teridon
teridon
  • Видео 44
  • Просмотров 4 563 104
BFBC2 bloopers for March 2020
Play on our server
=(eGO)= 24/7 Heavy Metal|500tkt|Fast Respawn [GameME]
Просмотров: 145

Видео

bc2 snuzzle failed heli collision
Просмотров 794 года назад
Snuzzle crashed into my heli but it was just a glancing blow
bc2 darkwhip biomecanoide heli roadkill
Просмотров 764 года назад
Biomecanoide jumped out of the crashing heli in time, but gets run over
BC2 funny heli landing
Просмотров 624 года назад
bounced on landing. almost recovered!
Mercury transit 2019-11-11, from NASA's Solar Dynamics Observatory (SDO) in 4K
Просмотров 6434 года назад
From SDO's AIA instrument, 171A Downloadable version: teridon.com/SDO movie 2019-11-11 171A.mp4
Astronauts escape malfunctioning Soyuz rocket 2018-10-11
Просмотров 2,1 тыс.5 лет назад
Astronauts escape from Soyuz after a malfunction during the ascent phase www.bbc.com/news/world-europe-45822845
SDO Lunar Transit simulation for 2019-03-06
Просмотров 675 лет назад
This video shows the predicted view from NASA's Solar Dynamics Observatory (SDO) for a lunar transit occurring on 2019-03-06. In this 5-hour simulation, the moon appears to cross in front of the Sun, then stops and reverses direction to cross in front of the Sun again. The transit start and end times (UTC) are : 2019-03-06 @ 2201 to 2019-03-07 @ 0206
Battlefield Bad Company 2 awesome comeback
Просмотров 1126 лет назад
Russian team was more than 100 tickets and 2 players down so I switched. Our squad dominated and we ended up winning by 150 tickets. Date: 2018-04-25 Server: =(eGO)= 24/7 Heavy Metal|500tkt|Fast Respawn [GameME]
Voyager Golden Record Greetings in 55 languages (with English subtitles)
Просмотров 6 тыс.6 лет назад
English subtitles are from Wikipedia (en.wikipedia.org/wiki/Contents_of_the_Voyager_Golden_Record#Greetings) Video content from ruclips.net/video/QTDK2jCVPN0/видео.html
Two Significant Solar Flares Imaged by NASA's SDO Sept. 6, 2017
Просмотров 8956 лет назад
Solar flares are powerful bursts of radiation. The first flare is classified as an X2.2 flare and the second is an X9.3 flare. NASA article: www.nasa.gov/feature/goddard/2017/two-significant-solar-flares-imaged-by-nasas-sdo
Luke the husky playing with Jade at the dog park
Просмотров 846 лет назад
Luke the husky playing with Jade at the dog park
2016 0708 edge of storm dash cam
Просмотров 8367 лет назад
2016 0708 edge of storm dash cam
killdeer broken wing act
Просмотров 7 тыс.8 лет назад
killdeer broken wing act
SDO AIA 304A 2014-01-07 1800-1830
Просмотров 2498 лет назад
SDO AIA 304A 2014-01-07 1800-1830
SDO Captures Cascading Magnetic Arches zoom 1
Просмотров 638 лет назад
SDO Captures Cascading Magnetic Arches zoom 1
Filament Burst caught by SDO 2015-04-21 11:30 - 15:30 @ 304Å
Просмотров 1149 лет назад
Filament Burst caught by SDO 2015-04-21 11:30 - 15:30 @ 304Å
SDO Lunar Transit and Eclipse 2015-09-13 (DOY 256)
Просмотров 1899 лет назад
SDO Lunar Transit and Eclipse 2015-09-13 (DOY 256)
SDO AIA 171A flare at 2015-04-04T23:19:46 - 2160p
Просмотров 1979 лет назад
SDO AIA 171A flare at 2015-04-04T23:19:46 - 2160p
SDO AIA 171A 2015-02-17 - 2160p
Просмотров 1169 лет назад
SDO AIA 171A 2015-02-17 - 2160p
SDO AIA 171A 2015-02-17 - full disk in 4K
Просмотров 3499 лет назад
SDO AIA 171A 2015-02-17 - full disk in 4K
SMAP Launch 2015-01-31
Просмотров 4619 лет назад
SMAP Launch 2015-01-31
Prominence SDO 304 2014-11-09_10.00.00-11.20.00
Просмотров 2579 лет назад
Prominence SDO 304 2014-11-09_10.00.00-11.20.00
SDO flare AR 13812 2014-08-24 12:00:00 - 12:30:00
Просмотров 2859 лет назад
SDO flare AR 13812 2014-08-24 12:00:00 - 12:30:00
Albuquerque Zoo Polar Bear 2014-08-27 10:40
Просмотров 1339 лет назад
Albuquerque Zoo Polar Bear 2014-08-27 10:40
SDO geosyncronous orbit animation
Просмотров 4,6 тыс.10 лет назад
SDO geosyncronous orbit animation
Raccoon surprised to see me
Просмотров 1,6 тыс.10 лет назад
Raccoon surprised to see me
SDO simulation of the Venus Transit
Просмотров 19211 лет назад
SDO simulation of the Venus Transit
The Kerberos Authentication Process (kerberos_v2.mov)
Просмотров 168 тыс.12 лет назад
The Kerberos Authentication Process (kerberos_v2.mov)
Giant Prominence Erupts - April 16, 2012 1720-1810.mp4
Просмотров 40512 лет назад
Giant Prominence Erupts - April 16, 2012 1720-1810.mp4
SDO tornado 2011-03-11_1700-2358.mp4
Просмотров 2,1 тыс.12 лет назад
SDO tornado 2011-03-11_1700-2358.mp4

Комментарии

  • @TaiLayMienTay
    @TaiLayMienTay 4 месяца назад

    Hay quá bạn ỏi👍👍❤❤❤

  • @_Xx_X_xX_666
    @_Xx_X_xX_666 5 месяцев назад

    So cute..

  • @catpoke9557
    @catpoke9557 5 месяцев назад

    They are such good parents.

  • @sunshine848
    @sunshine848 Год назад

    Bu saçma uzaylıların bunu çözeceğini düşünmüyorum hatta onlara ulaşma ihtimali düşük olsa bile akıllı olması ve ayrıca bize benzeyen bir varlığın olması bana olası gelmiyor ve türkçeyi iyi yapmamışlar

    • @sunshine848
      @sunshine848 Год назад

      Birde bir sürü dil var hangisini çozeceklerde anlayacaklar ?

    • @seika_tsu
      @seika_tsu Год назад

      @@sunshine848 anlamaktan cok bizim var oldugumuzdan haberleri olmalari icin ve kendimizi tanitmak icin var

  • @ursulaankone9457
    @ursulaankone9457 2 года назад

    P

  • @QT5656
    @QT5656 3 года назад

    1:51: "Iechyd da i chi yn awr, ac yn oesoedd" 🏴󠁧󠁢󠁷󠁬󠁳󠁿❤️

  • @palamirtammarimuthu1752
    @palamirtammarimuthu1752 3 года назад

    Wow... no தமிழ்???? கிரேட் insult10/11/20

    • @TechHackerTamilOfficial
      @TechHackerTamilOfficial 2 года назад

      Tamil language mattum add panniruntha Aliens la ippa Namma kuda JOLLY la irrunthuruppanga....... 🥺

  • @cliff4377
    @cliff4377 4 года назад

    do you have patreon or something similar?

    • @teridon
      @teridon 4 года назад

      No, I just make these videos for fun!

  • @rpgmakerindo7827
    @rpgmakerindo7827 4 года назад

    Alien said : Waalaikumsallam

  • @comedysink3324
    @comedysink3324 4 года назад

    Sir your hard work to get this video is worthfull thank you

  • @johnw.3270
    @johnw.3270 5 лет назад

    Kerberos is pronounced thus: ruclips.net/video/w9ZKfRPC8Xw/видео.html

  • @benheideveld4617
    @benheideveld4617 5 лет назад

    Superior video here: ruclips.net/video/kp5d8Yv3-0c/видео.html

  • @duylt5_letrongduy743
    @duylt5_letrongduy743 5 лет назад

    very good

  • @d0c_spike525
    @d0c_spike525 5 лет назад

    There is something I dont get : After the KDC sent a copy of the new session key and the encrypted TGS ( using the service private key) with the previous session key, the client decrypt the packet using the previous session key, right ! Then he uses the new session key to encrypt his authenticator ( he doesnt decrypt the encrypted TGS 'cause he doesn't know the key). Then he send the packet to the service server. My question is how the service server decrypt the client's packet ? After he gets the new session key by decrypting the TGS, encrypted with his private key. But how does he open the packet ? Or more precisely how does the client encrypt the whole packet or does he not ?

  • @TheDavidlloydjones
    @TheDavidlloydjones 5 лет назад

    It's good that NASA and the Soyuz program are continuing to work together, even as the US and Russia screw around with a whole lot of nonsense. Of course, it's also great that superb engineering spared these guys' lives. Pray carry on, gentlemen. Also ladies. You're doing the important stuff.

  • @sparramore
    @sparramore 5 лет назад

    News videos posted earlier are being systematically removed what's up with that?

  • @IvanDmitriev1
    @IvanDmitriev1 5 лет назад

    The fake "everything is alright" animation is complementing nicely the distressed communications and the out-of-breath voices.

    • @ojkolsrud1
      @ojkolsrud1 5 лет назад

      It's sort of annoying that the animation is incorrect! I always thought that the animation reflected real-time telemetry, but it seems like it only follows the nominal timing of things. On a nominal launch, everything follows the global timing pretty much perfectly, I imagine, so the animation SEEMS to be real-time, but seemingly, it's actually not.

  • @anna-mh5ct
    @anna-mh5ct 5 лет назад

    The last one gives me chills

  • @lordshiga9482
    @lordshiga9482 5 лет назад

    needed ammo my ass XD

  • @leo-rq2ei
    @leo-rq2ei 6 лет назад

    This is a brain fuck but it’s explained nicely

  • @meganlee5897
    @meganlee5897 6 лет назад

    Excellent explanation! I finally understand it after reading several online article!

  • @Nidhin0D
    @Nidhin0D 6 лет назад

    Very well explained

  • @lakhdeepsingh1983
    @lakhdeepsingh1983 6 лет назад

    Could someone please help me understand the following: 1. Is the initial{"Hi, I'm Chris" @ 5:32} packet encrypted with anything or sent in Clear Text? 2. The packet sent by the client @ 08:00 which contains "TGT, Authenticator & Requested Service" is encrypted or sent as Clear Text? No doubt, this is one of the best explanations that I've seen, no other video mentions the Authenticator and the contents of the various packets like this one did. I wish the standard terms like KRB_AS_REQ, KRB_AS_REP, KRB_TGS_REQ & KRB_TGS_REP etc. were also included.

  • @MassimilianoCiccone
    @MassimilianoCiccone 6 лет назад

    Explained extremely well! thank you

  • @inochi27
    @inochi27 6 лет назад

    The best Kerberos video I have ever watched. Thank you very much

  • @iandsonmendes5989
    @iandsonmendes5989 6 лет назад

    Please Closed Captions in Portuguese-Br

  • @jsridhar72
    @jsridhar72 6 лет назад

    How KDC gets the user password initially. Or how does the Key exchange between KDC and Client happen?

  • @raghu2911
    @raghu2911 7 лет назад

    great video

  • @rajeshagooner
    @rajeshagooner 7 лет назад

    Watch the vedio in the below link as well . This is the best video explaining on how Kerberos Work? ruclips.net/video/kp5d8Yv3-0c/видео.html

  • @kylealexmatt
    @kylealexmatt 7 лет назад

    Your work on recording this is greatly appreciated :)

  • @REDCATArmy
    @REDCATArmy 7 лет назад

    In all likelihood never will be such a popular and amazing dog like husky! Other species are popular spokesperson, but the Huskies it's different, it's much better! We love the whole breed entirely)), this has not been, and in all probability never will.

  • @tanweerzaki
    @tanweerzaki 7 лет назад

    cool n concise explanation.

  • @shanmukhds912
    @shanmukhds912 7 лет назад

    How did the mail server de-crypt a packet which was encrypted using a new session key by the client using its private key ?

    • @frasurf82
      @frasurf82 7 лет назад

      at 9:28 the new session key, used for opening the authenticator, is in the Service Ticket, which can be opened only by the mail server. Looks like the packet sent by the client, containing the Service Ticket and the authenticator, is not encrypted with the private key of the client.

    • @inochi27
      @inochi27 6 лет назад

      The new session key is placed in the service ticket. The service server uses its own private key to open this service ticket and get this new session key which is then used to open the NEW authenticator (the packet you are asking about).

  • @user-sy2gg6kf3n
    @user-sy2gg6kf3n 7 лет назад

    это сонцетрясение

  • @user-re8xl1xo3c
    @user-re8xl1xo3c 7 лет назад

    что за земля тресение

  • @ravirajam47
    @ravirajam47 7 лет назад

    Great Explanation. Thanks.

  • @ekoroekoro8484
    @ekoroekoro8484 8 лет назад

    very clear explanation thanks

  • @ItIsFullyFaltu
    @ItIsFullyFaltu 8 лет назад

    Very good explanation. Only one thing i din't understand here is at 9:23 where the KDC sent the ticket signed with server key and authenticator signed with the new session key. I don't see that it's been shared with the actual backend server then how the backend server was able to decrypt the authenticator header

    • @debashischatterjee2871
      @debashischatterjee2871 8 лет назад

      +ItIsFullyFaltu I don't think it actually decrypt that ticket. It just found the ticket which eventually means that this request must have gone through the KDC and servers the request. :)

    • @mukundkumar6131
      @mukundkumar6131 5 лет назад

      service ticket encrypted with service's private key has the new session key.when service ticket is decrypted by the service it can get the new session key using which it can decrypt the authenticator.hope I understood uour question correctly.

  • @savithsatheesh7274
    @savithsatheesh7274 8 лет назад

    Very effective and clear explanation !!!! Great job ...

  • @milindpurswani5319
    @milindpurswani5319 8 лет назад

    I have to Admit! This is Indeed one of the most clear Explanations, I have been a witness of on Internet. Thank You!

  • @fsl001
    @fsl001 8 лет назад

    A great video. Early days into my CISSP and provides some clarity in the first topic 'Access Control'

  • @spiz02930
    @spiz02930 8 лет назад

    big vid

  • @nicholashylton6857
    @nicholashylton6857 8 лет назад

    Pretty cool!

  • @giridharg82
    @giridharg82 8 лет назад

    Crystal clear explanation. This helped me. Thank you.

  • @alisaadi150
    @alisaadi150 8 лет назад

    Awesome video. Thank you

  • @praveenkumar-mr3wf
    @praveenkumar-mr3wf 8 лет назад

    a very useful video

  • @aakashgupta384
    @aakashgupta384 8 лет назад

    beautiful

  • @drillplantan4695
    @drillplantan4695 9 лет назад

    how Mail server decrypts the new authentication without new session key?

    • @orel1996
      @orel1996 7 лет назад

      It's in the Ticket he decrypted using his private key

  • @STamilSelvan
    @STamilSelvan 9 лет назад

    goood

  • @lavanyavenkatesh6802
    @lavanyavenkatesh6802 9 лет назад

    nice thnks for giving a detailed explanantion