Chikezie3illbaby.hashnode.dev·Sep 25, 2023Cryptography's Vital Role in Securing Blockchain NetworksBlockchain technology has revolutionized countless industries, offering secure, transparent, and decentralized solutions to an array of challenges. At its core, cryptography stands as a foundational pillar that safeguards the integrity, confidentiali...DiscussCryptography
Stephen Obasiobasi.hashnode.dev·Sep 24, 2023Understanding Cryptography: The Backbone of Blockchain TechnologyIntroduction Cryptocurrency and blockchain are often linked in our minds, representing the new era of digital money and decentralized transactions. But, beneath the surface, lies a fundamental question: How secure is cryptocurrency? The answer lies i...DiscussBlockchain
Muhamed Abdallamuhamedabdalla.hashnode.dev·Sep 22, 2023Approaches of Cassandra's ring partitioningIn the previous article, we talked about Cassandra's gossip protocol.Today, We are going a further step to talk about ring partitioning concepts in terms of Cassandra. Partitioning Approaches Before diving into approaches to partitioning a database, ...Discuss·43 readsCassandra
Adeyemo Oluwadamilare Emmanuelvinceoludare.hashnode.dev·Sep 3, 2023Art of Authentication (Episode two)User Authentication method (PASSWORD) User authentication is a fundamental aspect of ensuring the security and privacy of digital systems. It verifies the identity of a user trying to access a system, application, or data by requiring them to provide...Discussauthentication
Kralhexkralhex.hashnode.dev·Aug 2, 2023Beyond the Basics: HashingIntroduction In the vast landscape of programming, efficient and secure data management is essential for the success of any application. Hashing, a versatile technique, plays a key role in achieving these goals. By converting variable-length input da...DiscussHashing
Smit Bhoraniyasmit-bhoraniya.hashnode.dev·Jul 29, 2023Securing Your Data: A Guide to Encryption, Hashing, and SignaturesIn today's digital age, where data is constantly exchanged and stored online, ensuring the security and privacy of sensitive information is paramount. Cyberattacks and data breaches have become commonplace, emphasizing the need for robust security me...Discuss·10 likesencryption
Abdulrasaq Olarewajuabdulrasaq.hashnode.dev·Jul 25, 2023HASHING: A Simple Developer's GuideHello readers! As a developer, you often encounter the term "hashing" in the world of computer science and cybersecurity. It's an essential concept that plays a significant role in ensuring data security and integrity. Let's explore an interesting ad...Discuss·1 like·36 readsNode.js
James Mathengecodejunction.hashnode.dev·Jul 18, 2023See Hash Functions in Action: A Practical Example of SHA-256 and MD5 HashingHash functions like SHA-256 and MD5 are extensively used in real-world applications. In this article, we will showcase the hashing process through hands-on examples. Read on to gain a practical understanding of cryptographic hash functions. Introduct...Discuss·10 likesHashing
James Mathengecodejunction.hashnode.dev·Jul 17, 2023Properties of Hash Functions: Unlocking the Secrets Behind HashingIn the previous article, we introduced the concept of hashing and hash functions. We learned that hash functions are algorithms that take an input and generate a unique fixed-size string output called a hash value. But what makes an effective hash fu...Discuss·10 likesHashing
Mostafa Aymanscriptmaker.hashnode.dev·Jul 7, 2023Secure Your Files - Encrypt and Decrypt Your FilesIntroduction: Python script developed that provides an intuitive solution for encrypting and decrypting files using AES encryption. With its user-friendly graphical user interface (GUI) built with tkinter, Secure Your Files allows users to easily sel...Discuss·1 like·50 readsCryptography