Pratik Mhatrepnmhatre.hashnode.dev·Jun 27, 2024Enhancing Network Security: A Comprehensive Guide for DevelopersHello, fellow developers! 👋 Today, we’re diving deep into the crucial world of network security. Ensuring secure communication in our apps is a top priority, and we'll explore some practical and advanced steps you can take to achieve this. So, let’s...Android
Dhruvkumar Maisuriasequelizewithjwt.hashnode.dev·May 25, 2024Building a Secure Authentication API with Node.js, Express, Sequelize, and MySQLIn today's digital landscape, secure authentication mechanisms are critical to protect user data and ensure privacy. Building a robust authentication API using Node.js, Express, Sequelize, and MySQL offers a scalable and efficient solution. Node.js p...46 readsSequelize
Maheshwar Ligadefortechwastitechwasti.com·Jan 8, 2024Building a Secure REST API with GORM, Echo, JWT Token Authentication, and PostgreSQL in Go.Combining GORM, a robust ORM library for Go, with Echo, a high-performance web framework, along with JWT token-based authentication and PostgreSQL, offers a solid foundation for developing secure and scalable RESTful APIs. In this detailed tutorial, ...947 readsgo-languageGo Language
Musaib Altafmusaaib.hashnode.dev·Dec 24, 2023Django Registration Wizardry: Strengthening Security with Email OTP Verification1. Introduction Django is a python-based high level web framework. It's an open source framework and is free to use. If we talk about the architecture, it follows the MVT (Model View Template) architecture. In this article, I assume that you already ...5 likes·414 readsDjango registration system
Nancy Okekenancyokeke.hashnode.dev·Aug 11, 2023Securing Your Node.js App: A Deep Dive into Effective Authentication TechniquesAuthentication plays a pivotal role in the security of modern web applications, ensuring a safe and personalized user experience. It involves the verification of user identities and permissions, safeguarding sensitive data and resources from unauthor...56 likes·300 readsJavaScript
Fadhili Njagiblog.nixque.com·Aug 6, 2023How to setup MySQL on a Linux VPSSo you've made an awesome backend or full-stack application, powered by a MySQL database. You are pretty happy with your work and are ready to take it to production. You are deploying it to a Linux Virtual Private Server (VPS) and you have no idea ho...237 readsLinux
Lavish Goyalpandazblog.hashnode.dev·Jun 24, 2023How to perform Encryption-Decryption in Web AppsSometimes in your web application, you need to expose some data to the client's browser but need it back with the subsequent API requests made but also sensitive data and you don't want the user to manipulate or understand it. Here comes the signific...95 readsNode.js
Daniel Wagnerwagnus.hashnode.dev·Feb 5, 2023Realms and users - Part 3In this post, we will look at realms and users in Keycloak. Before we start creating these things, we should familiarize ourselves with these terms from the Keycloak universe. What is a realm? A realm is a logical boundary that represents a set of us...134 readsSecure applications with Keycloakkeycloak
Daniel Wagnerwagnus.hashnode.dev·Feb 4, 2023Getting started with Keycloak - Part 2In this post, we will look at how to start the Keycloak server on your local machine in developer mode. This developer mode is not suitable or intended for use in a production environment. However, it is perfectly sufficient for our first experiments...955 readsSecure applications with Keycloakkeycloak
Daniel Wagnerwagnus.hashnode.dev·Feb 4, 2023Introduction to Keycloak - Part 1Keycloak is an open-source identity and access management solution from Red Hat that provides a centralized platform for authentication and authorization. It acts as a Single Sign-On (SSO) solution for web and mobile applications and also provides se...131 readsSecure applications with KeycloakSecurity