Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 21, 2024User Authentication Level 4User authentication is essential for protecting sensitive user data and ensuring secure access to resources. This Level 4 user authentication example uses bcrypt, Passport.js, and PostgreSQL while leveraging environment variables for enhanced securit...passport
Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 20, 2024User Authentication Level 2In this blog, we explore an updated version of a simple user authentication system using Express.js, PostgreSQL, and bcrypt for password encryption. This version addresses security concerns by using password hashing and comparison, ensuring that sens...User Authentication
Vedant Sagolalerediscacheandeverything.hashnode.dev·Dec 19, 2024Redis Cache: The Complete Guide to High-Performance CachingIntroduction In today's digital landscape, application performance is crucial for user experience and business success. Enter Redis (Remote Dictionary Server), an open-source, in-memory data structure store that has revolutionized the way we handle c...Redis
Vinayak Sharmaitsvinayak.hashnode.dev·Dec 8, 2024The Bcrypt Algorithm for Secure Password HashingHashing is a cryptographic function that cannot be reversed. It takes an input of random size to produce fixed-size values. These fixed-size values are called hash values, and the cryptographic function is called the hashing function. Hashing has a c...1 likePython
Subhanshu Mohan Guptablogs.subhanshumg.com·Nov 30, 2024Ensuring Inter-Agent Data Integrity in Multi-Node DevSecOpsIntroduction In modern DevSecOps environments, where distributed systems and multi-node architectures are prevalent, ensuring data integrity during inter-agent communication is crucial. Compromised data exchanges can lead to system failures, vulnerab...10 likes·41 readsAI powered DevOpsMultiNodeArchitecture
Pankaj Kholiyadatatype.hashnode.dev·Nov 26, 2024Hash ArrayHash Array Hash Array is a technique used to efficiently count the frequency of elements in an array using hashing. This method involves initializing an array and hashing the elements of the original array based on their values to keep track of their...Hashing
Garvit Dadheechgarvitdadheech.hashnode.dev·Nov 6, 2024Why Ethereum Addresses Begin with 0x and How Keccak-256 Makes it Possible?In this article I will tell you about the keccak-256 algorithm that is used to create Ethereum public addresses and then we will see why the ethereum addresses starts with 0x. What is Keccak-256 ? Keccak-256 is a cryptographic hash function and a mem...1 likeBlockchain
J3bitokjebitok.hashnode.dev·Oct 27, 2024Cryptography: Hashing Basics (TryHackMe)In this article, I will write a write-up for Hashing Basics that covers Hash Functions, Insecure Password Storage for Authentication, Using Hashing for Secure Password Storage, Recognising Password Hashes, Password Cracking, and Hashing for Integrity...57 readsHashing
Gwon Honggwonhong.hashnode.dev·Oct 22, 2024How bcrypt hashes with salt (+Rainbow Table Attack)Goals Understand how bcrypt do ‘salting’ Especially, how it can do salting without storing salt at extra columns dedicated for ‘salt’ Basics Rainbow Table Attack Rainbow Table is a table with various possible passwords and it’s hashes. When attac...Hashing
Yasin Sarkaryasinsarkar.hashnode.dev·Oct 20, 2024🌟 Understanding the Spread Operator and Rest Operator in JavaScriptJavaScript has two versatile features, the Spread Operator and the Rest Operator, which are both represented by three dots (...). While they look the same, they have different roles based on the context in which they're used. Let’s break down each of...JavaScript