© 2022 Hashnode
A list of things to know as a cloud security engineer or for a cloud security interview (mostly based on AWS). I'll update this page as I learn and discover more. IAM Roles, Policies, Cross Account A…
Intro A hashing algorithm is a mathematical algorithm that converts input data to an output string (hashing key) of a fixed length. Hashing key is unique (depending on the data), irreversible (data could not be generated back from the hash …
This guest post walks through a community-built Ruby Gem that helps developers quickly secure and use their data with Basis Theory and the new Rails 7.0 upgrade. Ruby on Rails built its reputation on …
What is a Rainbow Table Attack? 🌈 A rainbow table attack is a password cracking method that uses a special table a.k.a “rainbow table” to crack the password hashes in a database. Applications don’t store passwords in plaintext, but instead…
Hi Everyone, In this article, I will take you through common cryptography terminologies and what they mean. Cipher An encrypted message is called a cipher. Encryption techniques are helpful in mainta…
In 2011, Gabe Newell described software piracy “as a service problem.” His comment implied that until there was a better experience from a legitimate service, consumers would continue to engage in the…
Data encryption is the process of converting information into a form that can only be accessible to authorized persons. Anyone who is not authorized will not have access to such information. the data is scrambled into ciphertext such that i…
Welcome to the 11th episode, We all recall the days when we used to write handwritten letters to our friends and relatives.Those envelopes are hand-sealed with tenderness and love. We all browse ev…
Hello, Developers in this blog I will tell you how you can create a session securely so that no one can hack you. first of all, let me explain to you 100% security never exist every library and encryp…
The Caesar Cipher can also be called Shift Cipher, Substitution Cipher, Caesar's Code, or Caesar's Shift. This is going to be a short tutorial on how to create a Caesar Cipher in Python. A Brief Histo…