Sentdex.com Facebook.com/sentdex Twitter.com/sentdex How to use python to encrypt sensitive information, and later decrypt it, using PyCrypto! PyCrypto: https://www.dlitz.net/software/pycrypto/ The Code: http://sentdex.com/sentiment-analysisbig-data-and-python-tutorials/encryption-and-decryption-in-python-code-example-with-explanation/
Views: 88702 sentdex
In this tutorial, we will learn Encryption/Decryption for AES CBC mode using PyCrypto. All links for source code, text based tutorial and further reading material will be in the description below. Detailed Text Based Tutorial http://www.letscodepro.com/encryption-in-python-using-pycrypto/ Gihub Source Code Link https://github.com/the-javapocalypse/Python-File-Encryptor Further Reading Material http://searchsecurity.techtarget.com/definition/cipher https://defuse.ca/cbcmodeiv.htm https://www.di-mgt.com.au/cryptopad.html http://www.cryptofails.com/post/70059609995/crypto-noobs-1-initialization-vectors Please Subscribe! And like. And comment. That's what keeps me going. Follow Me Facebook: https://www.facebook.com/javapocalypse Instagram: https://www.instagram.com/javapocalypse
Views: 23344 Javapocalypse
In this tutorial we will be looking at ENCRYPTING & DECRYPTING DATA in Python . This is one of many great python tutorials that should get you well on your way to programming some amazing stuff!! The individual dictionary files used and the final output is available on my Github repository. https://github.com/LDrys/dataencryption-decryption/tree/master Please Subscribe to my YouTube channel "AnalystRising" for more amazing stuff!! I have more videos available on Arduinos and Excel ready for viewing!!
Views: 1054 Analyst Rising
This is a tutorial covering how to use pickle to serialize python object hierarchies. Saving lists, dictionaries and custom classes. All Links and Slides will be in the description. Subscribe for more cool stuff! Slides & files - https://www.mediafire.com/folder/wmiijr63i2jih/Tutorial_11_-_Pickle Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ Steam Group: http://steamcommunity.com/groups/DrapsTV Twitter: https://twitter.com/DrapsTV Facebook: https://www.facebook.com/DrapsTV If you like what you see be sure to subscribe and thumbs up!
Views: 19025 DrapsTV
This video series will show you exactly how to make a functional, interactive text file encryption/decryption program. You could use the app for password storage, secret information, etc. In this tutorial I use Tkinter and PyCrypto, and the encryption is the modern standard: AES (Advanced Encryption Standard). Thanks for watching and please Like the video!
Views: 1116 Zach King
GET CODE FREE HERE: http://robotix.com.au/#/videos/105 SOCIAL: Twitter: https://twitter.com/SanjinDedic Facebook Page: https://www.facebook.com/RobotixAu/ LinkedIn: https://au.linkedin.com/in/sanjin-dedic-a028b9113 MINDS: https://www.minds.com/SanjinDedic WEBSITES Techxellent.com.au Robotix.com.au -~-~~-~~~-~~-~- Latest and Best Arduino Playlist in Collaboratio with DFRobot: https://www.youtube.com/playlist?list=PL_92WMXSLe_86NTWf0nchm-EmQIwccEye -~-~~-~~~-~~-~-
Views: 642 Robotix
Hello Friends, In This Video, I'm Gonna Show You How You Can Encrypt & Decrypt The Hash String With The Help Of Hashlib Python Module Python-Hash-Cracker Program - https://goo.gl/zs3ikD HASHING : - If you need secure hashes or message digest algorithms, then Python’s standard library has you covered in the hashlib module. It includes the FIPS secure hash algorithms SHA1, SHA224, SHA256, SHA384, and SHA512 as well as RSA’s MD5 algorithm. Python also supports the adler32 and crc32 hash functions, but those are in the zlib module. One of the most popular uses of hashes is storing the hash of a password instead of the password itself. Of course, the hash has to be a good one or it can be decrypted. Another popular use case for hashes is to hash a file and then send the file and its hash separately. Then the person receiving the file can run a hash on the file to see if it matches the hash that was sent. If it does, then that means no one has changed the file in transit Cryptographic hashes are used in day-day life like in digital signatures, message authentication codes, manipulation detection, fingerprints, checksums (message integrity check), hash tables, password storage and much more. They are also used in sending messages over a network for security or storing messages in databases. There are many hash functions defined in the “hashlib” library in python. Some of the most used hash functions are: MD5: Message digest algorithm producing a 128 bit hash value. This is widely used to check data integrity. It is not suitable for use in other fields due to the security vulnerabilities of MD5. SHA: Group of algorithms designed by the U.S's NSA that are part of the U.S Federal Information processing standard. These algorithms are used widely in several cryptographic applications. The message length ranges from 160 bits to 512 bits. Functions associated : encode() : Converts the string into bytes to be acceptable by hash function. digest() : Returns the encoded data in byte format. hexdigest() : Returns the encoded data in hexadecimal format. ----------------------------------------------------------------------------------------------------------- Hope This Video Is Helpful For You ► Connect with me! ◄ Facebook - http://bit.ly/2tbOg3b Google+ - http://bit.ly/2jrWz6g Instagram - http://bit.ly/2tbR14z Reddit - https://bit.ly/2J5Vqfm ★★★Watch my most recent videos playlist★★★ Kali Linux - https://goo.gl/36M3JD Deep Web - https://goo.gl/7ueKNh Python Coding - https://goo.gl/dCtyrS Java Coding - https://goo.gl/oxFo8W Basic Computer - https://goo.gl/kwFXM3 Hacking - https://goo.gl/vjT916 Games Benchmark - https://goo.gl/eshw3T Gaming - https://goo.gl/mLuQwf Notepad Tricks -https://goo.gl/3uapMJ CMD Tricks - https://goo.gl/x1KH8C Facebook Tricks - https://goo.gl/1JV9Fz Problem Solved - https://goo.gl/eJwjXq Gmail Tricks - https://goo.gl/fSpbaB And talking about subscribing, please subscribe to my channel, if you enjoyed this video and want more how-to, Thanks so much for watching!
Views: 9879 Mighty Ghost Hack
Lesson 5.1 introduces two new functions to the series: First, the ord() function converts a single character in a string value to an integer. Next, the chr() function takes an integer value and converts it to it's string equivalent. Using these functions, we can do some interesting mathematical calculations on strings and create way to encode messages. This is an introductory series of Python tutorials. This course, from start to finish, is designed to help someone who has never programmed before learn the basics of coding in Python. As this series continues, we examine more advanced Python techniques, functions, and methods. You can download a copy of Python from http://www.python.org/downloads/. Keep in mind this tutorial is using an older version of Python, v3.2.5. You will need to click on the "View Older Releases" button to use this specific version. Using the newer versions will not be an issue at this point, but when the lesson proceeds to basic graphics, the Pygame Module we'll use does not supports v3.2.5 only.
Views: 2557 Programming Tutorials by Steve
In this lesson we look at an alternative way to encrypt a string. This time we use Python's ord() and chr() functions and make use of the ASCII values for each of our letters.
Views: 10128 Andy Dolinski
source code: http://pysource.com/2018/01/17/get-transactions-by-address-etherscan-api-with-python-3-tutorial-3/
Views: 1377 Pysource
python for hacking tutorial part4 get to know dictionary in python The Python dictionary data structure provides a hash table that can store any number of Python objects. The dictionary consists of pairs of items that contain a key and value. Let’s continue with our example of a vulnerability scanner to illustrate a Python dictionary. When scanning specific TCP ports, it may prove useful to have a dictionary that contains the common service names for each port. Creating a dictionary, we can lookup a key like ftp and return the associated value 21 for that port. When constructing a dictionary, each key is separated from its value by a colon, and we separate items by commas. Notice that the method .keys() will return a list of all keys in the dictionary and that the method .items() will return an entire list of items in the dictionary. Next, we verify that the dictionary contains a specific key (ftp). Referencing this key returns the value 21.
Views: 508 aolne pentest
In this tutorial we will be looking at SHOWING/HIDING PASSWORDS in Python . This is one of many great python tutorials that should get you well on your way to programming some amazing stuff!! The individual dictionary files used and the final output is available on my Github repository. https://github.com/LDrys/GUIshowhidepassword/tree/master Please Subscribe to my YouTube channel "AnalystRising" for more amazing stuff!! I have more videos available on Arduinos and Excel ready for viewing!!
Views: 759 Analyst Rising
Learn hashing with Python using Hashlib package of Python. We are going to be discussing a lot of algorithms including Md5, Sha256 etc
Views: 1127 buildwithpython
In this video you will learn how does encryption and decryption works when you communicate with your friends online and does it maintains privacy to your conversation from the hackers and also you will enjoy it if you have your little interest in cyber security.
Views: 3105 Innovate Yourself
GitHub аккаунт: https://github.com/Number571 Yandex: https://yadi.sk/i/vwqAhI9c3XjFUt MEGA: https://mega.nz/#!ootD1YAC!u85pKd8xmoK4rIn0drkykujOblWUrrsGEyGMTHmoL9Y
Views: 940 CryptoFun [ IT ]
Reference : https://8gwifi.org/docs/python-rsa.jsp python RSA Cryptography RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1978. A user of RSA creates and publishes the product of two large prime numbers, along with an auxiliary value, as their public key pyca generate rsa keys pyca rasa-oaep encryption/ decryption example pyca rsa sign Verify Example pycrypto Generate RSA Keys and store in PEM format pycrypto Generate Encrypted RSA PEM Keys pycrypto Generate Encrypted RSA Keys in PKCS8 format pycrypto Generate RSA key and export in DER Format pycrypto Generate RSA Keys and Perform Encryption and Decryption pycrypto Load RSA Keys and Perform Encryption and Decryption pycrypto PKCS1_OAEP pycrypto PKCS1_PSS Sign Verify pycrypto PKCS1_v1_5 Encrypt/Decrypt
Views: 209 Zariga Tongy
This is a tutorial covering class methods, ranging from basic methods to special methods. While learning these we create a Vector2D class, used in almost every 2D video game. All Links and Slides will be in the description. Subscribe for more cool stuff! Special Methods - http://docs.python.org/3/reference/datamodel.html#special-method-names Slides & files - https://www.mediafire.com/folder/n4n7eq7s8l5dg/Tutorial_3_-_Methods Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ My Twitter: https://twitter.com/DrapsTV If you like what you see be sure to subscribe and thumbs up!
Views: 28869 DrapsTV
This is an Introduction to my Advanced Python3 Tutorials series! The Python2 advanced series adapted to python3. All Links and Slides will be in the description. Subscribe for more cool stuff! Slides & files - https://www.mediafire.com/folder/pbi7rulkjniyl/Tutorial_1_-_Intro Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ Steam Group: http://steamcommunity.com/groups/DrapsTV Twitter: https://twitter.com/DrapsTV Ello: https://ello.co/drapstv If you like what you see be sure to subscribe and thumbs up!
Views: 124320 DrapsTV
This video will give you an idea about Text Encryption and Decryption. I'm using Caesar cipher method to Encrypt the data using Python. Please Like, comment and Subscribe to my channel for more upcoming Videos. If you have any doubt or suggestion then please comment it. My profile : https://www.xsonic.in/profile/ Thank You Mayank Gupta
Views: 64 Code House
Python program files and PDF manuals available FREE! at: https://techxellent.courses/p/python-fundamentals-all-moudules/?product_id=519981&coupon_code=FREE SOCIAL: MINDS: https://www.minds.com/SanjinDedic Facebook Page: https://www.facebook.com/RobotixAu/ LinkedIn: https://au.linkedin.com/in/sanjin-dedic-a028b9113 WEBSITES: Techxellent.com.au Robotix.com.au COURSE DESCRIPTION: What is Python and why is it important? Python is an interpreted text based general purpose programming language, which is a key requisite of the 7-10 Digital Technologies Curriculum. Python is also the only professional programming language that was designed with beginners in mind, it is intuitive and easy to use What are the student outcomes? Students learn about core concepts of programming: branching, iteration and functions. They apply these to create four applications which perform the following: Simulation of an intelligent conversation User Authentication using passwords and/or secret questions A game where user guesses a number and the program informs the user of his accuracy over time A program that encrypts and decrypts messages using the Caesar Cypher What is the educational approach of the course? The course explicitly teaches the concepts such as loops or functions, performing several examples in the interactive shell. Then these concepts are employed to create a computer program these programs progress in their level of difficulty, eventually performing complex tasks like encryption Beyond the concepts and applications students will also learn the following skills: Creating algorithms which can be represented in the form of flowcharts, which are in turn easy to translate to code. Building programs in separate stages each of which can be tested Getting insight and understanding from error messages -~-~~-~~~-~~-~- Latest and Best Arduino Playlist in Collaboratio with DFRobot: https://www.youtube.com/playlist?list=PL_92WMXSLe_86NTWf0nchm-EmQIwccEye -~-~~-~~~-~~-~-
Views: 134 Robotix
Ceasar Cipher in Python Hi!! In this video I'll be doing ceasar cipher encryption and decryption using Python -*- Support on Patreon: https://www.patreon.com/voxelpixel -*- Support me with BTC: 1MGUkGsQ3UAkGpH3bCch6o3mRsYP4Hn683 -*- Support me with ETH: 0x6AC343664b66a678eF90CE9379B5c9F08d98e1e5 -*- Support me with BCH: qr0yl65hkc8vzuu60x2wzdp4rhfr997s2qghswrt4p -*- Source Code: https://github.com/VoxelPixel Caesar Cipher is subsitution cipher, its algorithm is as following: - Take alphabetic message (A to Z) - Take a key (1 to 26) (1 being A and 26 being Z) - To encrypt, left-shift or right-shift message letter by letter by the value of key For example if message is "ABC" and key is 1 and we are performing right-shift then encrypted text will be A+1 = B, B+1 = C, C+1 = D. ABC = BCD, BCD being encrypted text. - To decrypt, left-shift or right-shift the message letter by letter opposite to the shift performed in encryption by the value of key For example if encrypted text is "BCD" and key is 1 and we are performing left-shift then encrypted text will be B-1 = A, C-1 = B, D-1 = C. BCD = ABC, ABC being decrypted text.
Views: 6277 VoxelPixel
A recent twitter poll went around the web and it asked, what percentage of the Python standard library do you think you know? Someone copied me on it, maybe expecting some really high percentage answer. In reality, what I did answer and my rough estimate is that it's probably around 50%. This episode with Alessandro Molina definitely helped confirm that experience for me. He just published a book entitled "Modern Python Standard Library Cookbook" and it's full of these great little corners of the standard library that you might not have bumped into but you'll be super glad to hear about on this episode! Full show notes at https://talkpython.fm/197
Views: 180 Talk Python
This is an Introduction to my Advanced Python Tutorials series!. All Links and Slides will be in the description. Subscribe for more cool stuff! Slides & Files - https://www.mediafire.com/folder/veog3yhj22dpo/Tutorial%201%20-%20Introduction Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ Twitter: https://twitter.com/DrapsTV Facebook: https://www.facebook.com/DrapsTV If you like what you see be sure to subscribe and thumbs up!
Views: 86802 DrapsTV
THESE WILL SAVE YOU A CRAZY AMOUNT OF TIME! In this video I go over different tips and tricks in python that are sure to save you a lot of time while programming. Python was created on the basis of all things that are wrong with other programming languages; this explains why this language has so many helpful tools. Most of the tips and tricks shown are specific to python. List of Tips and Tricks: #Python cool tricks #1 - Enumerate li = ['a', 'b', 'c', 'd'] for x in range(len(li)): print(li[x]) for i, item in enumerate(li): print(i, item) #2 - String multiplication s = "hello" print(s+s+s+s) print(s*4) #3 - variable swap a = 1 b = 3 temp = a a = b b = temp a,b = b,a #4 - variable assignment from list a = [1,2,3] x,y,z = a #5 - help() function help(len) #5 - dir() function dir(str) #6 - list comprhension li = [x for x in range(10) if x%2 == 0] #7 - Sorted and reversed li = ['hello', 'abc', 'abcd', 'goodbye', 'name', 'tim', 'tech'] reversed(li) sorted(li) sorted(L, key = len) Want To Support This Channel? Bitcoin: 1PbkAYLFaJBgjbKn2ptGyBz65xWN8hJgBU Ethereum: 0xdd42dbbdba60f7163fc7a840e189474b6e8bfcad Ripple: rD4arM9CVjQWqi8f1kxdpCgkCgEkqBgtud Please leave a LIKE and SUBSCRIBE for more content! Tags: - Tech With Tim - Coding - Pygame - Python Tutorials - Python Tips and Tricks - Python tips - Python tricks - Python tips and tricks for beginners
Views: 519 Tech With Tim
https://uneex.org/LecturesCMC/PythonIntro2017/07_Dicts Лекцию читает Георгий Курячий.
Views: 543 UNИX
Hey, guys! HackerSploit here with another python tutorial, in this video series I am going to be teaching you how to use Python to create network tools and Ethical Hacking scripts. This series will take you from beginner to intermediate/advanced in Python. I Hope you enjoy/enjoyed the video. If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog. HackerSploit Website: https://hsploit.com/ ✔️SOCIAL NETWORKS ------------------------------- Facebook: https://www.facebook.com/HackerSploit/ Twitter: https://twitter.com/HackerSploit Discord: https://discord.gg/8BEcPVd Instagram: https://www.instagram.com/alexi_ahmed... Kik Username: HackerSploit Patreon: http://patreon.com/hackersploit -------------------------------- Thanks for watching! Благодаря за гледането 感谢您观看 Merci d'avoir regardé Gracias por ver شكرا للمشاهدة देखने के लिए धन्यवाद
Views: 20505 HackerSploit
In the last tutorial, we explained what function parameters were, and that we could have an infinite amount of them. With this, we explained how having a lot of them could become troublesome and tedious for the programmer using the function. Luckily, there is a solution for this. Sometimes, it can make a lot of sense to make a complex function highly customize-able. That said, some people may want to use the function in it's simple... "default" ... form. Think about it like buying a car. Some people want to just buy the base model, with all the features that come by default from the factory. Other people want to customize their car in many different ways. Luckily, we allow people who want to customize their car the option to do it, but we do not ask every buyer of every car what kind of wheels they want, what brand of tire, what screws they want, what kind of leather seats by what brand, what windshield, what steering wheel, what lights... etc. This is just too much for some people and what they want to use the car for. Same goes for functions in programming. So we have function parameter defaults, which allow the function's creator to set "default" values to the function parameters. This allows anyone to use a function with the default values, yet lets anyone who wishes to customize them the ability to specify different values. When using defaults, any parameters with defaults should be the last ones listed in the function's parameters. Sample code for this basics series: http://pythonprogramming.net/beginner-python-programming-tutorials/ Python 3 Programming tutorial Playlist: http://www.youtube.com/watch?v=oVp1vrfL_w4&feature=share&list=PLQVvvaa0QuDe8XSftW-RAxdo6OmaeL85M http://seaofbtc.com http://sentdex.com http://hkinsley.com https://twitter.com/sentdex Bitcoin donations: 1GV7srgR4NJx4vrk7avCmmVQQrqmv87ty6
Views: 144286 sentdex
In this lesson we're going to talk about that how to rename files in python programming language.
Views: 1155 nevsky.programming
Learn how to get user input in Python. Learn about different variable types and type-casting so you can effectively work with strings and numbers from the user. After this tutorial you will have two new snippets for your cookbook: user_input.py and variable_types.py. Check out www.devdungeon.com for more tutorials and resources. More information about the Cookbook Method at www.devdungeon.com/cookbook Watch the full playlist: Learn Python - Build a Cookbook https://www.youtube.com/watch?v=8vmUTz6it5A&list=PLEtC2iwVrNRZdd5HqafuFMWjG-V_i16rO
Views: 2408 DevDungeon
Raymond Chandler III http://www.pyvideo.org/video/3680/super-intermediate-python-3 http://pyohio.org/schedule/presentation/182/ This talk is a follow up of my 2013 Super Advanced Python talk, but now will be much more focused on functional programming and data transformation. We will deep dive into the wonders of functional programming with Python.
Views: 946 Next Day Video
This playlist/video has been uploaded for Marketing purposes and contains only selective videos. For the entire video course and code, visit [http://bit.ly/2y13UAO]. Learn to program Bitcoin API using Python. • Learn how to generate a Bitcoin address • Learn how to generate a Multi-Signature address • Learn how to get the transactional history of a address For the latest Application development video tutorials, please visit http://bit.ly/1VACBzh Find us on Facebook -- http://www.facebook.com/Packtvideo Follow us on Twitter - http://www.twitter.com/packtvideo
Views: 6378 Packt Video
Hello Guys, In this video i will show you What caesar cipher and How to run Caesar ciper program in python or we can say how to implement Caesar cipher algorithm in python programming language. Caesar cipher is very much old Cryptography Algorithm and this algorithm is easy to implement and execute. For that you need basic understanding of python programming language. In my case i use Pycharm Editor for develop and build python program. you can also use and create program in python IDLE and command line also. With the use of this python script you can encrypt any message you want. but it will encrypt only alphabet. Special character and number not be encrypt for that other algorithm will be used. You can encrypt Small message and share some information and Message. I hope you liked the video. If you have any Queries Feel free to ask in the comment section. Don't forget to subscribe our channel. Thanks for watching :)
Views: 1446 CodeFluent
This is tutorial covering how to use pickle to serialize python object hierarchies. Saving lists, dictionaries and custom classes. All Links and Slides will be in the description. Subscribe for more cool stuff! Slides & files - https://www.mediafire.com/folder/35p5l12t5e1yr/Tutorial_11_-_Pickle Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ If you like what you see be sure to subscribe and thumbs up!
Views: 20325 DrapsTV
Part 2: http://youtu.be/nQkaBiOwsIo As requested, this is a tutorial showing users how to handle unicode on websites like Twitter. This can be used to convert things like special language symbols, things like smileys/emoticons, and really any of the symbols that you will come across as unicode as you parse or stream. Since the main request was for Arabic, that is the example used here, though it works across the board. Sentdex.com Facebook.com/sentdex Twitter.com/sentdex
Views: 12032 sentdex
This video is part of an online course, Programming Foundations with Python. Check out the course here: https://www.udacity.com/course/ud036. This course was designed as part of a program to help you and others become a Full Stack Web Developer. You can check out the full details of the program here: https://www.udacity.com/course/nd004.
Views: 56739 Udacity
This is an Introduction to my Intermediate Python3 Tutorials series. All Links and Slides will be in the description. Subscribe for more cool stuff! Slides & files - https://www.mediafire.com/folder/q2yhbuex21vx8/Tutorial_1_-_Introduction Python - http://python.org/ Ubuntu - http://www.ubuntu.com/ My Twitter: https://twitter.com/DrapsTV If you like what you see be sure to subscribe and thumbs up!
Views: 46023 DrapsTV
► Abonnieren & nichts mehr verpassen: http://bit.ly/16EuMyJ ► Facebook: http://on.fb.me/TH2nCX • Steam: Franneck94 ► Unterstützt mich mit einer Spende: http://bit.ly/1UkpiXS PYTHON: ► Projekt bei GitHub: https://github.com/franneck94/Python3-Introduction ► Playlist: http://bit.ly/2gK13my ► Anaconda: www.anaconda.com/download/ ► Visual Studio Code: code.visualstudio.com/ UDEMY KURSE: ► C++ Kurs (9,99€): https://goo.gl/emMJT3 ► C++ Intro: https://youtu.be/C2Sv-pcYFDQ ► Machine Learning Kurs für (9,99€): https://goo.gl/TzTdyy ► Machine Learning Intro: https://youtu.be/rwH0T6Ps12w ► Deep Learning TensorFlow Kurs (9,99€): https://goo.gl/nX6r82 ► Deep Learning Intro: https://youtu.be/KuMkn6j_WlQ BÜCHER: ► Python Cookbook: http://amzn.to/2xViWtH * ► Fluent Python: http://amzn.to/2xVaIS5 * ► C++ Programmierbuch (Anfänger): http://amzn.to/27yiqL4 * ► Effektives modernes C++: http://amzn.to/2hTMI7i * ► Vorkurs Informatik: http://amzn.to/22fU7O2 * ► Mathematik für Informatiker (1): http://amzn.to/1V8J4Fj * ► Mathematik für Informatiker (2): http://amzn.to/204JWKq * ► Kryptografie verständlich: http://amzn.to/2hU89VA * ► Theoretische Informatik Buch: http://amzn.to/2cp6BiG * ► Diskrete Mathematik Buch: http://amzn.to/2cp5RKr * YOUTUBE Kanäle: ► 3Blue1Brown: http://bit.ly/2cJGORM ► Welchs Lab: http://bit.ly/2l5NVx4 ► Sentdex: http://bit.ly/2gVOBjU PC SETTINGS: ► Bei Amazon einkaufen: http://amzn.to/1h7RYRF * ► Meine Tastatur: http://amzn.to/19ksPQ4 * ► Meine Maus: http://amzn.to/1paBiv4 * ► Mein Mousepad: http://amzn.to/1nLPF52 * ► Mein Headset: http://amzn.to/TMT0Ih * * Affiliate Link: Das bedeutet, dass ich am Verkaufspreis beteiligt werde, es enstehen keine Kosten für dich und ich bekomme ein Stück vom Kuchen ab.
Views: 799 Franneck
Learn Python programming. In this series of videos I will show you how you can quickly and easily program Cisco networks using Python. More free Python videos here: https://www.youtube.com/channel/UCE5lO-r02VMgP5RsVIkc_Gw Learn how to automate your networks using Python.
Views: 7306 Ashish Gupta