Andriawanverri.andriawan.web.id·Jan 26, 2025Decentralize GitHashing Git sederhananya merupakan simple Key-Value datastore, dimana hash dari content akan menjadi key untuk content itu sendiri. Baik itu hash dari content yang berisi meta commit, tree hash dan blob file. Setiap hash dalam git disebut dengan Obje...Git SCMGit
Affan Shaikhsurabaffanshaikhsurab.hashnode.dev·Jan 24, 2025How Sharing Candies 🍬at a Party Teaches Us About Consistent HashingIntroduction Imagine you're excited to throw a party. At the party, you plan to give candies to everyone who comes. You and three friends are arranging this party, and each person should bring some candy. The question is: Who should bring what? The I...consistent hashing
Sajal Batrasajalbatra.hashnode.dev·Jan 19, 2025Understanding Hashing: SHA-256 and bcrypt.js ExplainedEvery day, millions of passwords and sensitive data traverse the internet. Behind the scenes, hashing algorithms work tirelessly to keep this information secure. Whether you're a developer building secure applications or simply curious about digital ...6 likes·106 readsSecurity
Vaishnavi Dwivedivaishd.hashnode.dev·Jan 19, 2025Snooping the basics - Arrays, strings and HashingBefore we dive into the core topics of searching, sorting arrays, and various algorithms, let’s first understand the basics of a few key concepts. Here, we will cover the very basics of these topics in a simple way. Detailed explanations will follow ...Java Programming
Nikhil Kumarmake-a-dev.hashnode.dev·Jan 16, 2025How Bcrypt Uses Salt for Password ProtectionWhat is Bcrypt? Bcrypt is a very popular npm library that is used to hash plain text passwords into hashes and compare the hashed password to the original password for authentication. But have you ever wondered how it works under the hood? What does ...JavaScript
Arpit Singhsystem-designn.hashnode.dev·Jan 14, 2025Consistent Mapping | System DesignUnderstanding Consistent Hashing in System Design In the realm of distributed systems, consistent hashing has emerged as a critical technique for managing data distribution across multiple nodes. In this blog, I will guide you through the intricacies...System Design
J3bitokjebitok.hashnode.dev·Jan 12, 2025The Advent of Cyber: Day 23: Hash cracking - You wanna know what happens to your hashes? (TryHackMe)In this article, we’ll cover Hash cracking - You wanna know what happens to your hashes? write-up as the Day 23 challenge of the Advent of Cyber event challenge. It involved hash functions and hash values, saving hashed passwords, cracking hashes, an...Hashing
Arka Infotecharkainfotech.hashnode.dev·Jan 10, 2025Hashing in Data Structures: Techniques and AlgorithmsIntroduction Hashing is one of the most powerful techniques in computer science and plays a vital role in optimizing data retrieval. It is a process used to uniquely identify a data item by converting it into a fixed-size value, which can be used for...10 likescoding
Arka Infotecharkainfotech.hashnode.dev·Jan 10, 2025Inside the Keccak Algorithm: The Foundation of SHA-3Introduction In the world of cryptography, hash functions play a crucial role in ensuring data integrity, confidentiality, and authenticity. SHA-3 (Secure Hash Algorithm 3) is the latest member of the SHA family, developed to provide a more secure al...10 likesKeccak
Arka Infotecharkainfotech.hashnode.dev·Jan 10, 2025The Role of Hashing Algorithms in CybersecurityIntroduction In the digital age, securing data and ensuring its integrity are paramount. Hashing algorithms play a critical role in achieving these objectives by converting data into a fixed-size string of characters, which represents the original da...10 likesHashing