recentpopularlog in

rtopitt : hash   19

Michael Tsai - Blog - User Account Best Practices
Let’s say, hypothetically, that I wanted to create a “user account” feature for an app.

Where should I go to read up on best practices for safely storing the user’s password on the backend?
programming  security  hash  senha  boa_prática  reference  dica 
march 2019 by rtopitt
Ruby - Hashids
generate short unique ids from integers

Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers.

It converts numbers like 347 into strings like “yr8”, or array of numbers like [27, 986] into “3kTMd”.

You can also decode those ids back. This is useful in bundling several parameters into one or simply using them as short UIDs.
ruby  biblioteca  criptografia  gem  id  hash  software_livre  database 
august 2015 by rtopitt
Enough With the Salts: Updates on Secure Password Schemes - Blog - Matasano Security
When it comes to password storage, you’re much better off using a well tested and reviewed system than writing your own. You’ll want that to be something purpose built, rather than relying on fast cryptographic hashes which are especially susceptible to fast guessing and hardware optimization. This means you’ll want to use scrypt, bcrypt, or PBKDF2 (in my order of preference) with an appropriate work factor. If you’re stuck deciding between scrypt and bcrypt, you can pretty much flip a coin and end up with something reasonable.
hash  security  senha  criptografia  server  database  boa_prática  reference  importante  algorithm 
april 2015 by rtopitt
leakdb
reverse hash search and calculator
criptografia  hash  sha  md5  busca  api  security 
november 2013 by rtopitt
Secure Salted Password Hashing - How to do it Properly
There are a lot of conflicting ideas and misconceptions on how to do password hashing properly, probably due to the abundance of misinformation on the web. Password hashing is one of those things that's so simple, but yet so many people get wrong. With this page, I hope to explain not only the correct way to do it, but why it should be done that way.
hash  salt  criptografia  how-to  senha  sal  ruby  rails  web  security  tip 
june 2013 by rtopitt
How To Safely Store A Password | codahale.com
Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt.
senha  bcrypt  criptografia  hash  importante  security  tip 
april 2012 by rtopitt
Hash Tricks | End of Line
Here are a few interesting things you can do with a hash’s initialization block.
hash  ruby  how-to  tip  programming 
december 2010 by rtopitt
footle » Blog Archive » Protecting Your Users’ Data with a Privacy Wall
In this post I will describe one of our primary means for assuring privacy, a technique that is general enough that any site can use it. Our creative name for this technique is the privacy wall. Later, I’ll go on to tell you ways to hack the wall, just so you don’t get too comfortable.
modelagem  hash  criptografia  privacidade  design  how-to  security  tip  architecture  database  programming  user 
november 2010 by rtopitt
pHash.org: Home of pHash, the open source perceptual hash library
A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions which rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar.
phash  hash  comparação  imagem  multimedia  biblioteca  software_livre  geek  video  programming 
august 2010 by rtopitt
Detecting Duplicate Images with Phashion
Recently I was given a ticket to implement a “near-duplicate” image detector. The original image files have different bytesizes and different sizes but they show essentially the same thing. This is what we call a “near-duplicate” and the problem was that when displaying an automatically generated image gallery for a given subject, we were sometimes showing duplicate images due to slight differences in the images. Obviously we can’t use something like an MD5 or SHA1 fingerprint – we have to create a fingerprint based on the content of the image, not the exact bytes. This is what the pHash library does.
ruby  gem  biblioteca  phash  geek  comparação  duplicidade  imagem  similar  hash  programming 
august 2010 by rtopitt
Arbia - Cogitations — Distributed Ruby - Exploiting ‘Enterprise’ Software
Como usar a biblioteca java Hazelcast via jRuby. What you see above is a fully distributed hash. It has redundancy, consistency and a smorgasbord of other features all built in and with about 6 lines of ruby we can use it.
jruby  java  hazelcast  biblioteca  jar  how-to  hash  distribuído  ruby  database 
july 2010 by rtopitt
Serializing a nested hash - ruby-talk-google | Grupos do Google
Como serializar um Hash para ser carregado corretamente numa fixture em Rails
fixture  hash  rails  serialização  teste  tip 
may 2009 by rtopitt
Chris Cruft » Blog Archive » YAML Fixtures for Serialized Objects
Como gerar dinâmicamente atributos serializados em fixtures YAML
fixture  hash  rails  teste  yaml  tip 
may 2009 by rtopitt
An Illustrated Guide to Cryptographic Hashes
With the recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are: They form the underpinning of much of our electronic infrastructure, and in this Guide we'll try to give an overview
artigo  criptografia  explicação  geek  hash  security 
may 2009 by rtopitt
hash_extension
hash_extension is a Ruby on Rails plug-in that does two things. First, it provides ActiveRecord finder methods that return hashes. Second, it makes hashes more object-like. Why? When you request a lot of objects with an ActiveRecord query, there’s a lot
active_record  gem  hash  performance  plugin  rails  ruby 
may 2009 by rtopitt

Copy this bookmark:





to read