Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux
Ali
Ali
Ali
Follow
Oct 29 '24
How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux
#
linux
#
encryption
#
ubuntu
#
opensource
9
reactions
Comments
Add Comment
2 min read
Essential SQL Database Security Practices to Protect Your Data
MD ARIFUL HAQUE
MD ARIFUL HAQUE
MD ARIFUL HAQUE
Follow
Oct 29 '24
Essential SQL Database Security Practices to Protect Your Data
#
sql
#
security
#
encryption
#
database
Comments
Add Comment
4 min read
Protecting Algorithms in Dart: A Multi-Layered Approach
Harsh Bangari Rawat
Harsh Bangari Rawat
Harsh Bangari Rawat
Follow
Oct 28 '24
Protecting Algorithms in Dart: A Multi-Layered Approach
#
algorithms
#
protection
#
dart
#
encryption
2
reactions
Comments
Add Comment
3 min read
PGP: Pretty Good Privacy
Henry Korir
Henry Korir
Henry Korir
Follow
Sep 20 '24
PGP: Pretty Good Privacy
#
pgp
#
encryption
#
prettygoodprivacy
#
privacy
1
reaction
Comments
Add Comment
2 min read
Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 17 '24
Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges
#
homomorphic
#
encryption
Comments
Add Comment
8 min read
Secure Your AWS Applications with SSL/TLS Encryption
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Sep 12 '24
Secure Your AWS Applications with SSL/TLS Encryption
#
ssl
#
tls
#
aws
#
encryption
Comments
Add Comment
3 min read
WEP Encryption: The Theory Behind Network Security
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 16 '24
WEP Encryption: The Theory Behind Network Security
#
networking
#
encryption
#
cybersecurity
#
wep
3
reactions
Comments
Add Comment
4 min read
Implementing a Caesar Cipher Program in Python
Emmanuel Kariithi
Emmanuel Kariithi
Emmanuel Kariithi
Follow
Oct 7 '24
Implementing a Caesar Cipher Program in Python
#
cybersecurity
#
python
#
encryption
3
reactions
Comments
Add Comment
4 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Sep 3 '24
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
#
security
#
dataengineering
#
encryption
#
infosec
1
reaction
Comments
Add Comment
5 min read
How to Generate Self-signed Certificate in CentOS 7
Nada Ahmed
Nada Ahmed
Nada Ahmed
Follow
Oct 2 '24
How to Generate Self-signed Certificate in CentOS 7
#
linux
#
openssl
#
centos
#
encryption
3
reactions
Comments
Add Comment
3 min read
Encryption & Decryption Using RSA
Abishek G.C
Abishek G.C
Abishek G.C
Follow
Aug 27 '24
Encryption & Decryption Using RSA
#
encryption
#
decryption
#
rsa
Comments
Add Comment
4 min read
Introduction to Wickr and End-to-End Encryption
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Sep 18 '24
Introduction to Wickr and End-to-End Encryption
#
wickr
#
endtoend
#
encryption
1
reaction
Comments
Add Comment
3 min read
Data Security Strategy Beyond Access Control: Data Encryption
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Aug 29 '24
Data Security Strategy Beyond Access Control: Data Encryption
#
security
#
dataengineering
#
encryption
#
infosec
2
reactions
Comments
Add Comment
5 min read
SQS encryption options
Pubudu Jayawardana
Pubudu Jayawardana
Pubudu Jayawardana
Follow
for
AWS Community Builders
Sep 4 '24
SQS encryption options
#
aws
#
serverless
#
sqs
#
encryption
3
reactions
Comments
Add Comment
3 min read
Cybersecurity: The Importance of The Human Element
Amr Saafan
Amr Saafan
Amr Saafan
Follow
for
Nile Bits
Jul 10 '24
Cybersecurity: The Importance of The Human Element
#
cybersecurity
#
algorithms
#
encryption
#
programming
Comments
Add Comment
12 min read
Jasypt CLI tools for encryption and decryption
Hafiz Jaafar
Hafiz Jaafar
Hafiz Jaafar
Follow
Aug 9 '24
Jasypt CLI tools for encryption and decryption
#
encryption
#
secrets
#
cipher
5
reactions
Comments
Add Comment
2 min read
Secure Data and Safeguard Users an App With End-to-End Encryption
Amos Gyamfi
Amos Gyamfi
Amos Gyamfi
Follow
Aug 7 '24
Secure Data and Safeguard Users an App With End-to-End Encryption
#
encryption
#
data
#
safety
#
security
Comments
Add Comment
9 min read
🚀 MongoDB 7.0: The Latest and Greatest!
Danny Chan
Danny Chan
Danny Chan
Follow
for
MongoDB Builders
Aug 5 '24
🚀 MongoDB 7.0: The Latest and Greatest!
#
mongodb
#
encryption
#
systemdesign
#
nosql
5
reactions
Comments
Add Comment
1 min read
🚀 MongoDB 7.0:最新功能特点
Danny Chan
Danny Chan
Danny Chan
Follow
for
MongoDB Builders
Aug 5 '24
🚀 MongoDB 7.0:最新功能特点
#
mongodb
#
encryption
#
nosql
#
systemdesign
5
reactions
Comments
Add Comment
1 min read
How Data Encryption Can Simplify Infrastructure Architecture
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Jul 31 '24
How Data Encryption Can Simplify Infrastructure Architecture
#
data
#
security
#
architecture
#
encryption
1
reaction
Comments
Add Comment
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Jul 28 '24
The Data Security Duo: Data Encryption and Vulnerability Scans
#
security
#
data
#
encryption
#
vulnerabilities
1
reaction
Comments
Add Comment
5 min read
Preventing Weak Cryptography in JavaScript
Rigal Patel
Rigal Patel
Rigal Patel
Follow
Jul 26 '24
Preventing Weak Cryptography in JavaScript
#
javascript
#
websecurity
#
cryptography
#
encryption
Comments
Add Comment
3 min read
Hitchhikers guide to building a distributed filesystem in Rust. The very beginning…
Radu Marias
Radu Marias
Radu Marias
Follow
Jul 25 '24
Hitchhikers guide to building a distributed filesystem in Rust. The very beginning…
#
distributedsystems
#
filesystem
#
bittorrent
#
encryption
1
reaction
Comments
Add Comment
7 min read
How to Enhance File Security: Three Key Measures for Your Business
Jeffrey Boyle
Jeffrey Boyle
Jeffrey Boyle
Follow
Jun 21 '24
How to Enhance File Security: Three Key Measures for Your Business
#
encryption
#
securitymanagement
#
riskassessment
#
cybersecurity
Comments
Add Comment
2 min read
Cryptomator: end-to-end encrypt files in any cloud
Andrea Grandi
Andrea Grandi
Andrea Grandi
Follow
Jul 13 '24
Cryptomator: end-to-end encrypt files in any cloud
#
cryptomator
#
encryption
#
cloud
#
privacy
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account