DEV Community

# encryption

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Text Encryption and Decryption with Vanilla JavaScript

Secure Text Encryption and Decryption with Vanilla JavaScript

1
Comments
3 min read
Unveiling A Groundbreaking Open-Source Encrypted Machine Learning Framework

Unveiling A Groundbreaking Open-Source Encrypted Machine Learning Framework

9
Comments 2
3 min read
What is RSA Asymmetric Encryption? Basics, Principles and Applications

What is RSA Asymmetric Encryption? Basics, Principles and Applications

Comments
2 min read
Laravel Data Encryption and Decryption

Laravel Data Encryption and Decryption

Comments
3 min read
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Comments
6 min read
Implications for Encryption and Cybersecurity with Quantum Computing

Implications for Encryption and Cybersecurity with Quantum Computing

Comments
4 min read
How to Generate Your Own Public and Secret Keys for PGP Encryption

How to Generate Your Own Public and Secret Keys for PGP Encryption

7
Comments
6 min read
Does S/MIME Encrypt Emails and Attachments?

Does S/MIME Encrypt Emails and Attachments?

1
Comments
3 min read
Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges

Understanding Homomorphic Encryption: Enabling Secure Data Processing and Addressing Practical Challenges

Comments
8 min read
What is Token Signing in Software Publisher Certificate?

What is Token Signing in Software Publisher Certificate?

Comments
3 min read
Encryption Symmetric

Encryption Symmetric

Comments
3 min read
Secret management for the layman

Secret management for the layman

4
Comments
4 min read
Comprehensive Encryption and Security Service in NestJS: Argon2 Hashing, Token Generation, and AES Encryption

Comprehensive Encryption and Security Service in NestJS: Argon2 Hashing, Token Generation, and AES Encryption

1
Comments
4 min read
Difference Between Encryption and Hashing 🔐🔑

Difference Between Encryption and Hashing 🔐🔑

2
Comments
2 min read
Ransomware Explained: How It Works and Best Defense Mechanisms to Protect Your Data

Ransomware Explained: How It Works and Best Defense Mechanisms to Protect Your Data

Comments 1
5 min read
Debunking Most Common Cloud Computing Myths & Misconceptions

Debunking Most Common Cloud Computing Myths & Misconceptions

Comments
7 min read
Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Comments 2
5 min read
How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux

How to Encrypt a USB drive Using Cryptsetup with LUKS on Linux

8
Comments
2 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
Protecting Algorithms in Dart: A Multi-Layered Approach

Protecting Algorithms in Dart: A Multi-Layered Approach

2
Comments
3 min read
PGP: Pretty Good Privacy

PGP: Pretty Good Privacy

1
Comments
2 min read
Secure Your AWS Applications with SSL/TLS Encryption

Secure Your AWS Applications with SSL/TLS Encryption

Comments
3 min read
WEP Encryption: The Theory Behind Network Security

WEP Encryption: The Theory Behind Network Security

1
Comments
4 min read
Implementing a Caesar Cipher Program in Python

Implementing a Caesar Cipher Program in Python

2
Comments
4 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

1
Comments
5 min read
How to Generate Self-signed Certificate in CentOS 7

How to Generate Self-signed Certificate in CentOS 7

3
Comments
3 min read
Encryption & Decryption Using RSA

Encryption & Decryption Using RSA

Comments
4 min read
Introduction to Wickr and End-to-End Encryption

Introduction to Wickr and End-to-End Encryption

Comments
3 min read
Data Security Strategy Beyond Access Control: Data Encryption

Data Security Strategy Beyond Access Control: Data Encryption

2
Comments
5 min read
SQS encryption options

SQS encryption options

3
Comments
3 min read
Cybersecurity: The Importance of The Human Element

Cybersecurity: The Importance of The Human Element

Comments
12 min read
Jasypt CLI tools for encryption and decryption

Jasypt CLI tools for encryption and decryption

3
Comments
2 min read
Secure Data and Safeguard Users an App With End-to-End Encryption

Secure Data and Safeguard Users an App With End-to-End Encryption

Comments
9 min read
🚀 MongoDB 7.0: The Latest and Greatest!

🚀 MongoDB 7.0: The Latest and Greatest!

5
Comments
1 min read
🚀 MongoDB 7.0:最新功能特点

🚀 MongoDB 7.0:最新功能特点

5
Comments
1 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans

The Data Security Duo: Data Encryption and Vulnerability Scans

1
Comments
5 min read
Preventing Weak Cryptography in JavaScript

Preventing Weak Cryptography in JavaScript

Comments
3 min read
Hitchhikers guide to building a distributed filesystem in Rust. The very beginning…

Hitchhikers guide to building a distributed filesystem in Rust. The very beginning…

1
Comments
7 min read
How to Enhance File Security: Three Key Measures for Your Business

How to Enhance File Security: Three Key Measures for Your Business

Comments
2 min read
Cryptomator: end-to-end encrypt files in any cloud

Cryptomator: end-to-end encrypt files in any cloud

Comments
1 min read
La Criptografia en l'Era de la ComputaciĂł QuĂ ntica i de la IA

La Criptografia en l'Era de la ComputaciĂł QuĂ ntica i de la IA

Comments
3 min read
Bridging the Gap: Cross-Language Encryption and Decryption between Node.js and Go

Bridging the Gap: Cross-Language Encryption and Decryption between Node.js and Go

2
Comments 1
4 min read
Terraform, OpenTofu e criptografia de estado

Terraform, OpenTofu e criptografia de estado

9
Comments
6 min read
How to encrypt disks in GCP?

How to encrypt disks in GCP?

Comments
2 min read
Understanding RSA Algorithm

Understanding RSA Algorithm

Comments
5 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Training on encrypted data, Order preserving encryption vs Homomorphic vs other methods

Training on encrypted data, Order preserving encryption vs Homomorphic vs other methods

Comments
1 min read
How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

11
Comments
3 min read
The core of WhatApp and Signal: Diffie-Hellman key exchange

The core of WhatApp and Signal: Diffie-Hellman key exchange

Comments
3 min read
Storing and Handling Confidential Data in ClickHouse

Storing and Handling Confidential Data in ClickHouse

14
Comments 2
3 min read
Database Encryption: Secure Your Data with Best Practices

Database Encryption: Secure Your Data with Best Practices

1
Comments
1 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

8
Comments
6 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
Apple Announces PQ3

Apple Announces PQ3

1
Comments
1 min read
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1

Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 1

3
Comments
5 min read
What is BitLocker: A Device Management Outlook

What is BitLocker: A Device Management Outlook

Comments
2 min read
10 Best Cloud Storage Providers of 2024

10 Best Cloud Storage Providers of 2024

4
Comments
9 min read
Encryption vs Hashing 🤔 Lets decode

Encryption vs Hashing 🤔 Lets decode

Comments
3 min read
Understanding Wireless Router Encryption: TKIP, AES, and TKIP&AES

Understanding Wireless Router Encryption: TKIP, AES, and TKIP&AES

1
Comments
2 min read
loading...