Web Development CS JS Python JavaScript Hacking ReactJs Python django Flask CSS Frontend Backend Full Stack Java Node Pdf Books
3.99K subscribers
878 photos
11 videos
995 files
354 links
One place for the latest in JavaScript, Python, Django, React, and more. Get top-notch tutorials, tips, and downloadable resources. Join us to elevate your tech skills!
Download Telegram
Imagine you have a website account, and when you create a password, the website stores it just like that in its database. If someone gets access to this database, they can see everyone's passwords. Oopsie!

So instead of storing your password as it is, the website uses a special function called a hash function. It's like a magical blender for your password.
When you create or change your password, the website takes it, blends it with this hash function, and gets a jumbled-up result. This result is your hashed password.

Here's the cool part: once your password is hashed, it's almost impossible to go back it and figure out your original password. It's a one-way street: you can't go back.
[ Even if a hacker gains access to the hashed passwords, it is extremely difficult and time consuming for them to reverse the process and obtain the original passwords. ]
The website then stores not your actual password, but this jumbled up mix (hashed password).
πŸ‘5
Salting:
- To enhance security, a unique and random value called a "salt" is added to each password before hashing.
- The salt ensures that even if two users have the same password, their hashed values will be different because of the unique salt.

Procedure:
- When a user creates an account or changes their password, the system generates a random salt for that user.
- The system combines the user's password with the salt and then applies the hash function to produce the hashed password.
- The hashed password and the salt are then stored in the database.

Now you may wonder, how is our password verified?

- When a user attempts to log in, the system retrieves the salt associated with the user from the database.
- The system combines the entered password with the retrieved salt and then applies the same hash function.
- It compares the computed hash with the stored hash, if they match, the entered password is correct.
This security practices may vary, not all websites implement the same measures.

some systems use "pepper", which is a secret value not stored in the database in the same database. The pepper is applied before hashing and provides an extra layer of security.

@javascript_resources
#cybersecurity
Master React.

Learn these hooks:

πŸ“Œ useState()
⏲️ useEffect()
🌐 useContext()
πŸ”„ useReducer()
πŸƒβ€β™‚οΈ useCallback()
🧠 useMemo()
πŸ“š useRef()
🎨 useLayoutEffect()
Understand possible values for CSS transform property with this cheat sheet πŸš€
πŸ‘1
πŸ’ Margin

Margin is used for controlling spacing around elements in a web page.

This creates space between an element’s border and its neighbouring elements.
πŸ’ Margin Properties

β–ͺ️margin-top: sets the margin on the top side.
β–ͺ️margin-bottom: sets the margin on the bottom side.
β–ͺ️margin-left: sets the margin on the left side.
β–ͺ️margin-right: sets the margin on the right side.
β–ͺ️margin: sets the margin for all four sides.