Devika Vermatokenmaster.hashnode.dev·Jul 23, 2024The Ultimate Guide to Authentication Tokens: JWT, Access, and Refresh TokensTable of Contents Introduction: Why We Need Tokens What is JWT (JSON Web Token)? Access Tokens Explained Refresh Tokens: The Long-Term Pass How These Tokens Work Together Security Considerations Implementing Token-Based Authentication Conclusion 1....Discussnode
Kunal Dhongadekunaldhongade.hashnode.dev·Jul 15, 2024Introduction to Restaking and AVS in SolidityThe blockchain ecosystem is evolving rapidly, with novel concepts and mechanisms being introduced to enhance its functionality and security. Two such emerging concepts are Restaking and Advanced Validator Solutions (AVS). Restaking involves reusing s...DiscussRestaking
himanshugopalkdwivedi.hashnode.dev·Jul 10, 2024(lt.47)"Mastering Node.js: Creating a Server with HTTP Module, URL Handling, Express.js Frameworks, Port Numbers, and REST API IntegrationWe can create a server using http module in NodeJS In Nodejs, the HTTP (which stands for Hyper Transfer protocol) module is a core module that provides functionality for creating and interacting with HTTP servers and clients.A HTTP request is a messa...Discuss·10 likesWeb Development
Parveen Kumarparveenpal.hashnode.dev·Jul 6, 2024Securing Your API: How to Handle Stolen Tokens EffectivelyHave you ever wondered what would happen if your token was stolen by someone? To authenticate api request from valid users, we mostly use JWT (Json Web Token). A JWT consist of three parts, Header (Algorithm & token type), Payload (data) and Verify s...Discussauthenticated
Abhradeep Barmanabhra.hashnode.dev·Jul 5, 2024WTH is Access Tokens and Refresh Tokens?Before knowing about Access Tokens and Refresh Tokens, we have to know about Tokens. There are many explanations of these concepts on the internet, but they're very bookish. Here, we will understand these concepts in a very practical way possible in ...Discuss·2 likes·60 readsWeb Development
Yash Jainyashj.hashnode.dev·Jul 5, 2024Implementing Governance and Access Control in Smart Contracts with OpenZeppelin v5Introduction In the world of decentralized applications and smart contracts, governance and access control are crucial components that ensure the security, flexibility, and longevity of your project. This article will dive deep into how to implement ...Discuss·10 likesSmart Contracts
saurabh davesaurabhdave.hashnode.dev·Jul 5, 2024Jenkins TriggersPopular Triggers :- Git Webhooks Poll SCM Schedule jobs Remote Triggers Build after a particular job Many more..... Basic steps to follow are :- Create a GitHub repo. Generate SSH keys from your terminal by command(ssh-keygen). Save the ...DiscussPoll SCM
Juned Khanjsonwebtokens.hashnode.dev·Jul 2, 2024JSON Web TokensTokens are pieces of data that the server sends to the client on certain occasions, such as during login or registration for a service. When saving data to the database, the server also generates tokens, primarily two types: refresh tokens and access...DiscussGeneral Programming
Adityaa krdevsadi.hashnode.dev·Jul 1, 2024Guide to Create an ERC-20 Token Using Solidity on Avalanche 🔺What is an ERC-20 Token? A standardized cryptocurrency token on the Ethereum blockchain, ensuring compatibility with various wallets and dApps. Why ERC-20 Tokens are Important? They simplify token creation and management by providing a standardized p...Discuss·1 like·31 readsAvalanche
Magda Jankowskamagdajankowska.hashnode.dev·Jun 23, 2024Deep Dive into the most common attacks on smart contracts1. Reentrancy Attacks Description Reentrancy occurs when a contract calls an external contract which then calls back into the original contract before the initial execution is complete. This can lead to unexpected behavior and allow attackers to repe...DiscussBlockchain