Ashish mauryatheashishmaurya.hashnode.net·Sep 13, 2021Everything You Should Know About Blockchain.A lot has changed since blockchain first arrived in the 1990s and since then it's changing our world in a way no one has predicted. If you have been active on the internet you must have heard people throwing words like NFT, Ethereum or you must have ...Eleftheria Batsou and 2 others are discussing this3 people are discussing thisDiscuss·109 likes·858 reads2Articles1Week
Ninad Ingaletechnophileholmes.hashnode.net·Mar 28, 2021FeaturedDeciphering the German Enigma Machine“Sometimes it is the people no one can imagine anything of who do the things no one can imagine.” ― Alan Turing World War II(1939-1945) saw the use of many advanced technologies. Technological innovations like the RADAR systems, "Vergeltungswaffe 2...Nova⚡Manish and 2 others are discussing this3 people are discussing thisDiscuss·101 likes·691 readsArtificial IntelligenceSuperb Post! Knew a lot about enigma machine. 3
Justin Carverjustincarver.hashnode.net·Oct 24, 2022FeaturedDesigning Squrl 🐿️, an End-to-End Encrypted URL Shortening SaaSEditor's Note: This project was completed almost a year ago and was mainly my first feature complete full stack application that I designed and developed from beginning to end. It was practice for my university level knowledge in cybersecurity. Unfor...Discuss·37 likes·4.7K readsWeb Development
Biraj Karkibirajkarki.hashnode.net·Apr 20, 2023Decoding SSL, TLS, and HTTPS: A Comprehensive ExplanationIn today's digital world, security is a critical concern for websites and online businesses. With cyber threats on the rise, it's essential to understand the technologies that protect sensitive information transmitted over the internet. Three commonl...DiscussSSL
Riha Mervanarihamervana.hashnode.net·Apr 18, 2023VPN vs. VNC - Which One is Safer & Faster?Virtual Private Network (VPN) A VPN creates an encrypted connection over a less secure network, such as the Internet. It allows you to send and receive data across shared or public networks as if you were directly connected to the private network. Us...Discuss·1 likevpn
Moses Chibwemoseschbw.hashnode.net·Apr 15, 2023The Importance of Encryption in Securing Your Digital LifeIntroduction The plain text must be encrypted to make it unreadable without a decryption key. It is an essential part of digital security, fending off threats to digitally stored personal and financial information. In the age of technology, encryptio...DiscussData Science
Abazie Chukwudivintagecreator.hashnode.net·Apr 14, 2023Why vintage encryption with its SHA-256 hashing algorithm and acid mechanism provides an effective means of verifying users' authenticity.In today's digital age, safeguarding personal information from unauthorized access is critical. With the world becoming more interconnected and reliant on technology, there is an increasing need for strong encryption mechanisms. This is where vintage...Discussencryption
Swaleha Parvinswaleha.hashnode.net·Apr 11, 2023Ethics of Data Collection and Privacy in the Digital Age: A Developer's PerspectiveIn the digital age, data collection and privacy have become hot-button issues. As technology continues to advance, companies and governments are collecting more personal data than ever before. As developers, we have a responsibility to consider the e...Discuss2Articles1Week
Princewill Inyangwillingly.hashnode.net·Mar 27, 2023Securing Sensitive Data: A Technical Guide to Encrypting Folders with PythonIntroduction Data security is now a crucial concern for businesses, software, and individuals due to the increasing storage of sensitive information in digital form. This has led to a significant rise in the risk of data breaches and theft. GitHub is...Discuss·8 likes·78 readsPython
Nevin Selbynevins-corner.hashnode.net·Mar 24, 2023Image Steganography Using Machine LearningImage steganography is a technique for concealing secret information within digital images without altering their visual appearance. The concept behind image steganography is to use the redundancy of the image data to embed the hidden message in such...Discuss·20 likes·30 readsCryptography
Dejun Jacksondejunjackson.hashnode.net·Mar 24, 2023How to keep your data safe using PGP Keys with PythonIntroduction Every day, there are roughly 2.5 billion gigabytes of data created, and a large portion of that is transferred over the internet every second. Today, companies are investing millions of dollars to ensure that their (and your) data are tr...DiscussPython
DbVisualizerforThe Tablethetable.hashnode.net·Mar 24, 2023Best Practices for Encrypting Data In Your DatabaseData encryption is one of the most important caveats for safeguarding our data. These days where safety on the web is paramount and data breaches so rampant, it‘s critical to walk yourself through a couple of best practices to encrypt data inside of ...DiscussMySQL
Mehmet Erturkertyurk.hashnode.net·Mar 21, 2023Quantum-Resistant Encryption: Why It Matters and How to be PreparedQuantum computing has the biggest potential to revolutionize computing as we know it, offering the promise of vastly increased computational power and the ability to solve complex problems that are beyond the reach of classical computers. However, th...DiscussArtificial Intelligence