Harshi Nikunj ShahforCoding Addacodingadda.hashnode.dev·Jan 18, 2025Understanding Databases: A Comprehensive Guide for DevelopersIntroduction In this blog, we dive deep into databases, unraveling concepts that are essential for developers across all levels. Whether you're a front-end enthusiast, back-end expert, or aspiring full-stack developer, this guide provides you with ac...12 likesDev Exchangedatabase expert
Kyle Arittarittkyle.hashnode.dev·Jan 16, 2025Safeguard Your Network: Eliminating Exploit VulnerabilitiesCyber threats are constantly evolving, and attackers are always on the lookout for weak spots in systems to gain unauthorized access. One of the most effective tactics used in initial access attacks involves exploiting unpatched vulnerabilities. Thes...ExploitPrevention
Rishi Bakshirishibakshi.hashnode.dev·Jan 7, 2025Understanding Public and Private Key CryptographySo, you're curious about end-to-end encryption (E2EE)—who wouldn't be, right? But before diving into how E2EE works, it's essential to understand a fundamental concept: public and private keys. These keys are your unique cryptographic identity and th...End-To-End-Encryptionpublic key
Rupal Singhalrupalsinghal.hashnode.dev·Jan 1, 2025Common security issues in JavaScript applicationsJavaScript applications can be vulnerable to various security issues, particularly because of their widespread use in web development. Here are some common security concerns and their potential mitigations: 1. Cross-Site Scripting (XSS) What happen...1 likeJavaScript
Shuka Zubaidatshukazuby.hashnode.dev·Dec 31, 2024Cracking the Code: Top Takeaways from 2024 in Backend DevelopmentAs the year draws to a close, it’s a perfect time to reflect on the milestones, challenges, and trends that have shaped my journey as a backend developer in 2024. This year has been pivotal for my growth, marked by exciting projects, evolving technol...Node.js
Yaakulyasecurenet.hashnode.dev·Dec 22, 2024Implementing a Password Strength Checker in PythonPasswords are the frontline of security for digital systems, yet many users still rely on weak passwords. To help promote better password practices, we’ll build a simple but effective password strength checker in Python. This blog will guide you thro...10 likes#cybersecurity
Manya LambaforWeb Securitywebsecurity-bymn.hashnode.dev·Dec 19, 2024Session HijackingIntroduction: A Digital Heist in Plain Sight Imagine shopping online, adding items to your cart, and preparing to check out—only to find items you didn’t add. This could mean you’re a victim of session hijacking, where hackers steal your active sessi...46 readsDeveloper
Shalon N. Ngiginjeri-ngigi.hashnode.dev·Nov 28, 2024Auth 101: Token Based Authentication💡 This is a stack agnostic strategy that can be implemented in a number of frameworks and languages. I, however, might reference ReactJS (client) and NodeJS (server). Overview There are a number of ways to implement secure authentication and autho...2 likes·68 readsJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 26, 2024Cybersecurity Awareness Month Day 11: The Role of Updates and PatchesImportance of Keeping Software Current Keeping software up to date is one of the most fundamental yet often overlooked aspects of cybersecurity. Updates and patches play a critical role in protecting devices and systems from vulnerabilities that coul...20 likesCybersecurityAwareness
Denishdenish.hashnode.dev·Nov 26, 2024Boost Your Web Security with Reverse Proxies and SSL Certificates!Hello friends, gadget freaks? ✌ Now let me share with you something rather important for any Web application nowadays – security. As it seen, hackers are always coming up with new strategies and methods of penetrating through a particular system; the...proxy