gayatri kumargeekee.hashnode.dev·Nov 24, 2024Securing Your API: Implementing Authentication and Best PracticesIn the previous part, we enhanced our API with error handling and data validation to make it more robust and user-friendly. Now, it’s time to secure our API by adding authentication and safeguards against potential vulnerabilities. APIs often handle ...Discuss·10 likesWeb Developmentjs
KUNTAL MAITYkuntalmaity.hashnode.dev·Nov 5, 2024difference between access token and refresh tokenWhy tokens? Authentication and Authorization are the crucial steps for protecting user data. Hear token based authentication comes into the picture. There are many authentication methodologies are available but took in based authentication is most po...Discussaccess-token
Oyindamola Abiolamiield.hashnode.dev·Nov 4, 2024A Simple Guide to How Proxy Contracts Work with TokensProxy contracts are a powerful tool in the world of blockchain. They help you interact with complex smart contracts without needing to deal with the complexities yourself. Think of a proxy contract as an assistant that handles tasks for you, like sen...Discussproxy
Romman Sabbirrommansabbir.com·Nov 2, 2024Secure User Authentication in Android: A Comprehensive Guide [PART 2]User authentication is one of the most critical security aspects of any mobile application. Implementing secure authentication methods ensures that users’ data and accounts are protected from unauthorized access. In this article, we will dive deep in...Discuss·50 readsAndroid : Security, Encryption and Secure PracticesAndroid
Venkate Exchangevenkate-research.hashnode.dev·Oct 31, 2024What Are Token Standards?Why Follow Token Standards? Interoperability Token standards ensure that all products built on the same framework can interact and work together seamlessly. When a project's tokens adhere to a unified standard, newly issued tokens can remain compatib...DiscussCryptocurrency
Aries Triputrantoaariestriputranto.hashnode.dev·Oct 27, 2024Respons 403Request URL: https://api.github.com/repos/AriesTriputranto/chromium-dashboard/hook Request method: POST Accept: */* Content-Type: application/json User-Agent: GitHub-Hookshot/c0ace7e X-GitHub-Delivery: 42729de0-92ad-11ef-89ca-38e0fe43b59c X-GitHub-Ev...Discussurl req
Victor Uzoagbavictoru.hashnode.dev·Oct 25, 2024Tokenization of Real-World Assets Beyond Digital ArtIn the financial world, tokenization is already in place-mostly beyond anything one could relate to with digital art or collectibles. Blockchain technology opens up greater avenues for the global tokenization market to reach a value of $24 trillion b...DiscussTokenization
AMITfuture-stack.hashnode.dev·Oct 23, 2024How Access and Refresh Tokens Work in User Authentication?In today’s digital landscape, authentication is the backbone of secure web and mobile applications. Whether you’re signing into a social media platform or accessing a cloud service, the system needs to verify your identity and determine what resource...Discussrefresh-token
Zainab Wahabzainabwahab.hashnode.dev·Oct 14, 2024What is ERC-20 and How Do Its Functions Define Fungible Tokens?Introduction to ERC-20 Tokens ERC-20 tokens are fungible digital assets that exist on the Ethereum blockchain. A fungible token means that each token unit is identical and interchangeable with another. This is similar to fiat currencies, where each $...Discuss·6 likes·27 readsEthereum
Pranav Podutwarpranavdevelops.hashnode.dev·Oct 6, 2024Mastering Distributed Locks: Consistency using Fencing TokensContinuing from learnings from previous blog on tackling the thundering herd problem, which discussed the viral incident where 13 million people attempted to book Coldplay tickets, it’s clear that such high-demand events shows the need for distribute...Discuss·79 readsdistributed system