Mike Pound Q&A - Computerphile Published 2020-08-05 Download video MP4 360p Recommendations 13:39 Psychic Signatures (Java Vulnerability) - Computerphile 12:30 Is DeepFake Really All That? - Computerphile 21:20 Cracking Enigma in 2021 - Computerphile 26:31 Log4J & JNDI Exploit: Why So Bad? - Computerphile 16:06 Taming Kerberos - Computerphile 17:35 Square & Multiply Algorithm - Computerphile 11:34 What NOT to do: Self Modifying Code - Computerphile 12:55 Detecting Faces (Viola Jones Algorithm) - Computerphile 11:04 DNS Cache Poisoning - Computerphile 08:04 How DNS Works - Computerphile 12:55 Discussing node.js - Computerphile 07:24 What's your Favourite Programming Language? (sound check Q) - Computerphile 14:16 Modes of Operation - Computerphile 07:18 FizzBuzz: One Simple Interview Question 11:56 "Real" Programmers & Drum Memory - Computerphile 03:51 Who is Mike Pound? 10:22 AI That Doesn't Try Too Hard - Maximizers and Satisficers 28:47 Someone improved my code by 40,832,277,770% Similar videos 13:52 Ch(e)at GPT? - Computerphile 28:34 Train your AI with Dr Mike Pound (Computerphile) 10:59 Have You Been Pwned? - Computerphile 14:50 Breaking RSA - Computerphile 10:21 SHA: Secure Hashing Algorithm - Computerphile 20:20 Password Cracking - Computerphile 09:11 One Encryption Standard to Rule Them All! - Computerphile 09:41 No, it's not Sentient - Computerphile 11:33 How to Choose a Password - Computerphile 08:12 End to End Encryption (E2EE) - Computerphile 05:32 Magic "Nothing Up My Sleeve" Numbers - Computerphile 12:48 Has Generative AI Already Peaked? - Computerphile 09:24 Securing Stream Ciphers (HMAC) - Computerphile 10:56 Diceware & Passwords - Computerphile 08:40 Secret Key Exchange (Diffie-Hellman) - Computerphile More results