Hashids πΎ
Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers. π
It converts numbers like 347 into strings like βyr8β, or array of numbers like [27, 986] into β3kTMdβ. π
You can also decode those ids back. π
Available in π₯ :
β’ JavaScript
β’ .NET
β’ Java
β’ PHP
β’ Ruby
β’ Python
β’ Swift
β’ ...
πΈπΉπΈπΉ
Usage example in JavaScript π€π» :
https://t.me/pgimg/36
[ Website ] : http://hashids.org/
γ°γ°γ°γ°γ°γ°
#Encode #Hash
@ProgrammingTip
Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers. π
It converts numbers like 347 into strings like βyr8β, or array of numbers like [27, 986] into β3kTMdβ. π
You can also decode those ids back. π
Available in π₯ :
β’ JavaScript
β’ .NET
β’ Java
β’ PHP
β’ Ruby
β’ Python
β’ Swift
β’ ...
πΈπΉπΈπΉ
Usage example in JavaScript π€π» :
var hashids = new Hashids("this is my salt", 8, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890");
var id = hashids.encode(1, 2, 3);
// Output : GlaHquq0
var numbers = hashids.decode(id);
// Output : [1, 2, 3]https://t.me/pgimg/36
[ Website ] : http://hashids.org/
γ°γ°γ°γ°γ°γ°
#Encode #Hash
@ProgrammingTip
Telegram
Programming Tips Resources
The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms π
If you have heard about βSHAβ in its many forms, but are not totally sure what itβs an acronym for or why itβs important, weβre going to try to shine a little bit of light on that here today. π
Before we can get to SHA itself though, we need to run through what a hash is, and then weβll get into how SSL certificates use hashes to form digital signatures. π
These are critical concepts to understand before youβll be able to follow what SHA-1 and SHA-2 are. βπ»
[ Article ] : kutt.it/sha256
γ°οΈγ°οΈγ°οΈγ°οΈγ°οΈγ°οΈ
#Hash #Encryption #Cryptography
@ProgrammingTip
If you have heard about βSHAβ in its many forms, but are not totally sure what itβs an acronym for or why itβs important, weβre going to try to shine a little bit of light on that here today. π
Before we can get to SHA itself though, we need to run through what a hash is, and then weβll get into how SSL certificates use hashes to form digital signatures. π
These are critical concepts to understand before youβll be able to follow what SHA-1 and SHA-2 are. βπ»
[ Article ] : kutt.it/sha256
γ°οΈγ°οΈγ°οΈγ°οΈγ°οΈγ°οΈ
#Hash #Encryption #Cryptography
@ProgrammingTip
Telegram
Programming Tips Resources