Media Summary: Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ... Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ... Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ...

Exploiting The Tiltman Break Computerphile - Detailed Analysis & Overview

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ... Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ... Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ... Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in ... Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs ... During World War II, the Lorenz cipher machine was used by the High Command of the Wehrmacht for war important, top secret ...

Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP... Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, ... The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII. Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ... How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ... One line of code can get root access on many Linux systems. Dr Steve Bagley demos the

Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ...

Photo Gallery

Exploiting the Tiltman Break - Computerphile
Why Build Colossus? (Bill Tutte) - Computerphile
Running a Buffer Overflow Attack - Computerphile
Turing, Tutte & Tunny - Computerphile
The Great 202 Jailbreak - Computerphile
The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941
TCP Meltdown - Computerphile
Fishy Codes: Bletchley's Other Secret - Computerphile
Cracking Windows by Atom Bombing - Computerphile
Turing's Enigma Problem (Part 1) - Computerphile
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile
Secret Key Exchange (Diffie-Hellman) - Computerphile
View Detailed Profile
Exploiting the Tiltman Break - Computerphile

Exploiting the Tiltman Break - Computerphile

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ...

Why Build Colossus? (Bill Tutte) - Computerphile

Why Build Colossus? (Bill Tutte) - Computerphile

Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ...

Running a Buffer Overflow Attack - Computerphile

Running a Buffer Overflow Attack - Computerphile

Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ...

Turing, Tutte & Tunny - Computerphile

Turing, Tutte & Tunny - Computerphile

Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in ...

The Great 202 Jailbreak - Computerphile

The Great 202 Jailbreak - Computerphile

Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs ...

The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941

The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941

During World War II, the Lorenz cipher machine was used by the High Command of the Wehrmacht for war important, top secret ...

TCP Meltdown - Computerphile

TCP Meltdown - Computerphile

Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP...

Fishy Codes: Bletchley's Other Secret - Computerphile

Fishy Codes: Bletchley's Other Secret - Computerphile

Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, ...

Cracking Windows by Atom Bombing - Computerphile

Cracking Windows by Atom Bombing - Computerphile

A security

Turing's Enigma Problem (Part 1) - Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII.

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ...

Secret Key Exchange (Diffie-Hellman) - Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

eXploit X : "Give Me Root" - Computerphile

eXploit X : "Give Me Root" - Computerphile

One line of code can get root access on many Linux systems. Dr Steve Bagley demos the

Power LED Attack - Computerphile

Power LED Attack - Computerphile

Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ...