## Prim’s Algorithm for MST(with Code Walkthrough) | GeeksforGeeks

Prim’s algorithm for computing the minimum spanning tree of a graph. Now, let’s start off with some basic definitions. What is a spanning tree? A spanning tree is a subgraph that has the same vertex set as the original graph and is also a tree which means that it must be connected and must not […]

## Symmetric Cryptography

run terminal Create a new text file using nano text editor in terminal write some message in msg.txt In my case I write “I am a secret message” Press CTRL+O to save text in file CTRL+Z to exit nano text editor run command “cat msg.txt” to view text file run ”gpg -c msg.txt” to encrypt […]

## The Internet: Encryption & Public Keys

Hi my name is Mia Gil-Epner, I’m majoring in Computer Science at UC Berkeley and I work for the Department of Defense, where I try to keep information safe. The Internet is an open and public system. We all send and receive information over shared wires and connections. But even though it’s an open system, […]

## What is Cryptography?

Jamison Cush: Cryptography is a method for protecting information and communications through codes. The codes ensure that only the intended receivers can read and process the messages. “Crypt” means hidden, and “graphy” means writing. Those that practice it are cryptographers. Modern cryptography has four main standards. One confidentiality, only the intended receiver can understand the […]

## How E2E Encryption works

now we know what is End to End Encryption but how the process works? Firstly, there’s a public key having a person poverty allows you to encrypt messages only for that particular recipient while the recipient who has his own private key would able to use that private key to decrypt messages which are only […]

## Bloombase StoreSafe Intelligent Storage Firewall Encryption Security via SMB/CIFS for Apple macOS

This video is to demonstrate how to secure files on Apple macOS using Bloombase StoreSafe Intelligent Storage Firewall via SMB/CIFS protocol Microsoft Windows Server 2016 version 1607 is used as fileserver Share name smb01 is the actual back-end storage, the share path is \fileserver01smb01 Here you go Bloombase StoreSafe Intelligent Storage Firewall version 3.4.7.4 Select […]

## Bloombase StoreSafe Intelligent Storage Firewall Integration with Futurex HSM for Data Encryption

In this demo, we will show you how to generate keys on a Futurex Vectera HSM to use with Bloombase StoreSafe Using standard network datastores leaves your data as unsecured plaintext To secure your data, you can use Bloombase StoreSafe with a an external key manager to encrypt your data on-the-fly After the Futurex drivers […]

## WhatsApp Database Encrypt Decrypt Key for WhatsApp Viewer | WhatsApp Tricks & Tweaks

hello and welcome to my channel today i am going to show you how to decrypt whatsapp database and read anyone’s whatsapp messages connect the phone to the pc using USB Cable browse to phone memory>whatsapp>database and select all and copy it to your pc here we can’t able to open this encrypted database file […]

## Bloombase StoreSafe Intelligent Storage Firewall Encryption via NFS for IBM AS/400 OS/400 System i

In this video, we will be showing how to utilize Bloombase to secure IBM System i server Bloombase provides data-at-rest encryption by acting as storage firewall in between client and backend storage Create a NFS share which will be secured by Bloombase Access Bloombase web management console Configure physical storage Select remote for physical storage […]

## Bloombase StoreSafe Intelligent Storage Firewall for Oracle Database Encryption Security

In this video, we will be showing how to utilize Bloombase to secure Oracle database Bloombase provides data-at-rest encryption by acting as storage firewall in between client and backend storage Prepare iSCSI LUN that needs to be secure by Bloombase Access Bloombase web management console Configure physical storage Select device for physical storage type and […]