DEV Community

loading...

# encryption

👋 Sign in for the ability sort posts by top and latest.
Five facts about security to know in 2021

Five facts about security to know in 2021

Reactions 3
3 min read
Signing Git commits with GPG keys that use modern encryption

Signing Git commits with GPG keys that use modern encryption

Reactions 9
3 min read
Stop using the environment variables for sensitive keys in Rails

Stop using the environment variables for sensitive keys in Rails

Reactions 4
4 min read
Application level encryption for software architects: everything you need to know

Application level encryption for software architects: everything you need to know

Reactions 5
2 min read
Automatic Laravel Data Encryption with Eloquent

Automatic Laravel Data Encryption with Eloquent

Reactions 19 Comments 4
2 min read
Introducing A Free and Comprehensive Encrypt and Decrypt Open Source Tools - EncryptLab - EN

Introducing A Free and Comprehensive Encrypt and Decrypt Open Source Tools - EncryptLab - EN

Reactions 7
2 min read
Strongly encrypted html page

Strongly encrypted html page

Reactions 7 Comments 1
1 min read
Memperkenalkan Open Source Tools Enkripsi dan Deskripsi Terlengkap - EncryptLab - ID

Memperkenalkan Open Source Tools Enkripsi dan Deskripsi Terlengkap - EncryptLab - ID

Reactions 6
2 min read
Perl is dead simple with CBC Block Encryption

Perl is dead simple with CBC Block Encryption

Reactions 2 Comments 2
3 min read
Understanding HTTPS/TLS

Understanding HTTPS/TLS

Reactions 7
2 min read
Envelope Encryption using AWS CLI

Envelope Encryption using AWS CLI

Reactions 5
3 min read
AWS KMS Envelope Encryption

AWS KMS Envelope Encryption

Reactions 6
2 min read
Encryption and Hashing

Encryption and Hashing

Reactions 2
1 min read
Encryption as a Service in Action

Encryption as a Service in Action

Reactions 7
5 min read
Bringing Your (Encryption) Keys to Multi/Hybrid Clouds

Bringing Your (Encryption) Keys to Multi/Hybrid Clouds

Reactions 26
9 min read
Revolutionizing Data Security by Design

Revolutionizing Data Security by Design

Reactions 5
8 min read
How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

How to encrypt database fields transparently for your app using Acra and DigitalOcean managed PostgreSQL

Reactions 9
11 min read
✨How to Run Secure Search over Encrypted Data

✨How to Run Secure Search over Encrypted Data

Reactions 9
4 min read
How's modern encryption like?

How's modern encryption like?

Reactions 11 Comments 2
2 min read
Java Socket based chat application with SHA-1 hash encryption

Java Socket based chat application with SHA-1 hash encryption

Reactions 5
1 min read
Understanding Hacking 101...

Understanding Hacking 101...

Reactions 53 Comments 8
3 min read
As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

As ameaças à criptografia ponta-a-ponta (end-to-end encryption)

Reactions 2
3 min read
Generating Random Password in Python - Practical Guide

Generating Random Password in Python - Practical Guide

Reactions 12 Comments 2
7 min read
Secure Ninja Forms in Wordpress

Secure Ninja Forms in Wordpress

Reactions 6
7 min read
#Hash Vs Encryption?

#Hash Vs Encryption?

Reactions 14 Comments 1
3 min read
PGP Subkeys for Keybase

PGP Subkeys for Keybase

Reactions 5
3 min read
Where to use encryption 🤔

Where to use encryption 🤔

Reactions 8 Comments 2
1 min read
Use strong encryption and hashing algorithms in Java

Use strong encryption and hashing algorithms in Java

Reactions 15 Comments 3
2 min read
KeePass: SSH keys passwords storage and decryption on Linux

KeePass: SSH keys passwords storage and decryption on Linux

Reactions 16
4 min read
What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

What is: Linux keyring, gnome-keyring, Secret Service, and D-Bus

Reactions 17 Comments 1
22 min read
Signing Your Work as a Developer

Signing Your Work as a Developer

Reactions 6
4 min read
Encrypted Contact Form in Vue

Encrypted Contact Form in Vue

Reactions 8 Comments 2
5 min read
How to Share Google Docs Securely with a Google Apps Script

How to Share Google Docs Securely with a Google Apps Script

Reactions 7
9 min read
How to encrypt a string in Java using RSA and decrypt it in Python

How to encrypt a string in Java using RSA and decrypt it in Python

Reactions 9
2 min read
Introducing Certera

Introducing Certera

Reactions 8
4 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

Reactions 12
5 min read
Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Building HIPAA Compliant End-to-End Encrypted Chat with Stream React Chat and Virgil Security

Reactions 25 Comments 1
9 min read
Initramfs: Dropping to a Shell

Initramfs: Dropping to a Shell

Reactions 5
4 min read
Today I Was Confused — AES/CBC/PKCS5PADDING

Today I Was Confused — AES/CBC/PKCS5PADDING

Reactions 5
3 min read
(Very) Basic Intro to the Scrypt Hash

(Very) Basic Intro to the Scrypt Hash

Reactions 7
3 min read
Encryption and Decryption with Python Azure Functions

Encryption and Decryption with Python Azure Functions

Reactions 6
6 min read
How to Securely Store a Password in Java

How to Securely Store a Password in Java

Reactions 103 Comments 18
11 min read
Encrypting Files in a Post-PGP Age

Encrypting Files in a Post-PGP Age

Reactions 24 Comments 3
5 min read
Simple and secure email sending

Simple and secure email sending

Reactions 12
3 min read
How to securely store API keys

How to securely store API keys

Reactions 199 Comments 28
5 min read
Using end2end encryption for ensuring mobile app security and data privacy

Using end2end encryption for ensuring mobile app security and data privacy

Reactions 20 Comments 2
2 min read
How to use SSL in PostgreSQL The Right Way: Encrypt Your Data in Transit

How to use SSL in PostgreSQL The Right Way: Encrypt Your Data in Transit

Reactions 4
1 min read
(Very) Basic Intro to PGP (GPG)

(Very) Basic Intro to PGP (GPG)

Reactions 6
4 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

Reactions 40 Comments 2
9 min read
Why anti-encryption laws are crazy

Why anti-encryption laws are crazy

Reactions 68 Comments 8
4 min read
"Using the Vigenère Cipher to Encrypt a Message with Javascript"

"Using the Vigenère Cipher to Encrypt a Message with Javascript"

Reactions 14 Comments 7
5 min read
Hashing your Data in Deno Using Bcrypt

Hashing your Data in Deno Using Bcrypt

Reactions 2
2 min read
Mounting a second encrypted hard drive automatically under Debian or Ubuntu

Mounting a second encrypted hard drive automatically under Debian or Ubuntu

Reactions 2
2 min read
Using a Vigenere Cipher to Encrypt Text

Using a Vigenere Cipher to Encrypt Text

Reactions 2
6 min read
Will Banning Cryptography Keep the Country Safe?

Will Banning Cryptography Keep the Country Safe?

Reactions 11
3 min read
Oracle TDE

Oracle TDE

Reactions 4
1 min read
Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

Encrypt Data With Asymmetric AWS KMS in 5 minutes or less

Reactions 9
4 min read
Secrypto

Secrypto

Reactions 12
1 min read
Auto-mounting encrypted drives with a remote key on Linux

Auto-mounting encrypted drives with a remote key on Linux

Reactions 6
8 min read
The risk of unprotected private keys (orbjet.org)

The risk of unprotected private keys (orbjet.org)

Reactions 4
1 min read
loading...