Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Encrypting Data Using Asymmetric Encryption: A Comprehensive Guide
AdityaPratapBhuyan
AdityaPratapBhuyan
AdityaPratapBhuyan
Follow
Dec 16 '23
Encrypting Data Using Asymmetric Encryption: A Comprehensive Guide
#
encryption
#
asymmetric
1
reaction
Comments
Add Comment
6 min read
Encrypting Sensitive Information using Laravel Database Encryption Package
Nkwaten
Nkwaten
Nkwaten
Follow
Oct 31 '23
Encrypting Sensitive Information using Laravel Database Encryption Package
#
laravel
#
database
#
encryption
1
reaction
Comments
Add Comment
2 min read
Harnessing the Combination of Tailscale and Osquery
josephedward
josephedward
josephedward
Follow
Oct 8 '23
Harnessing the Combination of Tailscale and Osquery
#
encryption
#
sqlite
#
network
#
security
Comments
Add Comment
3 min read
Extensive Guide to Gnu Privacy Guard (GPG)
Emmanuella Sule
Emmanuella Sule
Emmanuella Sule
Follow
Oct 22 '23
Extensive Guide to Gnu Privacy Guard (GPG)
#
gpg
#
encryption
#
security
#
cybersecurity
6
reactions
Comments
Add Comment
10 min read
The Importance of Encryption in Large Language Models
Navraj Chohan
Navraj Chohan
Navraj Chohan
Follow
Oct 5 '23
The Importance of Encryption in Large Language Models
#
llm
#
encryption
#
privacy
#
data
Comments
Add Comment
2 min read
How can non-tech people understand asymmetric encryption?
02:30
Jeff
Jeff
Jeff
Follow
Sep 19 '23
How can non-tech people understand asymmetric encryption?
#
encryption
#
asymmetric
2
reactions
Comments
Add Comment
1 min read
GPG secret key: How to change the passphrase
nabbisen
nabbisen
nabbisen
Follow
Sep 9 '23
GPG secret key: How to change the passphrase
#
gpg
#
gnupg
#
privacy
#
encryption
7
reactions
Comments
Add Comment
2 min read
Manage Airflow connections with Terraform and AWS SecretsManager
Ivica Kolenkaš
Ivica Kolenkaš
Ivica Kolenkaš
Follow
for
AWS Community Builders
Aug 15 '23
Manage Airflow connections with Terraform and AWS SecretsManager
#
airflow
#
terraform
#
infrastructureascode
#
encryption
11
reactions
Comments
Add Comment
6 min read
Encrypting Sensitive Data in Rails 7 with Encrypted Attributes
Phil Smy
Phil Smy
Phil Smy
Follow
Aug 9 '23
Encrypting Sensitive Data in Rails 7 with Encrypted Attributes
#
webdev
#
rails
#
encryption
#
security
7
reactions
Comments
Add Comment
4 min read
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
Brandon Damue
Brandon Damue
Brandon Damue
Follow
Aug 7 '23
AWS Encryption Essentials: Ensuring Data Confidentiality & Safeguarding Your Cloud Assets
#
aws
#
cloudsecurity
#
encryption
#
cloudcomputing
6
reactions
Comments
Add Comment
7 min read
Overview of File Encryption Algorithms for Everyone
Alex Merced
Alex Merced
Alex Merced
Follow
Jun 21 '23
Overview of File Encryption Algorithms for Everyone
#
encryption
#
programming
Comments
Add Comment
4 min read
Securely Encrypting Secrets Using Open Source Tools: SOPS and AGE
waqas_ahmed01
waqas_ahmed01
waqas_ahmed01
Follow
May 21 '23
Securely Encrypting Secrets Using Open Source Tools: SOPS and AGE
#
sops
#
encryption
#
age
#
secrets
Comments
Add Comment
3 min read
Image encryption and decryption using AES algorithm
sadiab47
sadiab47
sadiab47
Follow
May 5 '23
Image encryption and decryption using AES algorithm
#
python
#
aes
#
encryption
#
image
2
reactions
Comments
Add Comment
5 min read
Asymmetric Cryptography with Golang
ElioenaiFerrari
ElioenaiFerrari
ElioenaiFerrari
Follow
Apr 5 '23
Asymmetric Cryptography with Golang
#
go
#
security
#
encryption
#
tutorial
21
reactions
Comments
Add Comment
3 min read
Introduction to WYD encryption and decryption using Rust
raphaelts3
raphaelts3
raphaelts3
Follow
Feb 26 '23
Introduction to WYD encryption and decryption using Rust
#
rust
#
wyd
#
mmorpg
#
encryption
Comments
Add Comment
7 min read
Introduction to WYD encryption and decryption using Rust
raphaelts3
raphaelts3
raphaelts3
Follow
Feb 26 '23
Introduction to WYD encryption and decryption using Rust
#
rust
#
wyd
#
encryption
#
mmorpg
Comments
Add Comment
7 min read
Breaking and building encryption in NFC digital wallets 📳
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Mar 28 '23
Breaking and building encryption in NFC digital wallets 📳
#
encryption
#
cryptography
#
security
#
appsec
4
reactions
Comments
Add Comment
2 min read
Reduce Network Usage - With This 1 Simple Trick!
mkadirtan
mkadirtan
mkadirtan
Follow
for
Noop Today
Mar 27 '23
Reduce Network Usage - With This 1 Simple Trick!
#
programming
#
backend
#
compression
#
encryption
1
reaction
Comments
Add Comment
4 min read
Introduction to WYD encryption and decryption using Rust
raphaelts3
raphaelts3
raphaelts3
Follow
Feb 26 '23
Introduction to WYD encryption and decryption using Rust
#
rust
#
encryption
#
mmorpg
#
wyd
2
reactions
Comments
Add Comment
7 min read
Enable encryption on existing RDS instance
jekobokidou
jekobokidou
jekobokidou
Follow
for
AWS Community Builders
Feb 27 '23
Enable encryption on existing RDS instance
#
rds
#
encryption
#
aws
#
awscommunitybuilders
3
reactions
Comments
2
comments
1 min read
Know About HTTPs Security
SSLWiki
SSLWiki
SSLWiki
Follow
Feb 6 '23
Know About HTTPs Security
#
encryption
#
https
#
security
#
cybersecurity
1
reaction
Comments
Add Comment
4 min read
Encrypt and Decrypt Data in Node.js using aes-256-cbc
Ugbem Job
Ugbem Job
Ugbem Job
Follow
Feb 2 '23
Encrypt and Decrypt Data in Node.js using aes-256-cbc
#
javascript
#
node
#
encryption
#
security
112
reactions
Comments
8
comments
6 min read
Secret Key Encryption with Go using AES
Bouchaala Reda
Bouchaala Reda
Bouchaala Reda
Follow
Jan 20 '23
Secret Key Encryption with Go using AES
#
go
#
security
#
cryptography
#
encryption
37
reactions
Comments
7
comments
6 min read
AWS SSM Automation for Encrypting RDS Instances
Dickson
Dickson
Dickson
Follow
for
AWS Community Builders
Jan 22 '23
AWS SSM Automation for Encrypting RDS Instances
#
aws
#
ssm
#
rds
#
encryption
5
reactions
Comments
Add Comment
7 min read
Encrypting files with #Vim
Eric F 🇺🇦
Eric F 🇺🇦
Eric F 🇺🇦
Follow
Jan 19 '23
Encrypting files with #Vim
#
vim
#
encryption
#
howto
Comments
Add Comment
2 min read
GOlang ile şifreleme işlemleri için crypto paketi
Ali Orhun Akkirman
Ali Orhun Akkirman
Ali Orhun Akkirman
Follow
for
Açıklab
Jan 14 '23
GOlang ile şifreleme işlemleri için crypto paketi
#
go
#
crypto
#
hash
#
encryption
9
reactions
Comments
Add Comment
3 min read
OpenBSD ディスク暗号化: パスフレーズを変更する
nabbisen
nabbisen
nabbisen
Follow
Jan 3 '23
OpenBSD ディスク暗号化: パスフレーズを変更する
#
openbsd
#
disk
#
encryption
#
password
1
reaction
Comments
Add Comment
1 min read
OpenBSD フルディスク暗号化 (on VirtualBox)
nabbisen
nabbisen
nabbisen
Follow
Jan 3 '23
OpenBSD フルディスク暗号化 (on VirtualBox)
#
openbsd
#
security
#
encryption
#
virtualbox
1
reaction
Comments
Add Comment
2 min read
OpenBSD Disk Encryption: Change passphrase
nabbisen
nabbisen
nabbisen
Follow
Jan 3 '23
OpenBSD Disk Encryption: Change passphrase
#
openbsd
#
disk
#
encryption
#
password
2
reactions
Comments
Add Comment
1 min read
How to Use Jasypt or Jce to Encrypt Passwords in Spring Config
Ed Legaspi
Ed Legaspi
Ed Legaspi
Follow
Dec 23 '22
How to Use Jasypt or Jce to Encrypt Passwords in Spring Config
#
jasypt
#
jce
#
spring
#
encryption
1
reaction
Comments
Add Comment
2 min read
OpenBSD Full Disk Encryption (on VirtualBox)
nabbisen
nabbisen
nabbisen
Follow
Dec 14 '22
OpenBSD Full Disk Encryption (on VirtualBox)
#
openbsd
#
security
#
encryption
#
virtualbox
1
reaction
Comments
Add Comment
4 min read
What is PKI Certificate? [A Detailed Guide]
Jessica howe
Jessica howe
Jessica howe
Follow
Nov 25 '22
What is PKI Certificate? [A Detailed Guide]
#
webdev
#
pki
#
encryption
7
reactions
Comments
Add Comment
4 min read
What is Asymmetric Encryption, and How Does It Work?
Jessica howe
Jessica howe
Jessica howe
Follow
Nov 21 '22
What is Asymmetric Encryption, and How Does It Work?
#
encryption
#
webdev
#
cybersecurity
#
programming
5
reactions
Comments
Add Comment
6 min read
When is data encrypted in your app?
Gavin Uhma
Gavin Uhma
Gavin Uhma
Follow
Nov 8 '22
When is data encrypted in your app?
#
discuss
#
security
#
keymanagement
#
encryption
8
reactions
Comments
Add Comment
1 min read
Security in The Cloud: Encryption On AWS (Part 1: KMS)
ChigozieCO
ChigozieCO
ChigozieCO
Follow
Oct 31 '22
Security in The Cloud: Encryption On AWS (Part 1: KMS)
#
security
#
encryption
#
cloudnative
#
aws
3
reactions
Comments
Add Comment
8 min read
Credit card chips and encryption in plain JavaScript
Isaac Lyman
Isaac Lyman
Isaac Lyman
Follow
Oct 25 '22
Credit card chips and encryption in plain JavaScript
#
javascript
#
encryption
#
finance
8
reactions
Comments
Add Comment
13 min read
Simple encrypted storage for python applications
Alexander Demin
Alexander Demin
Alexander Demin
Follow
Sep 23 '22
Simple encrypted storage for python applications
#
python
#
encryption
2
reactions
Comments
Add Comment
3 min read
How to encrypt data easily when your apps and databases are already running
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Sep 20 '22
How to encrypt data easily when your apps and databases are already running
#
security
#
cryptography
#
encryption
#
database
8
reactions
Comments
Add Comment
2 min read
How to build an end-to-end encrypted chat app in Next.js: Messages and encryption
Amarachi Iheanacho
Amarachi Iheanacho
Amarachi Iheanacho
Follow
for
Hackmamba
Aug 30 '22
How to build an end-to-end encrypted chat app in Next.js: Messages and encryption
#
javascript
#
appwrite
#
nextjs
#
encryption
14
reactions
Comments
4
comments
5 min read
Create RSA key using openssl
Goffity Corleone
Goffity Corleone
Goffity Corleone
Follow
Aug 24 '22
Create RSA key using openssl
#
openssl
#
encryption
Comments
Add Comment
2 min read
randomUUID in TypeScript
Jan Prazak
Jan Prazak
Jan Prazak
Follow
Jul 6 '22
randomUUID in TypeScript
#
typescript
#
hash
#
uuid
#
encryption
7
reactions
Comments
2
comments
1 min read
How to change user password to the weak forcedly on OpenBSD 7.1 (not recommended)
nabbisen
nabbisen
nabbisen
Follow
Jul 5 '22
How to change user password to the weak forcedly on OpenBSD 7.1 (not recommended)
#
openbsd
#
password
#
passwd
#
encryption
6
reactions
Comments
Add Comment
1 min read
Basics of Encryption: The Diffie-Hellman Key Exchange Explained
Simon Pfeiffer
Simon Pfeiffer
Simon Pfeiffer
Follow
for
Codesphere Inc.
Jun 29 '22
Basics of Encryption: The Diffie-Hellman Key Exchange Explained
#
encryption
#
algorithms
#
security
#
python
10
reactions
Comments
Add Comment
4 min read
Why is Data Security a Developer Service Problem?
Nathan Loding
Nathan Loding
Nathan Loding
Follow
for
Basis Theory
May 12 '22
Why is Data Security a Developer Service Problem?
#
security
#
datasecurity
#
encryption
6
reactions
Comments
Add Comment
5 min read
How to Secure Webhook Endpoints with HMAC
Bru Woodring
Bru Woodring
Bru Woodring
Follow
for
Prismatic
May 25 '22
How to Secure Webhook Endpoints with HMAC
#
hmac
#
integration
#
encryption
#
webhooks
10
reactions
Comments
Add Comment
5 min read
Simpler way to secure data with Ruby and Basis Theory
Nathan Loding
Nathan Loding
Nathan Loding
Follow
for
Basis Theory
May 18 '22
Simpler way to secure data with Ruby and Basis Theory
#
ruby
#
encryption
#
security
#
tokenization
4
reactions
Comments
Add Comment
3 min read
Encryption in ⛅ cloud native apps
Cossack Labs
Cossack Labs
Cossack Labs
Follow
May 12 '22
Encryption in ⛅ cloud native apps
#
cloudnative
#
encryption
#
cryptography
#
appsec
12
reactions
Comments
Add Comment
3 min read
FaceSign
geniuscodes
geniuscodes
geniuscodes
Follow
Mar 24 '22
FaceSign
#
encryption
#
digitalsigniture
#
productivity
#
devops
6
reactions
Comments
Add Comment
1 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 20 '22
How we implemented encryption and data masking for 60+ apps in 12 weeks
#
security
#
encryption
#
casestudy
#
opensource
13
reactions
Comments
Add Comment
3 min read
Acra. Features: Integrate data protection that fits your architecture
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 13 '22
Acra. Features: Integrate data protection that fits your architecture
#
cryptography
#
security
#
database
#
encryption
9
reactions
Comments
1
comment
2 min read
Encrypting Attached EBS Volumes
Adrian Mudzwiti
Adrian Mudzwiti
Adrian Mudzwiti
Follow
for
AWS Community Builders
Apr 12 '22
Encrypting Attached EBS Volumes
#
aws
#
ec2
#
encryption
#
security
10
reactions
Comments
Add Comment
3 min read
Acra. Features: Security events automation
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Apr 6 '22
Acra. Features: Security events automation
#
cryptography
#
security
#
database
#
encryption
9
reactions
Comments
Add Comment
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Mar 31 '22
Acra. Features: Logging, audit logging and crypto-signed audit logs
#
cryptography
#
security
#
encryption
#
database
9
reactions
Comments
Add Comment
2 min read
Asymmetric Encryption In PHP
Khokon M.
Khokon M.
Khokon M.
Follow
Mar 19 '22
Asymmetric Encryption In PHP
#
php
#
security
#
encryption
#
beginners
10
reactions
Comments
1
comment
2 min read
2 free data security tools every dev should know (and use)
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Mar 18 '22
2 free data security tools every dev should know (and use)
#
security
#
appsec
#
encryption
#
opensource
13
reactions
Comments
3
comments
2 min read
What is the difference between encryption, hashing and salting?
Rodrigo Kamada
Rodrigo Kamada
Rodrigo Kamada
Follow
Feb 26 '22
What is the difference between encryption, hashing and salting?
#
encryption
#
hashing
#
salting
#
security
31
reactions
Comments
4
comments
6 min read
Acra. Features: Database request firewall
Cossack Labs
Cossack Labs
Cossack Labs
Follow
Feb 23 '22
Acra. Features: Database request firewall
#
cryptography
#
security
#
encryption
#
database
5
reactions
Comments
Add Comment
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io
Sander Goossens
Sander Goossens
Sander Goossens
Follow
for
In The Pocket
Feb 23 '22
Creating an end-to-end encrypted chat with GetStream.io and seald.io
#
encryption
#
reactnative
#
security
15
reactions
Comments
Add Comment
8 min read
SHA-256 Encryption - VSCode to GitHub
Jason Cruz
Jason Cruz
Jason Cruz
Follow
Feb 22 '22
SHA-256 Encryption - VSCode to GitHub
#
opensource
#
encryption
#
windows10
#
gitub
5
reactions
Comments
1
comment
8 min read
Implementing a safe and sound API Key authorization middleware in Go
Caio Ferreira
Caio Ferreira
Caio Ferreira
Follow
Feb 8 '22
Implementing a safe and sound API Key authorization middleware in Go
#
go
#
security
#
timingattack
#
encryption
13
reactions
Comments
1
comment
8 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account