Thanks for the video, I'm building one at the moment and have just ordered your pcb.
@davecrabbe45795 сағат бұрын
@@BaldyTron great. Let me know how it goes
@PrathmeshChhabraКүн бұрын
@davecrabbe4579 ,At 11:05, you said that we use public key of google CA to decrypt the hash of NSCC certificate. I have two doubts here: 1. First of all, as I am aware, hashing is irreversible, how can you decrypt a hash? 2. Public key is used for encryption, not decryption, right? Then this does not make sense. Could he be trying to say, that we use this public key that we receive from google, to again hash the contents of the certificate and then compare them to the original hash that is present in the certificate. If both are same, then we can be sure, the certificate content hasn't been modified. Would really appreciate if someone can clear this
@user-yj5gc5ly7nКүн бұрын
thank you
@Gokul724584 күн бұрын
Mahnn plz start tutorials for low level concepts, I watched all the videos u posted 7 years ago, it's so good ❤
@davecrabbe45794 күн бұрын
@@Gokul72458 thanks for the comments. Ill try to create some videos for those starting out
@HollyHertig4 күн бұрын
I have yet to make a ninja. Nice!🎉🎉🎉
@cemocan199011 күн бұрын
Jep amazing mods. I will definitely change my second one for one of your mods.
@pumpkinbouy503817 күн бұрын
That’s sick looking 👀
@rakesh4a122 күн бұрын
Need a bit more explanation at 10:26, How hash is validated? Correct me: the decrypted hash from the received 'google-certificate' using public-key of root CA installed in browser is matched with the generated hash from public key present in the certificate?
@wifitelrelax990326 күн бұрын
tienes el STL para imprimir
@davecrabbe457925 күн бұрын
see the link in the description
@jblesser27 күн бұрын
Very interesting. Thank you. Will utilize this technique!
@jblesser28 күн бұрын
Really appreciate the time you took to explain and demonstrate. Thank you.
@user-cn5ob1wg3g28 күн бұрын
Hello. I have a question. What do each number in '21.2.2.2' in parentheses of 'move 27 (21.2.2.2)' mean? 😀
@davecrabbe457928 күн бұрын
It means 27 moves to remove all pieces.. 21 to remove the first, 2 each to remove parts 2, 3, 4
@user-cn5ob1wg3g27 күн бұрын
@@davecrabbe4579 👍
@__ab452028 күн бұрын
Great video. When you say certificate hash data is encrypted using private key of issuer, does it mean that private is also sent along with certs? I am bit confused, why private key is being used to encrypt hash? Isn't public keys are used to encypt( as browser is doing with symmetric key) ? Or it is not neccesary to encrypt using public key always?
@CesarAntonАй бұрын
Thank you!
@user-cn5ob1wg3gАй бұрын
Gooood~👍 Thank you.
@jblesserАй бұрын
Thank you for that, I don’t have a 3-D printer as of yet, but I was looking at this as a way of getting my butt out of trouble when I am unable to reconstruct a burr puzzle correctly. Just need to learn a bit more how to get it all setup. Much appreciated.
@jblesserАй бұрын
As someone new to burr puzzles, and just getting started to enjoy them, I found this video fascinating. Thank you very much.
@davecrabbe4579Ай бұрын
It's a need past-time.. you can watch some of my earlier videos and you can make 1000s of puzzles if you have a 3d printer.. in fact.. if you buy puzzles, a 3d printer will pay for itself. Good luck and thanks for the comment.
@ranjithr7718Ай бұрын
Really good explanation
@Ottodiy882Ай бұрын
Incrible otto ninja
@Ottodiy882Ай бұрын
Incribe robot!!!!!
@ariyandi75752 ай бұрын
Sorry sir, can I ask for the 3D print file and the schematic?
@davecrabbe45792 ай бұрын
The PCB comes from Professor Boots Skid Steer design at: github.com/ProfBoots. Look for the V2 of the Skid Steer. All STLs for my mods are at the Printables link in the Description above.
@Kawlinz2 ай бұрын
At around 12:00, in your class of Superbot, you directly reference three of their classes in the creation of the superbot... So I'm just learning and this is the part that I'm having trouble with. I thought a class wasn't supposed to reference other classes, but that makes it super difficult to do really simple things (in my example, I've made a nuclear power plant object, that when it is created it takes a certain amount of time to "power up" and then it creates a signal, which is a reference to another class, which is a no no). Is the proper way to use some sort of interface? Any advice is appreciated.
@sebitex-qc7zb2 ай бұрын
que bonito
@davecrabbe45792 ай бұрын
gracias!
@Reid1262 ай бұрын
That is mesmerizing to watch
@davecrabbe45792 ай бұрын
yeah.. I was into Marble Runs for a while. grin
@ahmedabdelaziz73752 ай бұрын
What happened if i close port 80 on clinet pc
@davecrabbe45792 ай бұрын
I'm not sure what you are asking. Port 80 is open on a server. A client sends a packet to port 80 on a server to get the web page. If the server closes port 80, the client can't reach the web page. A client does not "have" a port 80. They are reserved for web server.
@ahmedabdelaziz73752 ай бұрын
This means all reserved ports can't controled on client pc
@davecrabbe45792 ай бұрын
@@ahmedabdelaziz7375 No.. you've missed the concept. Reserved ports are published on a list. They are used by servers. Because they are on a list, all clients know what ports to send their packets to for a particular service. So if I want to connect to an FTP service, I know to send it to a proper service, but to specify port 21, the well-known port for FTP. Clients cannot open/close ports on other machines. Let's say you have a Windows computer and you want to enable the TELNET service on it on port 23.. this allows a remote computer to connect to your computer and access. a command line. You now have port 23 "open" and you are listening on that port.. because you are now a Telnet Server. Only you.. the server can close port 23, shutting down the telnet service. A remote computer cannot do that.
@ahmedabdelaziz73752 ай бұрын
@davecrabbe4579 ok thanks sir, i got the point
@archemity3 ай бұрын
Awesome instructions. What if you want to print a black cat with white eyes. How would we separate objects that aren't so square and on a perfect level? Do you have a tutorial vid for that?
@empressbelless32323 ай бұрын
Thank you so much for making this video. I have a svol svo4 and a creality ender 3 s1 pro but I wanted to learn how to do this on my svol svo4
@davecrabbe45793 ай бұрын
Glad it helped.. still baffles me why they don't implement a color change by layer height..
@ahmedayman61703 ай бұрын
Great explanation!! Thanks I have question, at 11:14 you mentioned that the public key from the ICA can be used to decrypt the hashed encrypted part from the NSCC certificate. Can a public key be used for decryption? I am still a little confused on this point.
@davecrabbe45793 ай бұрын
Either key can be used to encrypt. But the *OTHER* key must be used to decrypt. Which key is used to encrypt depends on the application (digital signatures, encryption certs, etc). However, the private key is *ONLY* known to the person issued. It must never be distributed.
@edinetgrunhed60004 ай бұрын
this is it folks!!
@Monster-B6664 ай бұрын
why you don't have x10 he speak so slow
@davecrabbe45794 ай бұрын
yeah.. that's why I didn't get hired as a news anchor
@adamduncan98224 ай бұрын
This has been a really fun intro to programming with python, and a great general refresher on how to plan and build a small app. Thanks!
@davecrabbe45794 ай бұрын
Glad you enjoyed it!
@cappaholic4 ай бұрын
I have the newer version with the fan, but I've yet to see a RH less than 29%. No idea why.
@Krohling3 ай бұрын
Because it's not efficient. Mine typically won't go under 45% RH, I live in a high humidity area (>65%)
@jsagazio4 ай бұрын
Undoubtedly, the best explanation of PKI and digital certificates. Thanks Dave!
@user-ld8ru7kh6u4 ай бұрын
Amazing i was wondering why all datatypes are objects in python and u gave me the reason that it is to implement extensive methods. Thanks
@magawla4 ай бұрын
Best explanation about chain of trust I've ever faced.
@user-fo5rw7yq5c5 ай бұрын
Best
@subee1285 ай бұрын
Thank you very much🙏
@subee1285 ай бұрын
Thank you very much🙏
@subee1285 ай бұрын
Thank you very much🙏
@subee1285 ай бұрын
Thank you very much🙏
@shivamverma94475 ай бұрын
best explanation!! well done
@scottl59495 ай бұрын
Thanks so much for posting that. I just bought a sunlu s2 and I am thinking of adding an additional fan to it. I love teardown videos!
@davecrabbe45795 ай бұрын
the problem I had was the connection to the temp/humidity sensor that was located under the bottom heating plate.. It was just too unreliable and I thought I fixed it later, but couldn't get it working and just thru it out and bought a PrintDry 3 which is great.. Could have been a broken wire, a really crapy small connector, or the sensor itself. But this is a huge point of failure in these units. Sunlu is likely one of the worst companies for support there is.. You can see that from reports on Web from people buying filaments and any other Sunlu products. Nice product when it works.. but zero support. Good luck with it. I don't think it actually needs a fan.. mine worked well because it was not really sealed.
@ambervinson51816 ай бұрын
Great video! I love how you broke it down and walked through it nicely. Thank you.
@meriemalahmadihammou60736 ай бұрын
Thank you, very good explained!
@_Just_A_Dude_6 ай бұрын
THANK YOU
@ABDULKARIMHOMAIDI6 ай бұрын
THANKS A LOTTT
@tuerty6 ай бұрын
I had the same issue, pushed the cables behind the screen and the thing works again
@JosePto6 ай бұрын
I got the whole idea and even the trust chain, but I still do not get what is/how a signature works.
@davecrabbe45796 ай бұрын
Basically a user creates a PKI key pair. A public and private key. The public key can be sent to anyone.. and for large companies, their public keys may be included in an operating system. If I want to "sign" a document, I can encrypt, either a part of the document, or the whole document with my private key and send it to you. I can put my public key on Facebook, if I want. Anyone can get my public key. When you get the document that I sent, you try to decrypt it with my public key.. If you can, then you know I sent it. No one else can encrypt the document in a manner that allows you to use my public key to decrypt.
@JosePto6 ай бұрын
@@davecrabbe4579 so you encrypt the document itself, not a digest of it, or generate a hash and encrypt it (maybe combined with the other two options for integrity check?)
@ajaybhandari51807 ай бұрын
I dont get it , isnt that violating the SOLID principle of DIP? why don't use abstractions for Dog, Cat, CleanRobot class and use these in a constructor of main class? correct me if I am wrong please.
@odian30997 ай бұрын
Thank you for the video. It seems that I have an older revision of the dryer, where the backlight never turns off. Do you happen to know which pin(s) control the backlight of the LCD unit? It is too bright for me.
@davecrabbe45797 ай бұрын
No.. I eventually threw out my unit after several attempts to fix. Looking at customer satisfaction reports for Sunlu, it appears they have one of the poorest customer support records that I have seen. Too bad because their basic driers work really well, when they work.