Related resources for Hash
  • A Comprehensive Guide to Secure Coding in C#4/16/2024 10:56:29 AM. A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
  • Best Practices for Maintaining Security and Preventing Vulnerabilities in C#4/9/2024 5:54:03 PM. Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
  • Generate the Client Side Hash Password Via MD5 Algorithm and Saving it to Database4/4/2024 9:10:42 AM. This article shows how to convert a plain password to a hashed password using the MD5 algorithm on the client side and save it to the database.
  • Generate Random Password in ASP.NET4/3/2024 10:46:55 AM. Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
  • Authenticate the Valid User Via User id and MD5 Hashed Password4/3/2024 9:55:02 AM. Secure user authentication with MD5 hashed passwords and user IDs. This method ensures robust password protection by encrypting passwords before storage, enhancing system security and safeguarding use
  • Hashing Password With Bcrypt In Node4/3/2024 9:36:34 AM. Learn how to use bcryptjs library for hashing and comparing passwords in a Node.js application. Build a simple API for user registration and login, ensuring password security through bcrypt hashing. U
  • Make Password Hash In ASP.NET Using C#4/3/2024 9:07:42 AM. Learn how to enhance security in your ASP.NET applications by implementing password hashing using C#. This tutorial guides you through the process of creating hashed passwords, ensuring better protect
  • PiP - External Streaming Data - Useful Concepts - Part 13/27/2024 7:21:34 AM. To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
  • Learn About Data Structures And Algorithm (DSA) - Part Four3/21/2024 9:28:01 AM. This article will tell you about the crucial concepts of data structures and algorithms in terms of understanding the comparison between the array and linked list. This article is the fourth one in th
  • Hashing Techniques in Data Structures and Algorithms3/21/2024 9:02:33 AM. Hashing in data structures utilizes hash functions to map arbitrary-sized data to fixed-size values, enabling efficient storage and retrieval within large datasets commonly employed in hash tables and
  • Cybersecurity of External Streaming Data - Integrity 2/14/2024 4:04:35 AM. This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity of b
  • Load Balancing Strategies: Optimizing Performance and Reliability1/22/2024 11:06:35 AM. This article explores the significance of load balancing in modern computing, emphasizing its role in optimizing performance and reliability for applications dealing with varying traffic levels. It co
  • Understanding the One-Way Nature of HASHBYTES in SQL1/5/2024 10:48:17 AM. This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
  • HashMaps in C#12/26/2023 12:24:41 PM. HashMaps in C# using the Dictionary<TKey, TValue> class. This article delves into their basics, operations, and performance, providing essential insights for efficient key-value pair management
  • Secure Password Hashing with SHA-256 and Salt in Python12/7/2023 5:46:50 AM. In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
  • Hashtable In C#10/20/2023 10:50:22 AM. In this article, you will learn about C# HashTable and how to use a HashTable in C#.
  • Overview Of Array And Collection 10/20/2023 6:19:24 AM. Arrays and Collections are fundamental data structures used in programming to store and manipulate multiple elements. An array is a fixed-size, ordered collection of elements of the same data type. It
  • TripleDES Encryption and Decryption in C#10/16/2023 5:35:37 AM. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
  • Compute SHA256 Hash In C#10/9/2023 6:38:21 AM. How to compute SHA256 Hash in C#. Hashing (also known as hash functions) in cryptography is a process of mapping a binary string of an arbitrary length to a small binary string of a fixed length, know
  • Overriding The System.Object Class Methods9/15/2023 9:48:55 AM. In this article you will take a look on the Object class the base class for all data types in the .NET Framework. You will see also how to give your custom type a new look by overriding the Object cla
  • The Object Class in .NET9/5/2023 8:34:30 AM. All the types in .NET are represented as objects and are derived from the Object class.
  • C# Security: Best Practices for Secure Coding8/31/2023 5:05:34 PM. In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
  • Activation Link Vulnerability8/24/2023 9:15:31 AM. Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
  • Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate6/19/2023 7:06:18 AM. Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
  • Generating Cryptographic Hashes with SHA-256 in JavaScript6/12/2023 6:53:43 AM.
  • HashMap in Java1/24/2023 11:36:28 AM. A HashMap in Java is a collection that stores key-value pairs, similar to a dictionary in other programming languages. It is part of the Java Collection Framework and is implemented as a hash table. I
  • Hashids - What Are They, And Why Should We Use Them?9/9/2022 4:46:49 AM. Defining good unique identifiers for your data isn't always obvious with both security and performance impacts to consider. Check out this article, where you can see potentially better solution wi
  • Hashtable Sorting8/24/2022 8:38:40 AM. This article gives you an idea for sorting a Hashtable.
  • Comparative Analysis of List, HashSet and SortedSet8/22/2022 9:43:47 AM. In this article, I am going to give a brief idea of List, HashSet and SortedSet performances in various situations in terms of their time complexity.
  • Obtain Bytecode And Hash Of Smart Contract On Stratis Blockchain8/22/2022 5:02:33 AM. This article provides insights into Smart contract development in C#, contract validation, byte code generation on Stratis Blockchain with an example of HelloWorld Contract.
  • Introduction to C#4/26/2022 10:02:58 AM. This article concentrates on C# language programming.
  • How To Support Undo And Redo In Components Based On The Jtextcomponent Class3/11/2022 3:17:11 PM. In this article, you will learn how to support undo and redo in components based on the jtextcomponent class.
  • Using .NET Collections With C#2/23/2022 9:57:04 AM. .NET offers a variety of collections such as ArrayList, Hashtable, queues, Dictionaries.
  • C# - Hashset With Example10/22/2021 12:42:33 PM. In this article, you will learn about C# - Hashset with Example.
  • Password Encryption For Forms Authentication in ASP.Net2/3/2021 10:28:39 AM. This article explains Forms Authentication and how to generate the encrypted password for Forms Authentication.
  • Blockchain - Potential Innovative Technology 7/17/2020 5:57:59 AM. Blockchain is a technology that has the ability to build new economic and social pillars in our society. At the primary level blockchain is basically just a chain of blocks but not in a classical way.
  • HashMap Class in Java1/24/2020 4:05:27 PM. In this article you will learn about the HashMap class in java and its various methods using NetBeans IDE.
  • Introduction to Routing in React11/15/2019 12:44:32 AM. This article talks about routing in ReactJs, and how sub routing can be implemented as well.
  • C# HashTable9/22/2019 5:54:30 AM. A HashTable in C# is a collection of a key value pair. Learn how to implement a HashTable in C# with code examples.
  • Working With HashSet In C#9/22/2019 5:53:14 AM. The C# HashSet<T> class provides high-performance set operations. Here learn how to use HashSet in C#.
  • How Various Java Collection Classes Work9/19/2019 12:46:57 AM. In this article we discuss working of various classes in Java collection.
  • Working With HashMap Class in Java9/13/2019 1:50:00 AM. In this article, we are going to describe the HasMap Class's functionality in Java.
  • HashSet In C#7/30/2019 3:12:17 PM. C# HashSet is a collection of unique elements. The .NET HashSet<T> class represents a hash set in C# and provides methods to add, remove, and find items, find subset, superset, union, and inters
  • What Is Hash Function6/17/2019 1:16:45 AM. In this article, we will learn about the hash function and its properties– we will also see how the hash function is useful in the blockchain.
  • Query Optimization in SQL Server6/7/2019 5:05:09 AM. This article offers suggestions on how to optimize query performance in SQL Server 2005.
  • Overview Of Collection, Array List, Hash Table, Sorted List, Stack And Queue5/29/2019 8:06:33 AM. This article provides an overview of Collections, Array Lists, Hash Tables, Sorted Lists, Stacks and Queues.
  • Hashtable in C#5/7/2019 6:42:09 AM. Hashtable is useful when you need to store data in a key and value pair. This article shows how to use hashtable in C#.
  • Create SharePoint List Items From Twitter Hashtags4/7/2019 10:11:25 AM. This article explains how to create list items in SharePoint Online from Tweets based on hashtags using Flow.
  • Working with HashTable in C# 2.010/26/2018 4:26:18 AM. We often need to store more than one dimension data in a list and data may not be an integer or string. This article shows how to use the HashTable class to store object type data.
  • Hashing In ASP.NET Core 2.01/9/2018 10:41:29 AM. The new Data Protection API in .NET Core includes functionality to create hashes using PBKDF2algorithm. ASP.NET Core uses this behind the scenes in PasswordHasher class, which is used in ASP.NET Core
  • How To Remove Hash From Application URL In AngularJS5/2/2017 1:45:25 AM. This article describes how to remove Hash from Application URL in an AngularJS.
  • Collections in C#8/5/2016 6:03:34 PM. Collection in C# is a must-know concept for every developer. This article is about Collections in C#.
  • Sensitive Data Exposure And Its Securing Techniques7/7/2016 11:56:35 AM. In this article you will learn about sensitive data exposure and its securing techniques.
  • Hashing Passwords In .NET Core With Tips6/8/2016 12:11:08 AM. In this article you will learn about how to hash passwords in .NET Core with tips.
  • Theory Of Hashing And Hash Tables6/3/2016 1:47:40 PM. In this article, you will learn different things about Hashing and Hash Tables.
  • File Hash Comparison With MD5 And SHA14/3/2016 3:20:53 PM. In this article you will learn about File Hash Comparison with MD5 and SHA1.
  • Get Latest Video And Images From An Instagram Hashtag Using JQuery12/18/2015 7:38:02 AM. This article explains how we can get and show latest video and images along with other data of a particular Instagram Hashtag Using jQuery.
  • Password Encryption Using Salt Hashing In ASP.NET MVC12/11/2015 12:53:19 AM. This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
  • Generating An MD5 Hash From A String Using LINQ10/27/2015 12:30:26 PM. In this article you will learn how to generate an MD5 Hash from a String Using LINQ.
  • Read Tweet From A Particular Hashtag In ASP.NET10/7/2015 12:45:36 AM. In this article we will learn how to fetch data from Twitter of a particular Hashtag using TweetSharp API in ASP.NET.
  • Simple Login Form Using MD5 Hash Algorithm9/14/2015 7:09:22 AM. In this article, I will show how to create a login form using MD5 hash algorithm.
  • How a Search Engine Works8/24/2015 12:34:41 AM. In this article, I will try to explain search engines and how they work. I will explain the main parts/points for building a search engine.
  • Introduction To Hashing and the HashTable Class: Part 35/18/2015 2:18:55 PM. In this article, you will learn Hashing and the HashTable class in C# .NET.
  • Introduction To Hashing and the HashTable Class: Part 25/10/2015 7:02:16 PM. In this article you will learn about Hashing and the HashTable class in C# .NET.
  • Introduction To Hashing and the HashTable Class: Part 15/5/2015 3:54:51 PM. In this article you will learn about Hashing and the HashTable class in C# .NET.
  • Change the MD5 Hashed Password of a Valid User8/28/2014 2:39:37 PM. This article shows how to change the hashed password of the valid user through its user id, which is saved in a database.
  • Hashing Overview in PHP6/25/2014 12:24:29 PM. We will learn what is the significance of a hash for a secure password in PHP.
  • Dictionaries and Hash Table in C#4/1/2014 3:23:06 PM. This article explains the concept of dictionaries in C#, from the basics to the level afterwards I'll explain the concept of types of dictionaries and the concept of a hash table and it's related useful operations with their respective example.
  • Implementation of Router and URL Hash in Backbone.js1/27/2014 4:24:56 PM. In this article you will learn about the router hashing techniques. In this tutorial we will create a table of, and generates numbers link. When we click on the link then the related number will be focus.
  • Secure WS in VB.NET12/1/2012 3:51:52 AM. This code covers the .NET (VB) implementation of the security of web services using the Microsoft “The Favorites Service” security modified schema.
  • Hash Password Generator in VB.NET11/10/2012 2:23:30 AM. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Introduction to Parametric Singleton Pattern10/4/2012 11:55:17 AM. This article explains about Parametric Singleton Pattern.
  • Developing Secure Web Site with ASP.NET and IIS: PartII10/3/2012 11:09:36 AM. Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.
  • Hash Password Generator10/3/2012 10:54:06 AM. This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
  • Cryptography in Microsoft.NET Part I: Encryption10/3/2012 9:41:46 AM. Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
  • Data Access Layer based on dataSets9/30/2012 4:38:18 AM. This article aims to introduce the reader to several conceptual problems encountered in the development of a generic Data Access Layer (from now on referred to as DAL).
  • Implementation of MD-5 9/29/2012 8:37:17 AM. Describing, how can we implement MD5 and how it works and what is purpose of Hash algorithm.
  • Using Genetic Algorithms to come up with Sudoku Puzzles9/23/2012 6:48:32 AM. Sudoku is a new type of puzzle from Japan that will keep you entertained for a time and may even get you hooked. This article demonstrates how to generate a fully populated Sudoku grid using genetic algorithms.
  • Securing Your ASP.NET Web Applications 5/20/2012 12:56:33 AM. Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
  • How to Overcome Error "Access to the Path Containing 'hash.web' is Getting Denied."5/15/2012 2:41:34 PM. The article is about how to overcome with the error that reads "Access to the path containing 'hash.web' is getting denied."
  • Cryptography in .NET5/13/2012 3:07:25 AM. This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
  • Compare two files with Hash Algorithm4/16/2010 12:40:35 AM. This article shows you how to compare two files using Hash Algorithm.
  • Cryptography in Asp.net9/7/2007 4:28:07 AM. This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
  • Shuffle Game for Beginners2/2/2006 5:24:45 AM. This code sample is a GDI+ shuffle game aimed for beginners. Attached zip file includes the exe and the Shuffle.cs file.
  • Marble Solitaire Solution Display in GDI+2/2/2006 12:49:57 AM. The application finds and displays solutions to a game of solitaire. The application was written using Visual Studio.NET Version 7.0.9254. The test suite was written using NUnit, which is a .NET port of JUnit.
  • Thread Safe Collections ArrayList and Queue1/27/2006 5:29:56 AM. The attached project provides a dll containing a wrapper around the non-thread safe ArrayList and Queue classes. The wrapper implements the most common functions of this collection elements.
  • Public Key Token Generation Algorithm12/16/2005 5:32:55 AM. The PublicKeyTokenGenerator class and a small utility that generates Public Key Token from the Public Key using that class.