Tag

Hashing

2 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Jun 3, 2025 · Backend Development

Using PHP password_hash for Secure Password Storage

This article explains how PHP's password_hash function can securely hash passwords, automatically handle salting, and be verified with password_verify, providing code examples and best practices for protecting user credentials in web applications.

HashingPHPbackend
0 likes · 5 min read
Using PHP password_hash for Secure Password Storage
php中文网 Courses
php中文网 Courses
May 7, 2025 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to improve website password security in PHP by using modern hash functions, adding random salts, employing built‑in password hashing APIs, enforcing strong password policies, scheduling regular password changes, and implementing measures to prevent brute‑force attacks.

Best PracticesHashingPHP
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
Lobster Programming
Lobster Programming
Jan 16, 2025 · Big Data

How to Extract Top 100 Search Keywords from Billion‑Scale Logs Efficiently

This article explains a divide‑and‑conquer method that splits massive search‑log files, uses multithreaded hashing to count keyword frequencies, and applies a min‑heap to efficiently retrieve the top‑100 most frequent search terms for SEO and recommendation tasks.

Big DataHashingMultithreading
0 likes · 3 min read
How to Extract Top 100 Search Keywords from Billion‑Scale Logs Efficiently
php中文网 Courses
php中文网 Courses
Dec 27, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how PHP's password_hash function creates cryptographically strong, salted password hashes, demonstrates its usage with example code, and shows how to verify passwords securely using password_verify, emphasizing best practices for backend security.

HashingPHPbackend
0 likes · 4 min read
Using PHP password_hash for Secure Password Hashing
DaTaobao Tech
DaTaobao Tech
Nov 15, 2024 · Big Data

Engineering Practices for a Billion‑Scale Image Asset Platform

The article recounts how the author built a billion‑scale AI image‑asset library by replacing a week‑long import with a clustered‑table, sharded pipeline, MD5‑based unique keys, a custom DataWorks task scheduler, and multi‑engine query layers, sharing practical engineering practices learned through successive iterations.

Big DataHashingdata pipeline
0 likes · 14 min read
Engineering Practices for a Billion‑Scale Image Asset Platform
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 12, 2024 · Information Security

How to Compute an MD5 Hash of a String in Java Using MessageDigest

This article explains how to generate an MD5 hash for a string in Java with the java.security.MessageDigest class, provides a complete example program, details each step of the MD5 algorithm, and describes the core methods and internal workings of MessageDigest for cryptographic hashing.

HashingJavaMD5
0 likes · 12 min read
How to Compute an MD5 Hash of a String in Java Using MessageDigest
Lobster Programming
Lobster Programming
Nov 4, 2024 · Fundamentals

Bloom vs Cuckoo Filters: Choosing the Right Probabilistic Data Structure

This article compares Bloom filters and Cuckoo filters, explaining their underlying hash‑based mechanisms, performance characteristics, false‑positive behavior, support for deletions, and suitable use cases to help developers select the appropriate probabilistic data structure for their applications.

Bloom FilterCuckoo filterHashing
0 likes · 9 min read
Bloom vs Cuckoo Filters: Choosing the Right Probabilistic Data Structure
IT Services Circle
IT Services Circle
Oct 27, 2024 · Information Security

Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures

This article explains what password salting is, why it is essential for protecting stored passwords against rainbow‑table and brute‑force attacks, outlines step‑by‑step how to generate, apply, and verify salted hashes, and lists additional best practices for enhancing overall credential security.

Hashingauthenticationpassword
0 likes · 5 min read
Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures
php中文网 Courses
php中文网 Courses
Sep 30, 2024 · Information Security

Using PHP password_hash for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, demonstrates code examples, describes verification with password_verify, and highlights automatic salting and best practices for protecting user credentials.

HashingPHPbackend
0 likes · 4 min read
Using PHP password_hash for Secure Password Hashing
php中文网 Courses
php中文网 Courses
Sep 14, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, demonstrates code examples for hashing and verifying passwords, discusses automatic salting, and highlights best practices for protecting user credentials.

HashingPHPpassword_hash
0 likes · 5 min read
Using PHP password_hash for Secure Password Hashing
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API securityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
php中文网 Courses
php中文网 Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESHashingPHP
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
php中文网 Courses
php中文网 Courses
May 15, 2024 · Backend Development

Using PHP password_hash Function for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, describes the underlying hash concept, provides example code for hashing and verifying passwords, and highlights automatic salting and best practices for protecting user credentials.

HashingPHPbackend
0 likes · 4 min read
Using PHP password_hash Function for Secure Password Hashing
Java Tech Enthusiast
Java Tech Enthusiast
Apr 13, 2024 · Information Security

Why Websites Require Password Reset Instead of Revealing Original Passwords

Websites cannot reveal original passwords because they store only salted, one‑way hashes, not the plaintext, making recovery impossible; therefore, when users forget their credentials, the secure approach is to verify identity and issue a password reset rather than expose any stored data.

HashingMD5authentication
0 likes · 6 min read
Why Websites Require Password Reset Instead of Revealing Original Passwords
php中文网 Courses
php中文网 Courses
Apr 9, 2024 · Information Security

Using PHP password_hash Function for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, describes the underlying hash concept, provides example code for hashing and verifying passwords, and highlights PHP's automatic salting and best practices for protecting user credentials.

HashingPHPbackend
0 likes · 4 min read
Using PHP password_hash Function for Secure Password Hashing
JD Tech
JD Tech
Mar 13, 2024 · Frontend Development

Best Practices for Large File Upload with Chunking, Hashing, and Concurrent Requests

This article explains how to efficiently upload large files (e.g., 1.5 GB) from the browser by calculating a file hash with spark‑md5, checking server status for instant or resumable uploads, slicing the file into chunks, uploading them concurrently, and finally merging the chunks, while also offering optimization tips such as using Web Workers and adjusting chunk size.

Chunked UploadConcurrencyHashing
0 likes · 10 min read
Best Practices for Large File Upload with Chunking, Hashing, and Concurrent Requests
php中文网 Courses
php中文网 Courses
Jan 3, 2024 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to enhance website password security in PHP by using hash functions, adding salts, employing password_hash and password_verify, enforcing strong password policies, scheduling regular password changes, and implementing measures against brute‑force attacks.

HashingWeb Developmentbackend
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
Cognitive Technology Team
Cognitive Technology Team
Oct 6, 2023 · Fundamentals

Why Java Strings Are Immutable: Performance, Security, and Thread‑Safety Benefits

The article explains why Java's String class is immutable, highlighting performance gains from constant‑pool caching, security advantages for sensitive data, thread‑safety without synchronization, and hash‑code caching that speeds up hash‑based collections in Java applications.

HashingJavaPerformance
0 likes · 4 min read
Why Java Strings Are Immutable: Performance, Security, and Thread‑Safety Benefits