Rajnandini Tiwarirajnandini-tiwari.hashnode.dev·Jul 22, 2024Do you know how companies interact with your login passwords?Hey there, fellow developers! Today, I want to talk to you about a crucial aspect of web development that often gets overlooked: password security. As developers, it's our responsibility to ensure that our users' data is secure, and one of the most i...Aum Vats and 1 other are discussing this2 people are discussing thisDiscuss·4 likes·71 readspasswordsfeels like the best 3mins spent today 🙌🙌 4
Gaurav Vishwakarmablogs.gauravvishwakarma.com·Jul 21, 2024Unveiling the Mysteries: Public Key, Private Key, and Address in the Ethereum RealmThe world of Ethereum and blockchain technology is both fascinating and complex, filled with unique cryptographic components that work in harmony to secure and manage digital assets. Among these components, three fundamental elements stand out: the p...DiscussEthereum
Amelia Duttaameliadutta.hashnode.dev·Jul 15, 2024Hash Tables: Key Concepts and OperationsHashMaps are a data structure that combines features of arrays and linked lists to store and retrieve information using key-value pairs efficiently. Highlights: Combination of Features: HashMaps utilizes the random access capability of arrays and th...DiscussHashing
Rahul Boneyrahulboney.hashnode.dev·Jul 13, 2024Creating a Blogging Website Using Node.js, JWT Tokens, Express, MongoDB, and HashingIn this tutorial, I will walk through the process of creating a blogging website using Node.js, Express, MongoDB for database storage, JWT tokens for user authentication, and hashing for secure password storage. We'll cover essential backend and fron...DiscussBlogging
Rahul Boneyrahulboney.hashnode.dev·Jul 12, 2024Hashing and Salting of passwords in Node.jsIn web applications, securing user passwords is crucial. Hashing and salting are two methods that greatly improve password security by making it harder for hackers to access user credentials. What is Hashing? Hashing turns plain-text passwords into a...DiscussSalting
Mihir Sai Dudekulamihirsaidudekula.hashnode.dev·Jul 10, 2024Securely Hashing Passwords Using bcryptjsIntroduction Implementing secure password storage is crucial in web applications, especially when handling sensitive information like credit card numbers or national identification numbers. Storing raw user data as-is in the database is highly insecu...DiscussBcrypt
Aditya Guptaadityaguptaa.hashnode.dev·Jul 7, 2024The Art of Consistent HashingWhile reading the paper "Scaling Memcached at Facebook", I came across Consistent Hashing. What started as a quick read became an hour-long obsession with this topic! My journey to understanding consistent hashing was a long one. This blog is here to...DiscussHashing
Manan Doshisuperclog.hashnode.dev·Jul 3, 2024Distributed Hash Generation Algorithm in Python — Twitter Snowflake ApproachInto The Background… In any software development lifecycle, unique IDs play a major role in manipulating and showcasing data. A lot depends on the uniqueness of each data segment associated with user transactions. There are several ways to generate u...Discussdistributed system
Joseph Chisom Ofonagorochisom.hashnode.dev·Jul 2, 2024An Overview of Hashing Technology: More than just EncryptionWhen it comes to securing data, either in transit in use or at rest, one technology that while not a 100% foolproof tech, has proven time and again to be a very effective way of keeping private stuff private is hashing technology. Brief History Data ...Discuss·1 likeHashing
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Jun 30, 2024Part 4: The digital signature and non-repudiation.Previously, we discussed some cryptography operations, including encryption, decryption, and the concept of public key infrastructure. Now, let's explore the process of generating a digital signature and how it is used for non-repudiation. Have you e...Discussdata signing