Anthony Vance
Anthony Vance
  • 20
  • 7 190 199
What Shall We Give to the Babe in the Manger?
Music by the Tabernacle Choir at Temple Square.
Footage from "The Life of Jesus Christ Bible Videos" (churchofjesuschrist.org/bible-videos) and "The Christ Child" (comeuntochrist.org/light-the-world-2020/the-christ-child).
Lyrics:
What shall we give to the babe in the manger,
What shall we offer the child in the stall?
Incense and spices and gold we've a-plenty-
Are these the gifts for the king of us all?
Tan ta tan tan ta ta tan ta ta tan ta
Ta ta tan tan ta ta tan ta ta ta
What shall we give to the boy in the temple,
What shall we offer the man by the sea?
Palms at his feet and hosannas uprising;
Are these for him who will carry the tree?
Tan ta tan tan ta ta tan ta ta tan ta
Tan ta tan tan ta ta tan ta ta ta
What shall we give to the lamb who was offered,
Rising the third day and shedding his love?
Tears for his mercy we'll weep at the manger,
Bathing the infant come down from above.
(via www.musixmatch.com)
Переглядів: 1 931

Відео

NCIS ridiculous hacking scene: one keyboard, two typists HD
Переглядів 148 тис.3 роки тому
NCIS ridiculous hacking scene: one keyboard, two typists HD
Visualizing Third-party Cookies for the U.S. Alexa.com top 50 websites
Переглядів 2784 роки тому
This video shows the relationships among third-party cookies for many of the U.S. Alexa.com top 50 websites using the excellent (and unfortunately no longer maintained) Lightbeam extension for Mozilla Firefox.
How to Conduct an fMRI Study to Examine Usable Privacy and Security
Переглядів 1,3 тис.8 років тому
This is a presentation I gave at the Symposium on Usable Privacy and Security (SOUPS) 2015 held July 22-24 in Ottawa, Canada.
Trojan Horse clip from "Troy" HD
Переглядів 6 млн8 років тому
Trojan Horse clip from "Troy" HD
Using fMRI and Mouse Cursor Tracking to Explain Habituation to Security Warnings
Переглядів 8309 років тому
This video is a 4-minute overview of our research on habituation to security warnings using fMRI and mouse cursor tracking. For more information about this study, visit neurosecurity.byu.edu/chi_fmri_habituation.
30-second Preview: How Habituation to Security Warnings Occurs in the Brain-An fMRI Study
Переглядів 4949 років тому
This is a 30-second preview of the CHI 2015 paper, "How Polymorphic Warnings Reduce Habituation in the Brain-Insights from an fMRI Study." You can read about this paper here: neurosecurity.byu.edu/chi_fmri_habituation.
KSL Video Summarizing Malware EEG Study
Переглядів 4159 років тому
News station KSL summarizes the study, "Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)," published in the Journal of the Association for Information Systems.
How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)
Переглядів 323 тис.9 років тому
This video explains how to compute the RSA algorithm, including how to select values for d, e, n, p, q, and φ (phi).
How to Make a Computer 100% Secure, Version 2
Переглядів 6999 років тому
With the coda "Can a computer ever be 100% secure?," suggested by Tadayoshi Kohno.
How to Make Your Computer 100% Secure Part 2
Переглядів 5889 років тому
How to Make Your Computer 100% Secure Part 2
How to Make your Computer 100% Secure Part 1
Переглядів 4479 років тому
How to Make your Computer 100% Secure Part 1
How to Make Your Computer 100% Secure
Переглядів 33 тис.9 років тому
How to Make Your Computer 100% Secure
War Games War Dialing clip
Переглядів 49 тис.9 років тому
"Protovision, I have you now!"
24 Clip on Blowfish Cryptography
Переглядів 7089 років тому
Check the file header!
Grand Moff Tarkin and Risk HD
Переглядів 2,8 тис.9 років тому
Grand Moff Tarkin and Risk HD
There is No Teacher But the Enemy
Переглядів 45 тис.9 років тому
There is No Teacher But the Enemy
Harry Potter and Defense in Depth
Переглядів 1,4 тис.10 років тому
Harry Potter and Defense in Depth
Trojan Horse clip from "Troy"
Переглядів 680 тис.13 років тому
Trojan Horse clip from "Troy"
Grand Moff Tarkin and Risk
Переглядів 79 тис.13 років тому
Grand Moff Tarkin and Risk

КОМЕНТАРІ

  • @TimoIvvie
    @TimoIvvie 29 днів тому

    I love NCIS but god this scene lmao

  • @aaronmoran7195
    @aaronmoran7195 Місяць тому

    My girlfriend is really into this show and I can’t stop laughing at how stupid it is. That goth girl has the skill set of ten professionals! Most of them would’ve been fired for non professional behaviour at least.

  • @tostupidforname
    @tostupidforname Місяць тому

    Idk if i should laugh or throw up

  • @GoldenWingsLittleBirds
    @GoldenWingsLittleBirds Місяць тому

    數學真有趣!

  • @xxxlonewolf49
    @xxxlonewolf49 3 місяці тому

    Hahaha beyond absurd

  • @AlchemicSoul
    @AlchemicSoul 3 місяці тому

    Dumb as this scene is, I like sandwich guy. Wander into points of interest, ask about video games, eat sandwich I mean it's a philosophy that can last you a lifetime.

  • @user-xc6dt2gs4x
    @user-xc6dt2gs4x 5 місяців тому

    really well chosen footage to one of my favorite Christmas songs. Going to use in a lesson, too.

  • @MTdaBlacking
    @MTdaBlacking 5 місяців тому

    I heard Mr. Robot has the most accurate (if slightly stylized) hacking so seeing this is like someone threw in the very opposite direction lmao

  • @lherfel
    @lherfel 8 місяців тому

    thanks

  • @abstrusemedia2312
    @abstrusemedia2312 8 місяців тому

    Unplug computer hacker still in network doing his thing. Come on director any idiot knows thats not how this works.

    • @emilyjohnston9674
      @emilyjohnston9674 5 місяців тому

      Naw, you'd be surprised at how dumb many "not idiot" people are about computers, cars, hell, anything that requires more than 2 parts to work.

  • @brettbri5694
    @brettbri5694 9 місяців тому

    This is one of the greatest scenes of Television Comedy of all time.

  • @statelypenguin
    @statelypenguin 10 місяців тому

    This is honestly the most boomer depiction of hacking. Like look at these dweebs, all you needed was a wise older man who just unplugs it like it’s a wonky toaster

  • @QueenbeeTTV
    @QueenbeeTTV 11 місяців тому

    bro what lmfao

  • @sharpnova2
    @sharpnova2 11 місяців тому

    the people who write stuff like this are currently striking for more money. p.s. they make far more than the vast majority of you. per hour, roughly lawyer/doctor tier i hate them and hope ai replaces them all

    • @emilyjohnston9674
      @emilyjohnston9674 5 місяців тому

      No. They don't. The people who run them do, but not the writers or general TV actors. Only the "stars" make the big bucks.

  • @TheBoondoggler
    @TheBoondoggler 11 місяців тому

    pfft Isolate the node. Totes.

  • @deepthib7588
    @deepthib7588 Рік тому

    Could not get the answer for p=23, q=19, and e=283 with the steps. Can someone try n lmk?

  • @sharpnova2
    @sharpnova2 Рік тому

    most accurate hacking scene ever produced by hollywood.

  • @xZeroW1ng
    @xZeroW1ng Рік тому

    "theyve already burned through the NCIS *public* firewall" what

  • @eiaboca1
    @eiaboca1 Рік тому

    OMG THAT'S NOT HOW IT WORKS...that's not how any of it works.... I know you all know that. I can't help but be annoyed at the smugness. I'm weak.

  • @pewgarpolls
    @pewgarpolls Рік тому

    π

  • @r_5747
    @r_5747 Рік тому

    I still refuse to believe that this was aired. Seriously, the actors did not see anything wrong with... with that?!

    • @eiaboca1
      @eiaboca1 Рік тому

      Actors just read lines my man. We attribute to them a lot more than is actually there, good and bad. Also I think this aired in like 2005, the internet was only beginning to go mainstream

    • @drd675
      @drd675 8 місяців тому

      @@eiaboca1 This episode was 2004, like you said, internet was just starting to become mainstream

  • @kieronchick1663
    @kieronchick1663 Рік тому

    Why didn't they just type "Cookie" that worked on hackers.

  • @kieronchick1663
    @kieronchick1663 Рік тому

    Ha ha ha what is happening here.

  • @tobordv9493
    @tobordv9493 Рік тому

    that's also how they wrote this scene: à quatre main in 0:58secs

  • @madhabahlal-madinah4309
    @madhabahlal-madinah4309 Рік тому

    A simple trick to get the d as well: d = e-1 mod φ(n). Let's take the example in the video: e = 7 φ(n) = 40 7^-1 mod 40 = 23 and that's how you can get it without going through the steps of the Extended Euclidean Algorithm

  • @HelloWorld-tn1tl
    @HelloWorld-tn1tl Рік тому

    How to choose e, just a small prime that doesn't share a factor with φ(n) ?

  • @KD0MOO
    @KD0MOO Рік тому

    This is really well researched work that has practical value.

  • @stephpursglove9022
    @stephpursglove9022 Рік тому

    Love this so much! Used it in a Sunday School lesson. Thank you! ❤

  • @stevepennington5552
    @stevepennington5552 Рік тому

    OMG! That is hilarious!

  • @dzarmindra
    @dzarmindra Рік тому

    HAHAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!

  • @rrr00bb1
    @rrr00bb1 Рік тому

    3:44 ??? "n is the trap door" ??? It's not that you can't FIND n. It's that you can't FACTOR n into p and q. You are trying to hide phi, which is easy to calculate with p and q. n = p*q -- modulus for the FIELD phi = (p-1)*(q-1) -- period at which exponentiation repeats. this lets you calculate d from e. The thing that confused me when I was first implementing raw RSA was that the modulus n is when the + and * repeat. But ^ repeats at phi. You need to mod phi on exponents, and only mod n after that. I can't tell you how easily this trips you up when implementing raw RSA. BigNumber libraries do + and *, and you can often do the operations first, but the mod n later. But exponentiation creates number so huge that you need to include n as an argument; reducing it mod n is mandatory. This means that if you use a library to just generate a p,q pair for you; you can do all of the RSA yourself. If you don't use a small e, you just use gcd to check d,e to ensure that they are not bad values. (b^x)%n is the raw RSA function. Exponentiation reduced mod n; that's really all that RSA is.

  • @rrr00bb1
    @rrr00bb1 Рік тому

    I would make a big distinction in RSA between asymmetric encryption and public-key encryption. If you use a well-known and small 'e', you have public key, but can't support 'asymmetric' key encryption. With 'asymmetric' key encryption, 'e' and 'd' have the same properties; and are equally secret. I use it to make digitally signed tokens such that you don't know the plaintext until you produce a witness that you performed verify to extract a secret to decrypt the signed claims. That way, the signer distribute the verify key to those who are allowed to VERIFY. It's not totally public, because it's (n,e), but signer has (n,d,e). This allows tokens to be passed around so that man-in-the middle can't decode the claims, and the verifier can only extract verified claims. ie: the current way of checking signatures (plaintext,Sign(H(plaintexty))=sig) has security problems. The main one being that you allow people to not verify the signatures; something that is very common in the hands of web developers. And the other is in leaking the tokens to intermediate proxies.

  • @kvincentm
    @kvincentm Рік тому

    Le pire c'est que j'y croyais .. a 4 main sur le claviers ..

  • @ahmedmaa4380
    @ahmedmaa4380 Рік тому

    They connected to the Dada base

  • @dorianponcela9680
    @dorianponcela9680 Рік тому

    Everybody knows you only need the F5 key to stop a hacking attack...😀

  • @SaHaRaSquad
    @SaHaRaSquad Рік тому

    All this could have been prevented if the "computer game" guy put down his sandwich and helped typing smh.

  • @_Splinx_
    @_Splinx_ Рік тому

    Samething happened to my laptop when i was promised free robux from someone on the internet if i run a .exe they gave me.

  • @TurgutKalfaoglu
    @TurgutKalfaoglu Рік тому

    Lol. So stupid

  • @jstavene
    @jstavene Рік тому

    MOST LAME SCENE EVER!!!! FAKE hackers ....right

  • @freewheelburning8834
    @freewheelburning8834 Рік тому

    thats fun stuff

  • @danabinghammclaughlin919
    @danabinghammclaughlin919 Рік тому

    this exists because there was a competition between the writers to see who could make the most ridiculous hacking scene. they know this isn't how it really works they were playing around

    • @Jurgan6
      @Jurgan6 Рік тому

      That sounds like what you say after you get caught. Like Tommy Wiseau insisting The Room was always meant to be a comedy.

    • @Ildarioon
      @Ildarioon Рік тому

      @@Jurgan6 Even more so when you look at the episode with the girls making up probabilities. They are just writing what a 13 year old would imagine.

    • @Mootux
      @Mootux Рік тому

      @@Jurgan6 I don't know, it's too over the top and corny, so I believe that they did these scenes on purpose lol

  • @Redsteler
    @Redsteler Рік тому

    Incredibly realistic

  • @brigittensengiyumva9122
    @brigittensengiyumva9122 Рік тому

    I have used your way finding D but I ended up with zero instead of 1. my number was p=5 and q=13 and e=35 I was not able to get a correct answer, I don't know why?

  • @stormwulf117
    @stormwulf117 Рік тому

    If you're so r e t arded to think that the way to stop a hack attack is to add even more hands to a single keyboard, maybe it's because of your poor grasp on how computers actually work.

  • @Singertime637
    @Singertime637 Рік тому

    I fell for a scam were i clicked an email and my character in game started throwing all my items off. Instantly unplugged power to my pc and it did some great damage control. Thanks NCIS!

    • @mikemesser4326
      @mikemesser4326 Рік тому

      Something like that happened to me about 20 years ago. I have really bad hand - my fingers - arthritis and neuropathy. I saw an email that I was certain had a virus in it. So I went to just delete it. Instead of a single click I accidentally double clicked and opened it. I suddenly had spam porn sites opening up ... and spreading to my intranet. I just powered down. I had to get some upgraded software to scan and remove the virus, but the losses weren't too bad. Still pretty annoying.

    • @Weelki
      @Weelki Рік тому

      @Mike Messer thank you NCIS?

  • @rogueuniversities6866
    @rogueuniversities6866 2 роки тому

    I was actually searching ridiculous boat names and this clip was recommended. What on Earth? The writing of this scene is like if someone with knowledge of only how to cook a potato started a computer repair business. It's that insane. From the nonsense statements, to two people typing on a keyboard at once, to only unplugging the monitor while the supposed hack continues!

    • @warrenbutt3746
      @warrenbutt3746 2 роки тому

      The NCIS and CSI writers had a running gag between them for a while to try and come up with the most ridiculous hacking scene, I think this is the scene that ended it.

  • @E-A-Z-Y
    @E-A-Z-Y 2 роки тому

    I’ve never seen code like this!

  • @SlyFunkyMonk
    @SlyFunkyMonk 2 роки тому

    This is why my dad doesn't want to vote on a computer.

    • @Weelki
      @Weelki Рік тому

      Thank you NCIS

  • @tle90
    @tle90 2 роки тому

    LMAO WHAT A CHAD

  • @senorchewie
    @senorchewie 2 роки тому

    I got to 22 second and was done. It hurt too much