Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 20, 2024User Authentication Level 2In this blog, we explore an updated version of a simple user authentication system using Express.js, PostgreSQL, and bcrypt for password encryption. This version addresses security concerns by using password hashing and comparison, ensuring that sens...User Authentication
Mohammed Shakeelmaster-webdevelopment.hashnode.dev·Dec 19, 2024User Authentication Level 3Introduction In modern web applications, user authentication is a critical feature to ensure secure access control. Passport.js, a popular Node.js middleware, simplifies user authentication by providing robust and flexible strategies. This blog delve...authentication
Jithu Josephjithu-joseph.hashnode.dev·Dec 17, 2024Protecting Your Passwords: Simple Steps for a Safer Digital LifeImagine this: you wake up one morning, grab your phone, and see dozens of notifications about unusual activity on your accounts. Panic sets in as you realize someone has gained access to your personal information. Scenarios like this happen more ofte...passwords
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024John The RipperHello Hackers 🚀 Today we will be solving the challenges in John The Ripper room on TryHacKMe TASK 1 - John Who Welcome John the Ripper is one of the most well known, well-loved and versatile hash cracking tools out there. It combines a fast cracking...ethicalhacking
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Encryption 101TASK 1 - What will this room cover? This room will cover: Why cryptography matters for security and CTFs The two main classes of cryptography and their uses RSA, and some of the uses of RSA 2 methods of Key Exchange Notes about the future of enc...Entrepreneurship
Jackson Markrealtech.hashnode.dev·Dec 10, 2024Are Password Vaults Enough? A Comprehensive Security Strategy for DevelopersIn the ever-evolving digital world, developers are at the forefront of creating and maintaining systems that rely on secure credentials. Managing passwords and sensitive data is a critical part of the job, and password vaults have become a popular so...passwordvault
Vinayak Sharmaitsvinayak.hashnode.dev·Dec 8, 2024The Bcrypt Algorithm for Secure Password HashingHashing is a cryptographic function that cannot be reversed. It takes an input of random size to produce fixed-size values. These fixed-size values are called hash values, and the cryptographic function is called the hashing function. Hashing has a c...1 likePython
Umesh Panditumeshpandit.hashnode.dev·Dec 1, 2024How Microsoft Copilot Protects You From Online Threats and Cyber RisksI care a lot about security online. I think most people do too. The internet has phishing emails and sneaky malware, so Microsoft has its Copilot to help you stay safe online. It is like having some cybersecurity expert accompanying you as you make ...microsoft copilot
Suvam Mohapatraneverstop-password-blog.hashnode.dev·Dec 1, 2024How Are Passwords Stored in Databases? (And Why It Matters)Have you ever wondered what happens to your password after creating an account? If it’s stored in plain text, that’s a recipe for disaster. In the event of a data breach, your password will be exposed instantly. This blog explores how passwords are s...passwordstorage
Yashblog.yassh.in·Nov 26, 2024Database-less Password Resets using JWTI was given a task to setup Authentication for our application and I had a few unsaid restrictions, it was not sensible to modify the database schema if not absolutely necessary because it is a complex database with many connected tables which are co...1 like·57 readsJWT