Programming Tips πŸ’‘
51.6K subscribers
67 photos
10 videos
30 files
354 links
Programming & AI:
Tips πŸ’‘
Articles πŸ“•
Resources πŸ‘Ύ
Design Patterns πŸ’Ž
Software Principles βœ…

πŸ‡³πŸ‡± Contact: @MoienTajik

🎯 Buy ads: https://telega.io/c/ProgrammingTip
Download Telegram
Hashids πŸ‘Ύ

Hashids is a small open-source library that generates short, unique, non-sequential ids from numbers. πŸ’Ž

It converts numbers like 347 into strings like β€œyr8”, or array of numbers like [27, 986] into β€œ3kTMd”. πŸŒ€

You can also decode those ids back. πŸ”™

Available in πŸ”₯ :
β€’ JavaScript
β€’ .NET
β€’ Java
β€’ PHP
β€’ Ruby
β€’ Python
β€’ Swift
β€’ ...

πŸ”ΈπŸ”ΉπŸ”ΈπŸ”Ή

Usage example in JavaScript πŸ€™πŸ» :

var hashids = new Hashids("this is my salt", 8, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890");

var id = hashids.encode(1, 2, 3);
// Output : GlaHquq0

var numbers = hashids.decode(id);
// Output : [1, 2, 3]



https://t.me/pgimg/36

[ Website ] : http://hashids.org/

γ€°γ€°γ€°γ€°γ€°γ€°
#Encode #Hash
@ProgrammingTip
The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms πŸ”

If you have heard about β€œSHA” in its many forms, but are not totally sure what it’s an acronym for or why it’s important, we’re going to try to shine a little bit of light on that here today. 🌈

Before we can get to SHA itself though, we need to run through what a hash is, and then we’ll get into how SSL certificates use hashes to form digital signatures. 🌐

These are critical concepts to understand before you’ll be able to follow what SHA-1 and SHA-2 are. ☝🏻


[ Article ] : kutt.it/sha256

〰️〰️〰️〰️〰️〰️
#Hash #Encryption #Cryptography
@ProgrammingTip