Hash Functions & Hashing
This video steps through how hashing works , what it's used for and why it's really important as a supporting process for many other areas of tech. It also explains a critical MD5 vulnerability vs something more secure like SHA2-256.
▶ https://marc-stevens.nl/research/papers/MTh%20Marc%20Stevens%20-%20On%20Collisions%20for%20MD5.pdf
▶ https://natmchugh.blogspot.com/2015/02/create-your-own-md5-collisions.html