Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript
Atchyut Preetham Pulavarthihashnode.atchyut.dev·Jan 6, 2024Unraveling the mystery behind RSA encryptionFor a better and more immersive experience, read this blog on my official blog - https://blog.atchyut.dev/blogpost/8b3ff3e755fd4624b7b9c7fff75a13b4 Hey there 👋🏼! Hope you're doing great. I'm super stoked today because we’ll be diving into RSA encry...Discussencryption
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Bigger Example 2: Simple Text File Encryption and DecryptionQuestion: Design a program that can encrypt and decrypt a text file using a simple encryption algorithm. The user should be able to provide a key for encryption, and the program should output the encrypted text to a new file. Another option should al...DiscussC Programmingexample
Bhargav Parmarbhargavparmar.hashnode.dev·Dec 25, 2023Behind the Padlock: Exploring the World of HTTPS and Certificate SignaturesCertificates play a vital role in ensuring secure communication between clients and servers. They function as digital certificates, encrypting data transferred across networks, thus safeguarding sensitive information. The Importance of TLS Certificat...Discusshttps
Kralhexkralhex.hashnode.dev·Aug 30, 2023Understanding EncryptionIntroduction In today's digital age, where information flows freely and data is a valuable asset, ensuring the security and privacy of our digital communication has become more crucial than ever. Encryption stands as one of the cornerstones of this s...Discussencryption
Olufikayomi Jetawophickayor.hashnode.dev·Aug 19, 2023Unlocking the Secrets: Mastering Bcrypt Encryption and Decryption in NodeJsIntroduction In this article, we will be looking at the importance of encryption of passwords and how to go about it. I'll be working with the Express.js framework and MongoDB database in this article. What is Encryption and Decryption? Encryption is...Discuss·31 likes·88 readsBcrypt
Alessandroswiftuser.hashnode.dev·Jun 23, 2023How To: Cross Platform File Encryption with DelphiOverview A real-world issue is making sure our data, whether it is settings or user files, that are encrypted, not readable, and if edited become invalid. For achieving this we are going to dive into this hands-on tutorial on encryption using Delphi ...Discuss·56 readsencryption
Amol Ovhalamol-devops.hashnode.dev·May 5, 2023Linux SecurityLinux Security Linux has been a popular operating system for years, and with good reason. It is known for being open-source, highly customizable, and flexible. However, it is also known for its robust security features. In this article, we will discu...Discuss·91 readsThe Ultimate Linux Learning SeriesSecurity
Nevin Selbynevins-corner.hashnode.dev·Mar 24, 2023Image Steganography Using Machine LearningImage steganography is a technique for concealing secret information within digital images without altering their visual appearance. The concept behind image steganography is to use the redundancy of the image data to embed the hidden message in such...Discuss·20 likes·92 readsCryptography
Nikhil Surekatechasaan.hashnode.dev·Jan 26, 2023Encryption and Decryption in PowerShellThis blog details how to encrypt and decrypt a string or password via PowerShell. Open a PowerShell ISE Editor as an Administrator and check your PS Version. The full article is tested on 5.X PS version shown below. Encryption: Let’s first understan...Discuss·12 likes·80 readsPowershell