- Видео 44
- Просмотров 4 563 104
teridon
Добавлен 7 мар 2006
BFBC2 bloopers for March 2020
Play on our server
=(eGO)= 24/7 Heavy Metal|500tkt|Fast Respawn [GameME]
=(eGO)= 24/7 Heavy Metal|500tkt|Fast Respawn [GameME]
Просмотров: 145
Видео
bc2 snuzzle failed heli collision
Просмотров 794 года назад
Snuzzle crashed into my heli but it was just a glancing blow
bc2 darkwhip biomecanoide heli roadkill
Просмотров 764 года назад
Biomecanoide jumped out of the crashing heli in time, but gets run over
Mercury transit 2019-11-11, from NASA's Solar Dynamics Observatory (SDO) in 4K
Просмотров 6434 года назад
From SDO's AIA instrument, 171A Downloadable version: teridon.com/SDO movie 2019-11-11 171A.mp4
Astronauts escape malfunctioning Soyuz rocket 2018-10-11
Просмотров 2,1 тыс.5 лет назад
Astronauts escape from Soyuz after a malfunction during the ascent phase www.bbc.com/news/world-europe-45822845
SDO Lunar Transit simulation for 2019-03-06
Просмотров 675 лет назад
This video shows the predicted view from NASA's Solar Dynamics Observatory (SDO) for a lunar transit occurring on 2019-03-06. In this 5-hour simulation, the moon appears to cross in front of the Sun, then stops and reverses direction to cross in front of the Sun again. The transit start and end times (UTC) are : 2019-03-06 @ 2201 to 2019-03-07 @ 0206
Battlefield Bad Company 2 awesome comeback
Просмотров 1126 лет назад
Russian team was more than 100 tickets and 2 players down so I switched. Our squad dominated and we ended up winning by 150 tickets. Date: 2018-04-25 Server: =(eGO)= 24/7 Heavy Metal|500tkt|Fast Respawn [GameME]
Voyager Golden Record Greetings in 55 languages (with English subtitles)
Просмотров 6 тыс.6 лет назад
English subtitles are from Wikipedia (en.wikipedia.org/wiki/Contents_of_the_Voyager_Golden_Record#Greetings) Video content from ruclips.net/video/QTDK2jCVPN0/видео.html
Two Significant Solar Flares Imaged by NASA's SDO Sept. 6, 2017
Просмотров 8956 лет назад
Solar flares are powerful bursts of radiation. The first flare is classified as an X2.2 flare and the second is an X9.3 flare. NASA article: www.nasa.gov/feature/goddard/2017/two-significant-solar-flares-imaged-by-nasas-sdo
Luke the husky playing with Jade at the dog park
Просмотров 846 лет назад
Luke the husky playing with Jade at the dog park
SDO Captures Cascading Magnetic Arches zoom 1
Просмотров 638 лет назад
SDO Captures Cascading Magnetic Arches zoom 1
Filament Burst caught by SDO 2015-04-21 11:30 - 15:30 @ 304Å
Просмотров 1149 лет назад
Filament Burst caught by SDO 2015-04-21 11:30 - 15:30 @ 304Å
SDO Lunar Transit and Eclipse 2015-09-13 (DOY 256)
Просмотров 1899 лет назад
SDO Lunar Transit and Eclipse 2015-09-13 (DOY 256)
SDO AIA 171A flare at 2015-04-04T23:19:46 - 2160p
Просмотров 1979 лет назад
SDO AIA 171A flare at 2015-04-04T23:19:46 - 2160p
SDO AIA 171A 2015-02-17 - full disk in 4K
Просмотров 3499 лет назад
SDO AIA 171A 2015-02-17 - full disk in 4K
Prominence SDO 304 2014-11-09_10.00.00-11.20.00
Просмотров 2579 лет назад
Prominence SDO 304 2014-11-09_10.00.00-11.20.00
SDO flare AR 13812 2014-08-24 12:00:00 - 12:30:00
Просмотров 2859 лет назад
SDO flare AR 13812 2014-08-24 12:00:00 - 12:30:00
Albuquerque Zoo Polar Bear 2014-08-27 10:40
Просмотров 1339 лет назад
Albuquerque Zoo Polar Bear 2014-08-27 10:40
The Kerberos Authentication Process (kerberos_v2.mov)
Просмотров 168 тыс.12 лет назад
The Kerberos Authentication Process (kerberos_v2.mov)
Giant Prominence Erupts - April 16, 2012 1720-1810.mp4
Просмотров 40512 лет назад
Giant Prominence Erupts - April 16, 2012 1720-1810.mp4
SDO tornado 2011-03-11_1700-2358.mp4
Просмотров 2,1 тыс.12 лет назад
SDO tornado 2011-03-11_1700-2358.mp4
Hay quá bạn ỏi👍👍❤❤❤
So cute..
They are such good parents.
Bu saçma uzaylıların bunu çözeceğini düşünmüyorum hatta onlara ulaşma ihtimali düşük olsa bile akıllı olması ve ayrıca bize benzeyen bir varlığın olması bana olası gelmiyor ve türkçeyi iyi yapmamışlar
Birde bir sürü dil var hangisini çozeceklerde anlayacaklar ?
@@sunshine848 anlamaktan cok bizim var oldugumuzdan haberleri olmalari icin ve kendimizi tanitmak icin var
P
1:51: "Iechyd da i chi yn awr, ac yn oesoedd" 🏴❤️
Wow... no தமிழ்???? கிரேட் insult10/11/20
Tamil language mattum add panniruntha Aliens la ippa Namma kuda JOLLY la irrunthuruppanga....... 🥺
do you have patreon or something similar?
No, I just make these videos for fun!
Alien said : Waalaikumsallam
0:25 Alien :SABARAHA ATUH PUNTEUN
Sir your hard work to get this video is worthfull thank you
Kerberos is pronounced thus: ruclips.net/video/w9ZKfRPC8Xw/видео.html
Superior video here: ruclips.net/video/kp5d8Yv3-0c/видео.html
very good
There is something I dont get : After the KDC sent a copy of the new session key and the encrypted TGS ( using the service private key) with the previous session key, the client decrypt the packet using the previous session key, right ! Then he uses the new session key to encrypt his authenticator ( he doesnt decrypt the encrypted TGS 'cause he doesn't know the key). Then he send the packet to the service server. My question is how the service server decrypt the client's packet ? After he gets the new session key by decrypting the TGS, encrypted with his private key. But how does he open the packet ? Or more precisely how does the client encrypt the whole packet or does he not ?
It's good that NASA and the Soyuz program are continuing to work together, even as the US and Russia screw around with a whole lot of nonsense. Of course, it's also great that superb engineering spared these guys' lives. Pray carry on, gentlemen. Also ladies. You're doing the important stuff.
News videos posted earlier are being systematically removed what's up with that?
The fake "everything is alright" animation is complementing nicely the distressed communications and the out-of-breath voices.
It's sort of annoying that the animation is incorrect! I always thought that the animation reflected real-time telemetry, but it seems like it only follows the nominal timing of things. On a nominal launch, everything follows the global timing pretty much perfectly, I imagine, so the animation SEEMS to be real-time, but seemingly, it's actually not.
The last one gives me chills
4:17
needed ammo my ass XD
This is a brain fuck but it’s explained nicely
Excellent explanation! I finally understand it after reading several online article!
Very well explained
Could someone please help me understand the following: 1. Is the initial{"Hi, I'm Chris" @ 5:32} packet encrypted with anything or sent in Clear Text? 2. The packet sent by the client @ 08:00 which contains "TGT, Authenticator & Requested Service" is encrypted or sent as Clear Text? No doubt, this is one of the best explanations that I've seen, no other video mentions the Authenticator and the contents of the various packets like this one did. I wish the standard terms like KRB_AS_REQ, KRB_AS_REP, KRB_TGS_REQ & KRB_TGS_REP etc. were also included.
Explained extremely well! thank you
The best Kerberos video I have ever watched. Thank you very much
Please Closed Captions in Portuguese-Br
How KDC gets the user password initially. Or how does the Key exchange between KDC and Client happen?
great video
Watch the vedio in the below link as well . This is the best video explaining on how Kerberos Work? ruclips.net/video/kp5d8Yv3-0c/видео.html
Your work on recording this is greatly appreciated :)
In all likelihood never will be such a popular and amazing dog like husky! Other species are popular spokesperson, but the Huskies it's different, it's much better! We love the whole breed entirely)), this has not been, and in all probability never will.
cool n concise explanation.
How did the mail server de-crypt a packet which was encrypted using a new session key by the client using its private key ?
at 9:28 the new session key, used for opening the authenticator, is in the Service Ticket, which can be opened only by the mail server. Looks like the packet sent by the client, containing the Service Ticket and the authenticator, is not encrypted with the private key of the client.
The new session key is placed in the service ticket. The service server uses its own private key to open this service ticket and get this new session key which is then used to open the NEW authenticator (the packet you are asking about).
это сонцетрясение
что за земля тресение
Great Explanation. Thanks.
very clear explanation thanks
Very good explanation. Only one thing i din't understand here is at 9:23 where the KDC sent the ticket signed with server key and authenticator signed with the new session key. I don't see that it's been shared with the actual backend server then how the backend server was able to decrypt the authenticator header
+ItIsFullyFaltu I don't think it actually decrypt that ticket. It just found the ticket which eventually means that this request must have gone through the KDC and servers the request. :)
service ticket encrypted with service's private key has the new session key.when service ticket is decrypted by the service it can get the new session key using which it can decrypt the authenticator.hope I understood uour question correctly.
Very effective and clear explanation !!!! Great job ...
I have to Admit! This is Indeed one of the most clear Explanations, I have been a witness of on Internet. Thank You!
A great video. Early days into my CISSP and provides some clarity in the first topic 'Access Control'
big vid
Pretty cool!
Crystal clear explanation. This helped me. Thank you.
Awesome video. Thank you
a very useful video
beautiful
how Mail server decrypts the new authentication without new session key?
It's in the Ticket he decrypted using his private key
goood
nice thnks for giving a detailed explanantion