DEV Community

# encryption

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Basics of Encryption: The Diffie-Hellman Key Exchange Explained

Basics of Encryption: The Diffie-Hellman Key Exchange Explained

Reactions 6 Comments
4 min read
How to securely store passwords in the database

How to securely store passwords in the database

Reactions 9 Comments
6 min read
Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

Reactions 6 Comments
5 min read
Encryption: Understanding the Public Key and Private Key

Encryption: Understanding the Public Key and Private Key

Reactions 10 Comments
3 min read
Simpler way to secure data with Ruby and Basis Theory

Simpler way to secure data with Ruby and Basis Theory

Reactions 6 Comments
3 min read
How to Secure Webhook Endpoints with HMAC

How to Secure Webhook Endpoints with HMAC

Reactions 9 Comments
5 min read
Encryption in ‚õÖ cloud native apps

Encryption in ‚õÖ cloud native apps

Reactions 11 Comments
3 min read
Cryptography for beginners

Cryptography for beginners

Reactions 9 Comments
5 min read
FaceSign

FaceSign

Reactions 6 Comments
1 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

Reactions 15 Comments
3 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

Reactions 11 Comments
2 min read
Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

Reactions 10 Comments
3 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

Reactions 11 Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

Reactions 11 Comments
2 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

Reactions 10 Comments
2 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

Reactions 15 Comments
2 min read
What is the difference between encryption, hashing and salting?

What is the difference between encryption, hashing and salting?

Reactions 19 Comments 2
6 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

Reactions 7 Comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

Reactions 13 Comments
8 min read
SHA-256 Encryption - VSCode to GitHub

SHA-256 Encryption - VSCode to GitHub

Reactions 5 Comments
8 min read
Implementing a safe and sound API Key authorization middleware in Go

Implementing a safe and sound API Key authorization middleware in Go

Reactions 7 Comments
8 min read
CMK Encryption for Azure Storage Accounts

CMK Encryption for Azure Storage Accounts

Reactions 2 Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

Reactions 2 Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

Reactions 9 Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

Reactions 10 Comments
1 min read
OCSP and CRL: what could go wrong?

OCSP and CRL: what could go wrong?

Reactions 14 Comments
3 min read
Hashing, Explain it to me like I'm 5.

Hashing, Explain it to me like I'm 5.

Reactions 4 Comments
1 min read
RDS Encryption and Security

RDS Encryption and Security

Reactions 4 Comments
2 min read
Acra. Features: Data masking

Acra. Features: Data masking

Reactions 10 Comments
1 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

Reactions 10 Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

Reactions 10 Comments
3 min read
Password Encryption with Hash Function in Python

Password Encryption with Hash Function in Python

Reactions 7 Comments
2 min read
How To Manage Encryption at Scale?

How To Manage Encryption at Scale?

Reactions 2 Comments
6 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

Reactions 3 Comments
4 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

Reactions 12 Comments
3 min read
JS practice: day2 - password decoder

JS practice: day2 - password decoder

Reactions 3 Comments
1 min read
UDP Socket manager for go server-side

UDP Socket manager for go server-side

Reactions 6 Comments
5 min read
Encrypt your crucial data into Image file

Encrypt your crucial data into Image file

Reactions 5 Comments 1
1 min read
Asymetric RSA encryption/decryption of your clipboard

Asymetric RSA encryption/decryption of your clipboard

Reactions 2 Comments
2 min read
Encryption is important

Encryption is important

Reactions 7 Comments
3 min read
Encrypt and Decrypt in NodeJS

Encrypt and Decrypt in NodeJS

Reactions 2 Comments
1 min read
Encryption without passwords

Encryption without passwords

Reactions 13 Comments
6 min read
All about HTTPS (part-2)

All about HTTPS (part-2)

Reactions 8 Comments
3 min read
Configure SSL between RDS and Weblogic / DMS endpoint

Configure SSL between RDS and Weblogic / DMS endpoint

Reactions 2 Comments
1 min read
RSA in .NET

RSA in .NET

Reactions 4 Comments
1 min read
How did we create a private messenger with E2E encryption?

How did we create a private messenger with E2E encryption?

Reactions 9 Comments 3
3 min read
Hashing vs Encryption

Hashing vs Encryption

Reactions 2 Comments 1
1 min read
HTTPS

HTTPS

Reactions 2 Comments 1
4 min read
When to use Customer Managed KMS CMKs?

When to use Customer Managed KMS CMKs?

Reactions 4 Comments
3 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

Reactions 11 Comments
1 min read
Complicated encryption ways explained in 2 min, by @vixentael 02:31

Complicated encryption ways explained in 2 min, by @vixentael

Reactions 14 Comments
1 min read
Server Authentication With Client Certificate X.509

Server Authentication With Client Certificate X.509

Reactions 5 Comments
2 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

Reactions 6 Comments
1 min read
Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Reactions 5 Comments
6 min read
JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

Reactions 7 Comments 7
8 min read
JWT Authentication with Symmetric Encryption in ASP.NET Core

JWT Authentication with Symmetric Encryption in ASP.NET Core

Reactions 15 Comments 1
9 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

Reactions 9 Comments
1 min read
Tor - The Onion Router

Tor - The Onion Router

Reactions 11 Comments 1
2 min read
Getting started with GPG(GnuPG)

Getting started with GPG(GnuPG)

Reactions 6 Comments 3
2 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

Reactions 9 Comments
2 min read
loading...