FlareXesflarexes.com·3 hours agoModular Arithmetic in Cryptography💡 Proceed with caution! Few people believe I’m not good at mathematics. Of course, I disagree. I’m really good at explaining and understanding math concepts; there's a reason why my first article was about math and crypto. Either way, I’m no expert ...Cryptography
Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 21, 2024User Authentication Level 4User authentication is essential for protecting sensitive user data and ensuring secure access to resources. This Level 4 user authentication example uses bcrypt, Passport.js, and PostgreSQL while leveraging environment variables for enhanced securit...passport
Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 20, 2024User Authentication Level 2In this blog, we explore an updated version of a simple user authentication system using Express.js, PostgreSQL, and bcrypt for password encryption. This version addresses security concerns by using password hashing and comparison, ensuring that sens...User Authentication
Jayant yadavforBreachForcebreachforce.net·Dec 14, 2024Ransomware : The Growing ThreatToday, ransomware attacks have become one of the most destructive cyber threats we face. These attacks disrupt operations, steal sensitive data, and cause millions of dollars in damages. Whether in healthcare, finance or any sector; no industry is le...1 likeREvil
Chetan Mittalblog.railsforgedev.com·Dec 13, 2024Rails 8.0 Credentials: The Ultimate Guide to Secure Configuration ManagementIn the ever-evolving landscape of web development, Ruby on Rails continues to prioritize security and developer experience. The removal of config.read_encrypted_secrets in Rails 8.0 marks a significant shift in how applications handle sensitive con...180 readsRails 8.0
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Encryption 101TASK 1 - What will this room cover? This room will cover: Why cryptography matters for security and CTFs The two main classes of cryptography and their uses RSA, and some of the uses of RSA 2 methods of Key Exchange Notes about the future of enc...Entrepreneurship
JealousGxblog.jealous.dev·Dec 5, 2024Mastering Cookies in Node.js and Go: Advanced Techniques for Scalable and Secure Web ApplicationsIn modern web development, cookies play a pivotal role in managing user sessions, preferences, and state across web applications. This guide dives deep into cookies' advanced usage in Node.js and Go, providing practical examples, best practices, and ...cookies
sathwikreddy GVsathwikreddygv.blog·Nov 29, 2024How does SSH actually workWhat is SSH Secure Shell (SSH) is a protocol used to safely connect and send commands to remote machines from your local machine. A common use is to connect to your deployment server hosted in the cloud and control it from your local machine. An SSH ...ssh
Ali Iqbalaliiqbalhashicorpvault.hashnode.dev·Nov 25, 2024HashiCorp VaultHashiCorp Vault fundamentals Hashicorp Vault is a prominent secret management solution today. It is currently used by the world's top financial solutions and enterprises. What is the HashiCorp vault? It’s a cloud-agnostic secrets management system. ...hashicorp-vault
Mauricio ETchaoticgoodcyber.tech·Nov 24, 2024Secure Messaging Apps: Signal, Telegram, Session, Element, ThreemaMobile apps collect a lot of user data, often more than necessary. This data can be used for targeted advertising, sold to third parties, or potentially accessed by government agencies. With a second Trump presidency, everyone should be concerned abo...54 readsApps & Gearprivacy rights