Back to Show
Crash Course Computer Science
Hackers & Cyber Attacks: Crash Course Computer Science #32
Season 1
Episode 32
Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.
Support Provided By
12:23
Today we’re going to discuss how 3D graphics are created and rendered for a 2D screen.
12:38
Today, we're going to discuss the critical role of graphical user interfaces.
10:15
Today we're going to talk about the birth of personal computing.
10:57
This is an era that saw huge government funded projects - like the race to the moon.
11:31
Today we begin our discussion of computer graphics.
11:23
Today, we are going to start our discussion on user experience.
11:44
Today, we’re going to talk about lossless compression.
11:42
Today we’re going to look at how our computers read and interpret computer files.
12:17
Today we’re going to trace the history of these storage technologies.
12:55
Computers keep getting faster and faster...
12:29
So you may have heard of Moore's Law...
10:22
We'll talk about how large programs are typically broken up into into function units.