sai phanindrablog.saiphanindra.com·Aug 5, 2024Fundamentals of CryptographyIn today's digital world, security is more crucial than ever. With the rise of online transactions, data storage, and communication, it's essential to ensure that sensitive information remains confidential and secure. This is where cryptography comes...DiscussCryptography and SecurityCryptography
James Mathengecodejunction.hashnode.dev·Jun 3, 2023Understanding Hash: The BasicsIntroduction This article serves as the introduction to our hashing series. Throughout this series, we'll study the interesting realm of hash functions and their importance in computer science. Hashing is a fundamental concept that plays a vital role...Discuss·10 likesHashing
Christine Balanaablog.sywid.dev·Apr 15, 2023TIL: How to generate checksum?Checksums work like a fingerprint. It is used to verify file integrity. If the files have the same checksums, then they are identical. It can also be used to check if the file has been previously scanned as malicious. On Windows: certutil: certutil...DiscussTILTIL
Raphael Carlos Regoraphaelcarlosr.hashnode.dev·Mar 13, 2023🔐How to decode and use 2FA code generated by TOTP Algorithm 🤖You may have entered a 6-digit code from a 2FA app like Google Authenticator 😬, but where did this code come from? The answer lies within the QR code and the inner workings of the Time-based One-time Password algorithm (TOTP) 🔍. In this article, we...Discuss·345 reads2FA
Igvir Ramirezpwd.hashnode.dev·Feb 22, 2023Using Hash Codes as Unique IdentifiersIntroduction In this article, we will cover a common use case for software developers: Using and generating Unique Identifiers. Let´s start with a definition: What is an identifier? The simplest explanation usually comes from Wikipedia: An identifi...Discuss·10 likes·2.6K readsJava
Malavi Pandemalavibolg.hashnode.dev·Feb 15, 2023RUBY (part-7)Introduction My small please is don't take it as a new topic/concept because it is the same as arrays that we learned in the previous blog. The idea behind both concepts is similar with very few different perspectives. Why In the introduction, we rea...Discuss·10 likes·46 readsRuby
Exploding Rickxrick.hashnode.dev·Jan 19, 2023Is that really you?Remember a few posts ago, when I created a UserId property in our Activity model? Well, it's time to put it to use. Since I am not a mole person, I want to share my project with my friends and family, but it will make absolutely no sense if there is ...Discuss·63 readsCryptography
Jubaer Alnazijubaeralnazi.com·Jan 13, 2023How to verify a file's authenticity which you downloaded from the internet?A digital signature is a way to ensure the authenticity and integrity of a digital document or file. It is similar to a traditional signature on a paper document, but it uses encryption to create a unique code that is tied to the document and the per...Discuss·540 readsdigitalsignature
Harsh Sharmasharmaharsh.hashnode.dev·Sep 5, 20222. Cryptography - Concept of Information, Entropy and more on HashingInformation Word "information" in communication theory relates not so much to what you do say, but instead as to what you could say. No. of choices we can make = Amount of Information If information is more predictable => It conveys less informatio...Discuss·41 readsCryptography primer for DevelopersCryptography
septRabbitseptrabbit.hashnode.dev·Jun 16, 2022How to have "Anchor Jumping" in React Router?In HTML, it is easy to jump to specific section by simply adding {id} to that specific section and {#id} to the href. <a href='#specific'>link</a> <section id='specific'>This is the section!</h1> Unfortunately, this method does not work in React Rout...Discuss·280 readsReact