Sach sach btau.... Sare video se jyada achha lga 1 new point pta chala apke video se , server change hone pr kya again procedure hoga konsa nhi.... Really bhut maza aya padh k
Bro kasam se , mujhe yeah topic bohot din se nhi samjh aa rha tha. But tumhare yeah 1 video dekh kar , mujhe Sara kuch samjh aa gya. God bless you man !!! At last A very big thank to you
Tqq bro keep it up 🔥 itna aache saa humare class teacher bhi nahi samjhate jitna aapne samjhaya ❤ Mera exam hai monday n this is imp so it may come n this video hlped me out to understand it in simple❤ tqq
It is very simple type of explanation of the topic it easy to revise at time of exam days ......... Thanks sir This type of videos is very useful for us . 👍
🎯 Key Takeaways for quick navigation: 00:00 *🔍 Cross-Indication protocol is introduced, emphasizing communication between sender and receiver.* 00:52 *🛡️ Authentication protocols aid in verifying identities for secure communication.* 02:45 *🔄 Subscriptions and requests are essential for authentication processes, ensuring secure access.* 05:07 *🔄 Indication process happens only once, simplifying subsequent communication requests.* 06:10 *🔄 Authentication process occurs only once, not repeatedly.* 06:24 *💼 Remember to like the video if found helpful and check the description box for detailed notes.* Made with HARPA AI
understood, but have one doubt, "do priya needs to do anything for getting herelf authenticated, or the same things keep happening in background when priya signs in to her system?". in case priya needs to do anything for the authentication, what are those steps which priya needs to follow?
Crystal clear explanation …
3 pages ka book me socha hard hoga but, you made it simple … kudos 🔥
Ooh!! You explained it very well i think no one can better explain this point except you!!
Very good and clear explanation.
Best video on Kerberos bro..🔥🔥
Thanks bro
Crystal clear explanation and well presented.- Really appreciate it.
I have same to you ❤
Crystal clear explanation …
3 pages ka book me socha hard hoga but, you made it simple love you bro
Bht hi badiya teach Kiya h aapne sir ......full respect for uh sir ....thanku
Thank u so much priya omar aur ramesh ka bhi thank you un log ne jo bhi kiya uski wjhse process smjh aagya authentication ka
Sach sach btau.... Sare video se jyada achha lga 1 new point pta chala apke video se , server change hone pr kya again procedure hoga konsa nhi....
Really bhut maza aya padh k
Best explanation on kerburos, I watched many videos but this one is gem
Yo
Bhaiii 3-4 vdeos dekhi....pr samjh sirf aapke aayi❤️❤️❤️
Thank you brother…
Bro kasam se , mujhe yeah topic bohot din se nhi samjh aa rha tha. But tumhare yeah 1 video dekh kar , mujhe Sara kuch samjh aa gya.
God bless you man !!!
At last
A very big thank to you
Tqq bro keep it up 🔥 itna aache saa humare class teacher bhi nahi samjhate jitna aapne samjhaya ❤
Mera exam hai monday n this is imp so it may come n this video hlped me out to understand it in simple❤ tqq
Beautiful!!! learnt this in just few minutes before exam!! Thanks a lot
thankk you sooo much!! i have exam in 30mins and aapne 5min mein samjha diya full concept
Perfect explanation bro, anyone can easily understand
Ufff wao sr bht axha smjaya ap na seriously I'm totally satisfied no questions arise in my mind😍
very helpful ! we can write answer only with help of diagram. thank you so much bhai
thank u kal mera exam hai aur m Mtech student hun. kaafi beneficil tha ye mere lie. keep posting. u got a new subs from me🥰
It is very simple type of explanation of the topic it easy to revise at time of exam days ......... Thanks sir This type of videos is very useful for us .
👍
Maja agya shinde sir
Best video man. Ending my 6th semester, but still subscribed now to your channel. Great work!!!👏
You have set a next level of Benchmark in clarification.
Very smooth explanation.....you are always make topics easier for us😊
Awesome presentation. I am a cyber security student and taking your subscription from Bangladesh
Exams last month best channel mil gaya bhai 😂 thank you so much books mein bhoth hard tha
Thanks bro
2 din baad mera exam hai. Aap great ho sir 💯 Cristal clear ho gaya ekdm concept 🤩🤩
You are just an angel to us engineering students🤗😭😭😭😭😭❤❤❤❤❤
This Priya girl is wild 💀
Omar ke saath cheezein karna chalu kr diya💀💀
Sunraybee is a nice teacher.
Sach mai bhut hi jada acha h bhai....kaash IITs k proffs bhi esa padhate🙂🙂
Most underrated yt channel
Great Work PCE. You made it really simple to understand.👍
Maksad nhi bhulna bhai jaan
thank you , glad i found your channel , a day before exam
your channel name is perfect computer engineer, well i must that serves the purpose.
kudos bro👍
Damn sir... crystal clear explanation
great bro ❤❤
Thank you... Understood in justbwatching it once
Hare Krishna sir, very well explaination about working of kerberos . Thank you so much
Thanks brother for explaining.
Perfect explanation, which i was looking for.
yeah this topic is good and ur explanation is too good .I easily understanded .
Thank you brother. It was really great. I was literally confused. 😊
bhai bohot badhiya samza 👍👍
well explained. Thank you from Nepal.
Wah bro maza aa gya very nice 👍
Ap n bhot Acha explain kiya ha
Well explained. Could you please relate this with any applications like banking or lms
thanks brother it was easy than expected ,😅 just bcause of u.
Really understood it very clearly thankyou sir 😊
very clear explanation
Bhut shaandaar!!!
Boht sahi explain karte ho bhai thank you so much 🙏
Nice bro
1 baar me samagh aa gya Thankyou
Very good teacher 😃
loved it .... got one more subscriber today .... keep the great work up .....
Short and good. Well explained.
Very Good Explanation
Thankyou brother ❤️
Amazing explanation 😊
Bohot he badiya... Explanation!!!
Best video
Easily explained
🎯 Key Takeaways for quick navigation:
00:00 *🔍 Cross-Indication protocol is introduced, emphasizing communication between sender and receiver.*
00:52 *🛡️ Authentication protocols aid in verifying identities for secure communication.*
02:45 *🔄 Subscriptions and requests are essential for authentication processes, ensuring secure access.*
05:07 *🔄 Indication process happens only once, simplifying subsequent communication requests.*
06:10 *🔄 Authentication process occurs only once, not repeatedly.*
06:24 *💼 Remember to like the video if found helpful and check the description box for detailed notes.*
Made with HARPA AI
Nice explanation Brother 😮, Hats off🫡
Best way to explain
Last minute help bhaiya 🎉
ekdamm super achha laga brother best vdo
understood, but have one doubt, "do priya needs to do anything for getting herelf authenticated, or the same things keep happening in background when priya signs in to her system?". in case priya needs to do anything for the authentication, what are those steps which priya needs to follow?
Fantastic explanation
thanks a lot
Father agnel?🙃
Sir really good explanation. Keep up with the good work!
Very well explained
Clear hai bhai 👍
Thanks bhai...
bahut acha laga video...Thanks ..subscribed also
Superb explanation bro...
Perfectly explained, great work bro ! Keep going !
Good explanation helped in understanding a lot better
Thankss sir
Fabulous explaination
excellent teached
very nice example
Very nice clear explanation!! Thanks 👍
Thank you, really helpfull.
nice explanation. Thanks .
Really....this topic is easy ...i am cofused
Bhai 1 min ma neeed agi ...nice video
Superb bro thanks for this video
Such a great explanation.
Simplified 💯
very well explained👍👍👍
really helpfull
Thank you so much ji
Excellent brother 👏 keep up the good work 👍
Thanks boss now clear
Theory aur bharne layak samjate
shai h bhai ekdum
excellent explained 🤩
It is very very helpful for me👍👍👍
Bhai ❤ Jeet leya video nae
Bahut sahi batalaye but, Omar (recover) ko kaise pata chalata hai ki incoming request authentic hai
Great explanation. Thanks!