Media Summary: Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ... Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ... Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in ...

Exploiting The Tiltman Break Computerphile - Detailed Analysis & Overview

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ... Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ... Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in ... Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, ... Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs ... During World War II, the Lorenz cipher machine was used by the High Command of the Wehrmacht for war important, top secret ...

Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ... Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ... Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP... The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII.

Photo Gallery

Exploiting the Tiltman Break - Computerphile
Why Build Colossus? (Bill Tutte) - Computerphile
Turing, Tutte & Tunny - Computerphile
Fishy Codes: Bletchley's Other Secret - Computerphile
The Great 202 Jailbreak - Computerphile
The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941
Running a Buffer Overflow Attack - Computerphile
Cracking Windows by Atom Bombing - Computerphile
Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile
What's Behind Port Smash? - Computerphile
TCP Meltdown - Computerphile
Turing's Enigma Problem (Part 1) - Computerphile
View Detailed Profile
Exploiting the Tiltman Break - Computerphile

Exploiting the Tiltman Break - Computerphile

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ...

Why Build Colossus? (Bill Tutte) - Computerphile

Why Build Colossus? (Bill Tutte) - Computerphile

Cracking the code was only half the battle. To keep the upper hand, when using Bill Tutte's statistical methods, the detailed ...

Turing, Tutte & Tunny - Computerphile

Turing, Tutte & Tunny - Computerphile

Professor Brailsford rounds up the whole Colossus affair, and explains how Turing actually played a small but significant part in ...

Fishy Codes: Bletchley's Other Secret - Computerphile

Fishy Codes: Bletchley's Other Secret - Computerphile

Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, ...

The Great 202 Jailbreak - Computerphile

The Great 202 Jailbreak - Computerphile

Before laser-printers, high quality print-outs were the domain of typesetters, expensive and tightly controlled. In 1979 a Bell Labs ...

The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941

The Tiltman / Tutte Break - How Bletchley Park broke the top secret Lorenz cipher in 1941

During World War II, the Lorenz cipher machine was used by the High Command of the Wehrmacht for war important, top secret ...

Running a Buffer Overflow Attack - Computerphile

Running a Buffer Overflow Attack - Computerphile

Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ...

Cracking Windows by Atom Bombing - Computerphile

Cracking Windows by Atom Bombing - Computerphile

A security

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation ...

What's Behind Port Smash? - Computerphile

What's Behind Port Smash? - Computerphile

The Port Smash

TCP Meltdown - Computerphile

TCP Meltdown - Computerphile

Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP...

Turing's Enigma Problem (Part 1) - Computerphile

Turing's Enigma Problem (Part 1) - Computerphile

The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII.