Related resources for Hashing
  • A Comprehensive Guide to Secure Coding in C#4/16/2024 10:56:29 AM. A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
  • Best Practices for Maintaining Security and Preventing Vulnerabilities in C#4/9/2024 5:54:03 PM. Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
  • Generate Random Password in ASP.NET4/3/2024 10:46:55 AM. Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
  • Hashing Password With Bcrypt In Node4/3/2024 9:36:34 AM. Learn how to use bcryptjs library for hashing and comparing passwords in a Node.js application. Build a simple API for user registration and login, ensuring password security through bcrypt hashing. U
  • Make Password Hash In ASP.NET Using C#4/3/2024 9:07:42 AM. Learn how to enhance security in your ASP.NET applications by implementing password hashing using C#. This tutorial guides you through the process of creating hashed passwords, ensuring better protect
  • Learn About Data Structures And Algorithm (DSA) - Part Four3/21/2024 9:28:01 AM. This article will tell you about the crucial concepts of data structures and algorithms in terms of understanding the comparison between the array and linked list. This article is the fourth one in th
  • Hashing Techniques in Data Structures and Algorithms3/21/2024 9:02:33 AM. Hashing in data structures utilizes hash functions to map arbitrary-sized data to fixed-size values, enabling efficient storage and retrieval within large datasets commonly employed in hash tables and
  • Understanding the One-Way Nature of HASHBYTES in SQL1/5/2024 10:48:17 AM. This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
  • Secure Password Hashing with SHA-256 and Salt in Python12/7/2023 5:46:50 AM. In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
  • Compute SHA256 Hash In C#10/9/2023 6:38:21 AM. How to compute SHA256 Hash in C#. Hashing (also known as hash functions) in cryptography is a process of mapping a binary string of an arbitrary length to a small binary string of a fixed length, know
  • C# Security: Best Practices for Secure Coding8/31/2023 5:05:34 PM. In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
  • Activation Link Vulnerability8/24/2023 9:15:31 AM. Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
  • Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate6/19/2023 7:06:18 AM. Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
  • Working With HashMap Class in Java9/13/2019 1:50:00 AM. In this article, we are going to describe the HasMap Class's functionality in Java.
  • What Is Hash Function6/17/2019 1:16:45 AM. In this article, we will learn about the hash function and its properties– we will also see how the hash function is useful in the blockchain.
  • Hashing In ASP.NET Core 2.01/9/2018 10:41:29 AM. The new Data Protection API in .NET Core includes functionality to create hashes using PBKDF2algorithm. ASP.NET Core uses this behind the scenes in PasswordHasher class, which is used in ASP.NET Core
  • Sensitive Data Exposure And Its Securing Techniques7/7/2016 11:56:35 AM. In this article you will learn about sensitive data exposure and its securing techniques.
  • Hashing Passwords In .NET Core With Tips6/8/2016 12:11:08 AM. In this article you will learn about how to hash passwords in .NET Core with tips.
  • Theory Of Hashing And Hash Tables6/3/2016 1:47:40 PM. In this article, you will learn different things about Hashing and Hash Tables.
  • Password Encryption Using Salt Hashing In ASP.NET MVC12/11/2015 12:53:19 AM. This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
  • Introduction To Hashing and the HashTable Class: Part 35/18/2015 2:18:55 PM. In this article, you will learn Hashing and the HashTable class in C# .NET.
  • Introduction To Hashing and the HashTable Class: Part 25/10/2015 7:02:16 PM. In this article you will learn about Hashing and the HashTable class in C# .NET.
  • Introduction To Hashing and the HashTable Class: Part 15/5/2015 3:54:51 PM. In this article you will learn about Hashing and the HashTable class in C# .NET.
  • Hashing Overview in PHP6/25/2014 12:24:29 PM. We will learn what is the significance of a hash for a secure password in PHP.
  • Hash Password Generator10/3/2012 10:54:06 AM. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Securing Your ASP.NET Web Applications 5/20/2012 12:56:33 AM. Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
  • Cryptography in .NET5/13/2012 3:07:25 AM. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
  • Public Key Token Generation Algorithm12/16/2005 5:32:55 AM. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.