Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
encryption
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Secret management for the layman
Santiago
Santiago
Santiago
Follow
Nov 16 '24
Secret management for the layman
#
secrets
#
age
#
encryption
#
devops
2
 reactions
Comments
Add Comment
4 min read
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication
eXpLorE wItH mE
eXpLorE wItH mE
eXpLorE wItH mE
Follow
Nov 12 '24
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication
#
encryption
#
security
#
ssl
#
secureweb
Comments
Add Comment
6 min read
Comprehensive Encryption and Security Service in NestJS: Argon2 Hashing, Token Generation, and AES Encryption
ZèD
ZèD
ZèD
Follow
Nov 11 '24
Comprehensive Encryption and Security Service in NestJS: Argon2 Hashing, Token Generation, and AES Encryption
#
nestjs
#
argon2
#
aes
#
encryption
1
 reaction
Comments
Add Comment
4 min read
Difference Between Encryption and Hashing đđ
Hossam Gouda
Hossam Gouda
Hossam Gouda
Follow
Nov 8 '24
Difference Between Encryption and Hashing đđ
#
cybersecurity
#
dataprotection
#
encryption
#
hashing
2
 reactions
Comments
Add Comment
2 min read
Ransomware Explained: How It Works and Best Defense Mechanisms to Protect Your Data
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 9 '24
Ransomware Explained: How It Works and Best Defense Mechanisms to Protect Your Data
#
ransomware
#
encryption
Comments
1
 comment
5 min read
How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux
Ali
Ali
Ali
Follow
Oct 29 '24
How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux
#
linux
#
encryption
#
ubuntu
#
opensource
10
 reactions
Comments
Add Comment
2 min read
Essential SQL Database Security Practices to Protect Your Data
MD ARIFUL HAQUE
MD ARIFUL HAQUE
MD ARIFUL HAQUE
Follow
Oct 29 '24
Essential SQL Database Security Practices to Protect Your Data
#
sql
#
security
#
encryption
#
database
Comments
Add Comment
4 min read
Protecting Algorithms in Dart: A Multi-Layered Approach
Harsh Bangari Rawat
Harsh Bangari Rawat
Harsh Bangari Rawat
Follow
Oct 28 '24
Protecting Algorithms in Dart: A Multi-Layered Approach
#
algorithms
#
protection
#
dart
#
encryption
6
 reactions
Comments
Add Comment
3 min read
PGP: Pretty Good Privacy
Henry Korir
Henry Korir
Henry Korir
Follow
Sep 20 '24
PGP: Pretty Good Privacy
#
pgp
#
encryption
#
prettygoodprivacy
#
privacy
1
 reaction
Comments
Add Comment
2 min read
Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 17 '24
Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges
#
homomorphic
#
encryption
Comments
Add Comment
8 min read
Implementing a Caesar Cipher Program in Python
Emmanuel Kariithi
Emmanuel Kariithi
Emmanuel Kariithi
Follow
Oct 7 '24
Implementing a Caesar Cipher Program in Python
#
cybersecurity
#
python
#
encryption
4
 reactions
Comments
Add Comment
4 min read
How to Generate Self-signed Certificate in CentOS 7
Nada Ahmed
Nada Ahmed
Nada Ahmed
Follow
Oct 2 '24
How to Generate Self-signed Certificate in CentOS 7
#
linux
#
openssl
#
centos
#
encryption
4
 reactions
Comments
Add Comment
3 min read
Encryption & Decryption Using RSA
Abishek G.C
Abishek G.C
Abishek G.C
Follow
Aug 27 '24
Encryption & Decryption Using RSA
#
encryption
#
decryption
#
rsa
Comments
Add Comment
4 min read
Introduction to Wickr and End-to-End Encryption
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Sep 18 '24
Introduction to Wickr and End-to-End Encryption
#
wickr
#
endtoend
#
encryption
1
 reaction
Comments
Add Comment
3 min read
Data Security Strategy Beyond Access Control: Data Encryption
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Aug 29 '24
Data Security Strategy Beyond Access Control: Data Encryption
#
security
#
dataengineering
#
encryption
#
infosec
2
 reactions
Comments
Add Comment
5 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account