MetaversityOneforDeveloper DAOgrotesque-shame-tremble-47.hashnode.net·Jul 5, 2022Security in Crypto, Hardware Wallets, and Pseudonymity - Part 1This article is a primer on all things security regarding holding, transacting, and safeguarding cryptocurrencies and NFTs. I didn't mean it to be a complete compendium, but it gives you all the necessary information to start. I divided this primer ...Discuss·61 likes·293 readsSecurity in CryptoCryptocurrency
HackeraceforHackerace Blog Posthackeraceblog.hashnode.net·Feb 8, 2023Two-Factor Authentication (2FA)Before considering the term “Two-factor Authentication”, there is a need to understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, ther...Discuss·10 likes2FA
Ojo Itunu SamuelforMcsammymcsammy.hashnode.net·Feb 8, 2023Two Factor Authentication (2fa)Before considering the term “Two-factor Authentication” we should understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, some people li...Discuss·10 likesSecurity
Edet AsuquoforEddy's Spaceeddy.hashnode.net·Mar 18, 2023Mastering User Authentication: A Step-by-Step Guide to Using Google OAuth 2.0 in Node.js with Passport.jsIntroduction Are you tired of building user authentication systems from the ground up? Do you want to benefit from the power and security of OAuth 2.0 without having to write your own code? Look no further, because we'll show you how to use Google OA...Discuss·30 readsNode.js
Raphael Carlos Regoforraphaelcarlosr.devraphaelcarlosr.hashnode.net·Mar 13, 2023🔐How to decode and use 2FA code generated by TOTP Algorithm 🤖You may have entered a 6-digit code from a 2FA app like Google Authenticator 😬, but where did this code come from? The answer lies within the QR code and the inner workings of the Time-based One-time Password algorithm (TOTP) 🔍. In this article, we...Discuss·76 reads2FA
Kristof RiebbelsforA blog to (be) inspire(d) (by) otherskriebbels.hashnode.net·Mar 5, 2023When two-factor authentication is uselessPreviously on... In my previous post, I stated that I will begin a series that will give the reader insight into my journey of protecting my data. I summed up multiple subjects I want to explore. I already put my IoT devices on my guest network. But ...Gemma Black and 1 other are discussing this2 people are discussing thisDiscuss·1 like·53 readsPrivacyprivacy
Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net·Feb 17, 2023How Hackers Steal Passwords And Methods To Stop Them?With a compromised password, it’s not just your account or information that remains vulnerable. Hackers typically steal passwords as the first leg of a larger attack; and build up to exploit your compromised account for accessing other systems or use...Discusspasswords
Ojo Itunu SamuelforMcsammymcsammy.hashnode.net·Feb 8, 2023Two Factor Authentication (2fa)Before considering the term “Two-factor Authentication” we should understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, some people li...Discuss·10 likesSecurity
HackeraceforHackerace Blog Posthackeraceblog.hashnode.net·Feb 8, 2023Two-Factor Authentication (2FA)Before considering the term “Two-factor Authentication”, there is a need to understand the importance of digital security in the present world. With our world evolving into a world of technology where almost all human activities are done online, ther...Discuss·10 likes2FA
shamnad sheriefforshamnadsherief.hashnode.net·Feb 5, 2023Setting Up 2fa On The Command LineTwo-factor authentication (2FA) is a security process in which a user provides two different authentication factors, other than a password to verify their identity. Implementing 2FA can enhance the security of your systems and applications. In this t...Discuss·44 reads2FA
shamnad sheriefforshamnadsherief.hashnode.net·Jan 29, 2023Install Authy Without Snap in LinuxAuthy is a Two-Factor-Authentication software focused on security. Unfortunately Authy is only supported as a snap package in Linux. But everybody hates snap. So there is an alternate way to install authy on debian based linux distributions. First cl...Discuss·1 like·28 readsLinux
Hillary Nyakundiforlary mak's Bloglarymak.hashnode.net·Nov 30, 2022User Authentication TechniquesIn the digital world, user authentication is essential for maintaining secure access to online accounts and resources. User authentication verifies the identity of a user before granting access to sensitive information or systems. There are many dif...Discuss·74 readsauthentication
MetaversityOneforDeveloper DAOgrotesque-shame-tremble-47.hashnode.net·Jul 5, 2022Security in Crypto, Hardware Wallets, and Pseudonymity - Part 1This article is a primer on all things security regarding holding, transacting, and safeguarding cryptocurrencies and NFTs. I didn't mean it to be a complete compendium, but it gives you all the necessary information to start. I divided this primer ...Discuss·61 likes·293 readsSecurity in CryptoCryptocurrency