Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 12, 2023How to Securely Encrypt and Decrypt Files Using Seahorse on UbuntuWant to protect sensitive documents, emails, and other files on your Ubuntu desktop with strong encryption? Seahorse provides an easy way to encrypt files locally using OpenPGP standards, keeping data secure even if your device is lost or stolen. In ...DiscussLinuxencryption
Tanmay VijayforInDepth by Techknightsblog.techknights.in·Oct 30, 2023An Insight into Hashing: The Backbone of CybersecurityHashing Hashing is a fundamental concept in computer science and cybersecurity. Hashing is a process of transforming a string of data characters into another form, often shorter and fixed in length. This transformation is generally irreversible and d...DiscussHashing
Dylan Hansondhans.me·Oct 25, 2023A picture is worth a thousand bitsWhile bored in class, I began wondering how one might be able to encode the contents of a string into an image as a secret message of sorts, undetectable to the naked eye. The string might be decipherable by someone who, given the image, knew how and...Discuss·10 likesJust TinkeringGeneral Programming
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 19, 2023Creating a New User With an SSH Key on LinuxIntroduction :- In the realm of #secure and efficient system administration, creating new user accounts on #Linux machines is a fundamental task. Adding an extra layer of #security, using #SSH keys for user authentication has become a best practice i...Discussssh-keys
Derek Onwudiwetecheffect.hashnode.dev·Oct 13, 2023Importance of Regular BackupRegular data backups are crucial for safeguarding your digital life and work. Here's why they're important : 1. Data Loss Prevention: Backups are your safety net against data loss due to hardware failures, viruses, accidental deletions, or even natur...DiscussBackup
API Guardian100daysofapisecurity.com·Oct 13, 2023Decoding the Encryption MysteryWelcome again to 100daysofapisecurity. Today, we will explore the world of encryption, whereby you will be taken through several encryption nuances and potential vulnerabilities. End-to-End Encryption (E2EE) End-to-End Encryption, or E2EE, is the dig...Discuss100 Days of API SecuritySSL
Derek Onwudiwetecheffect.hashnode.dev·Oct 12, 2023Secure File Sharing Best PracticeSome best practices for sharing files safely online: 1. Use Secure Platforms: Choose reputable, secure platforms for file sharing. Popular cloud services like Google Drive, Dropbox, or OneDrive often provide encryption and access controls. 2. Encrypt...Discusssharing
Ethan Mitchellcybershield.hashnode.dev·Oct 9, 2023Understanding Encryption: A Beginner's Guide to Securing Your DataIn an age where data is at the heart of almost everything we do, from online banking to sending private messages, ensuring the security and privacy of our personal information has never been more critical. One of the fundamental tools that underpin d...Discussencryption
Ethan Mitchellcybershield.hashnode.dev·Oct 9, 2023Deep Dive: The Evolution of Ransomware and How To Protect YourselfRansomware, a malicious software that encrypts your files and demands a ransom for their release, has become a pervasive and evolving threat in the digital landscape. Over the years, it has transformed and adapted, leaving individuals and organizatio...Discussransomware
Keigo Kidamoonorange.hashnode.dev·Oct 7, 2023Implementing TOTP in GoIntroduction In this article, I would like to try implementing a code that generates a one-time password, which is often used in many two-factor authentication functions, called, Time-based One-time Password (TOTP) using Go. What is Two-Factor Authen...Discuss·58 readsGo Language