Mohil Wankargemmmohil.me·Aug 20, 2024Signing Transaction using KeysWelcome back folks, Today we will be talking about a more important concept in making your transaction on Web3 blockchain. There are a lot more things that you should know it be safe and to be rich always.If you don't keep these important stuff safe ...Private and Public Keys
Romman Sabbirrommansabbir.com·Aug 20, 2024Android 15 features and changes list.Accessibility Better Braille: TalkBack now supports Braille displays using the HID standard over USB and secure Bluetooth. Camera and Media Direct and Offload Audio Playback: Invalidates previously open direct or offload audio tracks when resource...121 readsAndroid Application DevelopmentAndroid
Osama Shaikhosshaikh.hashnode.dev·Jul 15, 2024Cross Tenant Authentication for TDE via Workload Federation identityIntroduction: In my recent engagement with a customer operating under a multi-tenant architecture, I encountered a shared service model where a centralized Hub included a Key Management Service (KMS) using a Dedicated Hardware Security Module (HSM). ...72 readsAzure
Alex Browningasolytics.hashnode.dev·Apr 19, 2024Guide: How do you make text ASO fast and efficient?This time, we will discuss text optimization in detail: stages, nuances, life hacks, and tools that simplify a developer's life. This is part of ASO (App Store Optimization). The user enters his query and finds the necessary applications based on it....semantic core
Osama Shaikhosshaikh.hashnode.dev·Mar 17, 2024Azure HSM: Navigating Compliance for FSIIntroduction As a technology enthusiast I recently had the opportunity to dive deep into the world of Azure Managed Hardware Security Modules (HSMs) for FSI customer. These powerful cryptographic guardians play a pivotal role in helping Non-Banking F...86 reads#FSI
Varun Joshiblog.varunjoshi.co.in·Mar 2, 2024Leveraging Key Tags in List MappingIn the realm of React development, efficiently managing lists is a common task, often accomplished using the map() function. While it might seem inconsequential at first glance, the judicious use of key tags during list mapping can significantly impa...1 likeReact
J. V. G. Ransikajvgransika.hashnode.dev·Dec 11, 2023Unveiling the Differences: a_dic.keys() vs. list(a_dic) in PythonIn Python we often encounter situations where we need to extract a list of keys from a dictionary. While both dic.keys() and list(dic) achieve this seemingly identical task, they operate in subtly different ways, with distinct implications for perfor...Python
Henry McArdlehmcardle.com·Nov 10, 2023AWS Incident Response: IAM Key Compromise Sample PlaybookThere has been an alarmingly high volume of compromised AWS IAM keys in recent months, with the majority of these being caused by lazy practices and lack of understanding of just how big a risk access keys play in the security of the organization. IA...142 readsAWS
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Oct 20, 2023Deploy Hashicorp Vault to store Keys and KES for encryption with Minio for object storage using Helm package managerThe Vault’s #Key Management secrets engine provides a consistent workflow for distribution and lifecycle management of cryptographic keys in various #key management service (KMS) providers. It allows organizations to maintain centralized control of t...hashicorp
AQIB HAFEEZaqibhafeez473.hashnode.dev·Sep 24, 2023Day 15 || Introduction to Nano Text Editor in Linux, Its Role in DevOps, Installation on Ubuntu, CentOS, and RHEL, and Essential Shortcut KeysNano Text Editor in Linux: Nano is a simple, command-line text editor commonly used in Linux and Unix-like operating systems. It's designed to be user-friendly and straightforward, making it accessible to both beginners and experienced users. Nano is...47 readsLinux