Articles by Tag #encryption

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Lightweight Encryption: The Power of Vigenère

This article was co-authored by @gums Introduction Numerous times we have heard people...

Learn More 17 0Apr 24

How to Generate Your Own Public and Secret Keys for PGP Encryption

PGP (Pretty Good Privacy) is one of the most widely used encryption methods to secure sensitive...

Learn More 15 0Nov 29 '24

How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux

Do you even encrypt ? Bitlocker is Windows default disk encryption software. Cryptsetup on the...

Learn More 10 0Oct 29 '24

Terraform, OpenTofu e criptografia de estado

TLDR: o OpenTofu agora conta com criptografia de State files (e de Plan files também!) sem depender...

Learn More 9 0Jul 2 '24

A Deep Dive into WhatsApp’s Encryption: Identity, Keys, and Message Security

WhatsApp's End-to-End Encryption End-to-End Encryption (E2EE) is a way to keep your...

Learn More 7 1Jan 15

Jasypt CLI tools for encryption and decryption

Recently I have started to use the Jasypt CLI tools. Before that, I have always had to use the...

Learn More 6 0Aug 9 '24

Microsoft Certified Azure Administrator Associate Exam (AZ-104) Lab Preparation #5: Azure Disk Encryption

Introduction To pass the AZ-104 exam, you must complete several live online lab tests....

Learn More 6 0Jan 7

Cloud Security Challenges and Encryption, Identity Management, and Compliance

Cloud Security Best Practices: Addressing Key Challenges and Solutions Cloud computing has...

Learn More 6 1Dec 22 '24

🚀 MongoDB 7.0:最新功能特点

🔍 新的聚合运算符: $median: 计算一组中的中位数值 $percentile: 计算一组中的百分位数值 ⏱️ 时间序列: 针对存储、查询和处理时间序列数据进行了优化 🔍...

Learn More 5 0Aug 5 '24

🚀 MongoDB 7.0: The Latest and Greatest!

🔍 New Aggregations Operators: $median: Calculate the median value in a group $percentile: Calculate...

Learn More 5 0Aug 5 '24

How to Secure Your Intranet with SSL: A Developer’s Guide

Introduction: Intranet applications are often the backbone of an organization’s internal...

Learn More 5 0May 9

Secure Text Encryption and Decryption with Vanilla JavaScript

In today’s digital age, securing sensitive information like API keys, passwords, and user data is...

Learn More 4 0Dec 3 '24

Implementing a Caesar Cipher Program in Python

In the world of cybersecurity, encryption plays a crucial role in protecting sensitive information....

Learn More 4 0Oct 7 '24

How to Generate Self-signed Certificate in CentOS 7

Securing communication over the web is critical, and SSL certificates play a huge role in encrypting...

Learn More 4 0Oct 2 '24

WEP Encryption: The Theory Behind Network Security

In today's digitally driven world, network security is more crucial than ever before. With the rise...

Learn More 3 0Oct 16 '24

SQS encryption options

When building distributed applications on AWS, Amazon Simple Queue Service (SQS) often becomes a...

Learn More 3 0Sep 4 '24

Data Security Strategy Beyond Access Control: Data Encryption

The cost, frequency, and scale of data breaches continue to rise year over year. According to the IBM...

Learn More 2 0Aug 29 '24

Secret management for the layman

How I manage secrets as a solo dev, using age and git

Learn More 2 0Nov 16 '24

Protecting Algorithms in Dart: A Multi-Layered Approach

A multi-layered approach, including obfuscation, encryption, API-based protection, native module integration for algorithm protection.

Learn More 2 0Oct 28 '24

Difference Between Encryption and Hashing 🔐🔑

Table of Contents Introduction Understanding Encryption Understanding Hashing Key...

Learn More 2 0Nov 8 '24

Bridging the Gap: Cross-Language Encryption and Decryption between Node.js and Go

In the fast-evolving world of software development, ensuring the security of data as it moves between...

Learn More 2 1Jul 4 '24

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Encryption is one of the most effective data security strategies, alongside access control, software...

Learn More 1 1Sep 3 '24

Hitchhikers guide to building a distributed filesystem in Rust. The very beginning…

I started to learn Rust few months back and decided to choose an interesting project as a learning...

Learn More 1 0Jul 25 '24

The Data Security Duo: Data Encryption and Vulnerability Scans

With the rise of tools such as Wiz and Dig, data vulnerability scans have become more accessible than...

Learn More 1 0Jul 28 '24

Does S/MIME Encrypt Emails and Attachments?

Email is important for both personal and work life. However, it can be easily attacked by online...

Learn More 1 0Oct 22 '24

🧠 Quantum-Safe Web Development: How to Future-Proof Your Code Before It's Too Late

"We thought our system was bulletproof. until quantum computing came along." It was not a line from...

Learn More 1 0Jun 14

And When We Thought We Had Seen It All… Here Comes the Right Dev Tool for Our Toolbox

The Developer's Dilemma: Passwords, Security, and Chaos Let's be honest: as developers,...

Learn More 1 0Mar 29

Email Security and Data Protection for Startups: Affordable Solutions

Startups operate in a dynamic environment, often handling sensitive data and crucial communications....

Learn More 1 1Dec 23 '24

Top 15+ Must-Have Resources for CS Theory: Cryptography Explained

Dive into the fascinating world of Cryptography, a cornerstone of Computer Science theory that...

Learn More 1 0Jun 21

How to use pgpainless-core

Document https://pgpainless.readthedocs.io/en/latest/quickstart.html ...

Learn More 1 0Mar 9