DEV Community

# encryption

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure Webhook Endpoints with HMAC

How to Secure Webhook Endpoints with HMAC

Reactions 4 Comments
5 min read
Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

Reactions 6 Comments
5 min read
Simpler way to secure data with Ruby and Basis Theory

Simpler way to secure data with Ruby and Basis Theory

Reactions 6 Comments
3 min read
Encryption in ‚õÖ cloud native apps

Encryption in ‚õÖ cloud native apps

Reactions 11 Comments
3 min read
Cryptography for beginners

Cryptography for beginners

Reactions 9 Comments
5 min read
FaceSign

FaceSign

Reactions 6 Comments
1 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

Reactions 15 Comments
3 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

Reactions 11 Comments
2 min read
Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

Reactions 10 Comments
3 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

Reactions 11 Comments
2 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

Reactions 11 Comments
2 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

Reactions 7 Comments
2 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

Reactions 15 Comments
2 min read
What is the difference between encryption, hashing and salting?

What is the difference between encryption, hashing and salting?

Reactions 18 Comments 2
6 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

Reactions 7 Comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

Reactions 14 Comments
8 min read
SHA-256 Encryption - VSCode to GitHub

SHA-256 Encryption - VSCode to GitHub

Reactions 5 Comments
8 min read
Implementing a safe and sound API Key authorization middleware in Go

Implementing a safe and sound API Key authorization middleware in Go

Reactions 5 Comments
8 min read
CMK Encryption for Azure Storage Accounts

CMK Encryption for Azure Storage Accounts

Reactions 2 Comments
3 min read
CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

CryptoPals Crypto Challenges Using Rust: Implement CBC Mode

Reactions 2 Comments
3 min read
Acra. Features: Authentication

Acra. Features: Authentication

Reactions 9 Comments
1 min read
Acra. Features: Tokenization

Acra. Features: Tokenization

Reactions 10 Comments
1 min read
OCSP and CRL: what could go wrong?

OCSP and CRL: what could go wrong?

Reactions 14 Comments
3 min read
Hashing, Explain it to me like I'm 5.

Hashing, Explain it to me like I'm 5.

Reactions 4 Comments
1 min read
RDS Encryption and Security

RDS Encryption and Security

Reactions 4 Comments
2 min read
Acra. Features: Data masking

Acra. Features: Data masking

Reactions 10 Comments
1 min read
Acra. Features: Searchable encryption

Acra. Features: Searchable encryption

Reactions 10 Comments
2 min read
Acra. Features: Application-level encryption

Acra. Features: Application-level encryption

Reactions 10 Comments
3 min read
Password Encryption with Hash Function in Python

Password Encryption with Hash Function in Python

Reactions 7 Comments
2 min read
How To Manage Encryption at Scale?

How To Manage Encryption at Scale?

Reactions 2 Comments
6 min read
Application-Layer Encryption Defined

Application-Layer Encryption Defined

Reactions 3 Comments
4 min read
Encryption & decryption for r0@drunner$

Encryption & decryption for r0@drunner$

Reactions 12 Comments
3 min read
JS practice: day2 - password decoder

JS practice: day2 - password decoder

Reactions 3 Comments
1 min read
UDP Socket manager for go server-side

UDP Socket manager for go server-side

Reactions 6 Comments
5 min read
Encrypt your crucial data into Image file

Encrypt your crucial data into Image file

Reactions 5 Comments 1
1 min read
Asymetric RSA encryption/decryption of your clipboard

Asymetric RSA encryption/decryption of your clipboard

Reactions 2 Comments
2 min read
Encryption is important

Encryption is important

Reactions 7 Comments
3 min read
Encrypt and Decrypt in NodeJS

Encrypt and Decrypt in NodeJS

Reactions 2 Comments
1 min read
Encryption without passwords

Encryption without passwords

Reactions 13 Comments
6 min read
All about HTTPS (part-2)

All about HTTPS (part-2)

Reactions 8 Comments
3 min read
Configure SSL between RDS and Weblogic / DMS endpoint

Configure SSL between RDS and Weblogic / DMS endpoint

Reactions 2 Comments
1 min read
RSA in .NET

RSA in .NET

Reactions 4 Comments
1 min read
How did we create a private messenger with E2E encryption?

How did we create a private messenger with E2E encryption?

Reactions 9 Comments 3
3 min read
Hashing vs Encryption

Hashing vs Encryption

Reactions 2 Comments 1
1 min read
HTTPS

HTTPS

Reactions 2 Comments 1
4 min read
When to use Customer Managed KMS CMKs?

When to use Customer Managed KMS CMKs?

Reactions 4 Comments
3 min read
E2EE and privacy in mobile messengers, by @vixentael 02:32

E2EE and privacy in mobile messengers, by @vixentael

Reactions 11 Comments
1 min read
Complicated encryption ways explained in 2 min, by @vixentael 02:31

Complicated encryption ways explained in 2 min, by @vixentael

Reactions 14 Comments
1 min read
Server Authentication With Client Certificate X.509

Server Authentication With Client Certificate X.509

Reactions 5 Comments
2 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

Reactions 6 Comments
1 min read
Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Reactions 5 Comments
6 min read
JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

JWT Authentication with Asymmetric Encryption using certificates in ASP.NET Core

Reactions 7 Comments 7
8 min read
JWT Authentication with Symmetric Encryption in ASP.NET Core

JWT Authentication with Symmetric Encryption in ASP.NET Core

Reactions 15 Comments 1
9 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

Reactions 9 Comments
1 min read
Tor - The Onion Router

Tor - The Onion Router

Reactions 11 Comments 1
2 min read
Getting started with GPG(GnuPG)

Getting started with GPG(GnuPG)

Reactions 6 Comments 3
2 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

Reactions 9 Comments
2 min read
Fullstack AES-GCM encryption-decryption in node.js and the client-side

Fullstack AES-GCM encryption-decryption in node.js and the client-side

Reactions 6 Comments
2 min read
How TLS and HTTPS Work - Plus a Handful of Useful Tools

How TLS and HTTPS Work - Plus a Handful of Useful Tools

Reactions 4 Comments
1 min read
Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

Reactions 9 Comments
5 min read
loading...