Power-of-two numeral systems

Base64

In computer programming, Base64 is a group of binary-to-text encoding schemes that represent binary data (more specifically, a sequence of 8-bit bytes) in sequences of 24 bits that can be represented by four 6-bit Base64 digits. Common to all binary-to-text encoding schemes, Base64 is designed to carry data stored in binary formats across channels that only reliably support text content. Base64 is particularly prevalent on the World Wide Web where one of its uses is the ability to embed image files or other binary assets inside textual assets such as HTML and CSS files. Base64 is also widely used for sending e-mail attachments. This is required because SMTP – in its original form – was designed to transport 7-bit ASCII characters only. This encoding causes an overhead of 33–37% (33% by the encoding itself; up to 4% more by the inserted line breaks). (Wikipedia).

Base64
Video thumbnail

1,010,010,101,000,011 - #MegaFavNumbers

This is my submission to the #megafavnumbers project. My number is 1010010101000011, which is prime in bases 2, 3, 4, 5, 6 and 10. I've open-sourced my code: https://bitbucket.org/Bip901/multibase-primes Clarification: by "ignoring 1" I mean ignoring base 1, since this number cannot be fo

From playlist MegaFavNumbers

Video thumbnail

MegaFavNumbers - A number with 19729 digits

This video is about my MegaFavNumber. It has 19729 digits, and it is a power of two. [This link is now broken, and I can't find it anywhere else. :( ] See all the digits here: https://sites.google.com/site/largenumbers/home/appendix/a/numbers/265536 The OEIS sequence I mentioned: https:/

From playlist MegaFavNumbers

Video thumbnail

Convert Numbers in Base Ten to Different Bases: Remainder Method

This lessons explains how to write numbers in base ten as numbers in different bases. Site: http://mathispower4u.com

From playlist Historical Counting Systems

Video thumbnail

Using CyberChef To Automatically Extract Shellcode from PowerShell Loader [Twitch Clip]

How to automatically extract the shell code from a multi-stage PowerShell loader (Cobalt Strike) using CyberChef! See the full stream, including our analysis of the shell code... https://www.patreon.com/posts/live-stream-vod-75195977 ----- OALABS PATREON https://www.patreon.com/oalabs O

From playlist Open Analysis Live!

Video thumbnail

Binary 4 – Floating Point Binary Fractions 1

This is the fourth in a series of videos about the binary number system which is fundamental to the operation of a digital electronic computer. In particular, this video covers the representation of real numbers using floating point binary notation. It begins with a description of standard

From playlist Binary

Video thumbnail

The Most Beautiful Base

You can choose a complex number as a base, and the results can be beautiful! [1] William J. Gilbert. Arithmetic in complex bases. Mathematics Magazine, 57(2), 1984. [2] T. Jamil. The complex binary number system. IEEE Potentials, 20(5), 2002. [3] Donald E. Knuth. The Art of Computer Pr

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

Rails Conf 2013 Pry-- The Good Parts! by Conrad Irwin

Pry is the featureful development console for Ruby. From its humble roots as an irb replacement, Pry has grown into an indispensable tool for any Ruby or Rails programmer. Using some real-life examples, I'll explain how to use Pry effectively. We'll start from the beginning, with simple fe

From playlist Rails Conf 2013

Video thumbnail

Shell Scripting - Password Generator

Hey guys! HackerSploit here back again with another video, in this series we will be looking at how to create shell scripts. A shell script is a computer program designed to be run by the Unix shell, a command-line interpreter. The various dialects of shell scripts are considered to be scr

From playlist Shell Scripting

Video thumbnail

2.6 Saving Images and Base64 Encoding - Working with Data and APIs in JavaScript

💻https://github.com/CodingTrain/Intro-to-Data-APIs-JS Let's add an image from the webcam to our database. For this project, we will be using the p5.js JavaScript library! 🎥 NEXT LESSON: https://youtu.be/1mnpn6q25FI 🎥 PREVIOUS LESSON: https://youtu.be/q-lUgFxwjEM 🎥 FULL COURSE: https://w

From playlist Working with Data and APIs in JavaScript

Video thumbnail

0030 - C++ programming: Developing a Web Server from scratch

This is #30 in my series of live (Twitch) coding streams, working on writing my own web server and service framework in C++. This stream I almost finished up WebSockets. It took a bit more time than I expected. I brought in some libraries I needed: SHA-1 hash algorithm, Base64 encoder,

From playlist Excalibur

Video thumbnail

PowerShell+ 2019 - "Piping" data between packaged scripts by Paul DeArment Jr

The idea for this talk came when working on a project for a previous employer. Working on multiple domains, different executables needed to be run for different domains due to requirements by the security team. I was having trouble passing data between the exe's due to being unable to dire

From playlist PowerShell + DevOps Global Summit 2019

Video thumbnail

RubyConf 2019 - How to Become an Encoding Champion by Deedee Lavinder

RubyConf 2019 - How to Become an Encoding Champion by Deedee Lavinder encoding's Character encoding happens every time we interact with a computer or any digital device. There is no such thing as plain text. Understanding how encoding works, how Ruby handles encoding issues, and how

From playlist RubyConf 2019

Video thumbnail

FristiLeaks1.3 - CTF Walkthrough - Boot-To-Root

Welcome to the OSCP prep series, where we will be solving various CTF boxes on HTB and VulnHub. In this video, we will be pwning FristiLeaks1.3. Write-up: https://hsploit.com/frisitleaks1-3-vulnhub-wlakthrough/ Kioptrix on VulnHub: https://www.vulnhub.com/entry/fristileaks-13,133/ ◼️Get

From playlist Linux Exploitation

Video thumbnail

0108 [ C++/React/Python ] server/client authentication

This is #108 in my series of live (Twitch) coding streams. This stream I implemented a basic public-key authentication mechanism so that administrators are required to authenticate by providing a valid signature to a randomly-generated challenge string. https://tinyurl.com/y9az4ufb -

From playlist Excalibur

Video thumbnail

OverTheWire Bandit Walkthrough - Level 7 - 11

In this video i go through levels 7 - 11 of the OverTheWire Bandit challenge. The levels consist of working with strings, grep and base64 and ROT13 decryption. LINKS USED IN VIDEO: OverTheWire: https://overthewire.org 📈 SUPPORT US: Patreon: https://www.patreon.com/hackersploit Merchandis

From playlist Linux

Video thumbnail

MegaFavNumbers: Plus One Primes, 154,641,337, and 62,784,382,823

My entry in the #MegaFavNumbers series looks at a particularly striking example of a very specific family of primes -- and how it connects to what digits can be the final digit of primes in different bases.

From playlist MegaFavNumbers

Related pages

Binary number | Public key fingerprint | Hexadecimal | OpenPGP | Cyclic redundancy check | Byte | Bcrypt | Most significant bit | Crypt (C) | Pretty Good Privacy | Checksum | Binary data | Base32 | Least significant bit | Bit | Octal | Base36 | Octet (computing) | Base64