Cryptographic Hashes
0 seconds of 0 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
Keyboard Shortcuts
Shortcuts Open/Close/ or ?
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Decrease Caption Size-
Increase Caption Size+ or =
Seek %0-9

Apr 13th 2006
Security Now 35
Cryptographic Hashes
Hosted by
Steve Gibson,
Leo Laporte
It's the last part of Steve's crypto primer.
Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
This week Steve talks about how cryptographic hashes work and are used to verify the integrity of files and email. We also talk about email signing and recommend the Gnu Privacy Guard.