Gwon Honggwonhong.hashnode.dev·Oct 22, 2024How bcrypt hashes with salt (+Rainbow Table Attack)Goals Understand how bcrypt do ‘salting’ Especially, how it can do salting without storing salt at extra columns dedicated for ‘salt’ Basics Rainbow Table Attack Rainbow Table is a table with various possible passwords and it’s hashes. When attac...DiscussHashing
Rahul Boneyrahulboney.hashnode.dev·Jul 13, 2024Creating a Blogging Website Using Node.js, JWT Tokens, Express, MongoDB, and HashingIn this tutorial, I will walk through the process of creating a blogging website using Node.js, Express, MongoDB for database storage, JWT tokens for user authentication, and hashing for secure password storage. We'll cover essential backend and fron...DiscussBlogging
Rahul Boneyrahulboney.hashnode.dev·Jul 12, 2024Hashing and Salting of passwords in Node.jsIn web applications, securing user passwords is crucial. Hashing and salting are two methods that greatly improve password security by making it harder for hackers to access user credentials. What is Hashing? Hashing turns plain-text passwords into a...DiscussSalting
Ajay Veerabommaajayveerabomma.hashnode.dev·Feb 20, 2024Understanding Salting Technique in SparkApache Spark is a powerful open-source distributed computing system known for its speed, ease of use, and sophisticated analytics capabilities. It is widely used for big data processing and analytics due to its ability to handle large-scale data acro...Discuss·2 likes·229 readsspark
Tanmay VijayforInDepth by Techknightsblog.techknights.in·Oct 30, 2023An Insight into Hashing: The Backbone of CybersecurityHashing Hashing is a fundamental concept in computer science and cybersecurity. Hashing is a process of transforming a string of data characters into another form, often shorter and fixed in length. This transformation is generally irreversible and d...DiscussHashing