3:44 ??? "n is the trap door" ??? It's not that you can't FIND n. It's that you can't FACTOR n into p and q. You are trying to hide phi, which is easy to calculate with p and q. n = p*q -- modulus for the FIELD phi = (p-1)*(q-1) -- period at which exponentiation repeats. this lets you calculate d from e. The thing that confused me when I was first implementing raw RSA was that the modulus n is when the + and * repeat. But ^ repeats at phi. You need to mod phi on exponents, and only mod n after that. I can't tell you how easily this trips you up when implementing raw RSA. BigNumber libraries do + and *, and you can often do the operations first, but the mod n later. But exponentiation creates number so huge that you need to include n as an argument; reducing it mod n is mandatory. This means that if you use a library to just generate a p,q pair for you; you can do all of the RSA yourself. If you don't use a small e, you just use gcd to check d,e to ensure that they are not bad values. (b^x)%n is the raw RSA function. Exponentiation reduced mod n; that's really all that RSA is.
I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret. I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.
Le pire c'est que j'y croyais .. a 4 main sur le claviers ..
They connected to the Dada base
Everybody knows you only need the F5 key to stop a hacking attack...😀
*Alt-F4
F11 if you're on a laptop
I thought F1 is help
All this could have been prevented if the "computer game" guy put down his sandwich and helped typing smh.
Samething happened to my laptop when i was promised free robux from someone on the internet if i run a .exe they gave me.
Lol. So stupid
MOST LAME SCENE EVER!!!! FAKE hackers ....right
thats fun stuff
this exists because there was a competition between the writers to see who could make the most ridiculous hacking scene. they know this isn't how it really works they were playing around
That sounds like what you say after you get caught. Like Tommy Wiseau insisting The Room was always meant to be a comedy.
@@Jurgan6 Even more so when you look at the episode with the girls making up probabilities. They are just writing what a 13 year old would imagine.
@@Jurgan6 I don't know, it's too over the top and corny, so I believe that they did these scenes on purpose lol
Incredibly realistic
I have used your way finding D but I ended up with zero instead of 1. my number was p=5 and q=13 and e=35 I was not able to get a correct answer, I don't know why?
If you're so r e t arded to think that the way to stop a hack attack is to add even more hands to a single keyboard, maybe it's because of your poor grasp on how computers actually work.
I fell for a scam were i clicked an email and my character in game started throwing all my items off. Instantly unplugged power to my pc and it did some great damage control. Thanks NCIS!
Something like that happened to me about 20 years ago. I have really bad hand - my fingers - arthritis and neuropathy. I saw an email that I was certain had a virus in it. So I went to just delete it. Instead of a single click I accidentally double clicked and opened it. I suddenly had spam porn sites opening up ... and spreading to my intranet. I just powered down. I had to get some upgraded software to scan and remove the virus, but the losses weren't too bad. Still pretty annoying.
@Mike Messer thank you NCIS?
I was actually searching ridiculous boat names and this clip was recommended. What on Earth? The writing of this scene is like if someone with knowledge of only how to cook a potato started a computer repair business. It's that insane. From the nonsense statements, to two people typing on a keyboard at once, to only unplugging the monitor while the supposed hack continues!
The NCIS and CSI writers had a running gag between them for a while to try and come up with the most ridiculous hacking scene, I think this is the scene that ended it.
I’ve never seen code like this!
Me neither.
Type faster!
This is why my dad doesn't want to vote on a computer.
Thank you NCIS
LMAO WHAT A CHAD
I got to 22 second and was done. It hurt too much