Tagged articles
92 articles
Page 1 of 1
Tech Musings
Tech Musings
Apr 10, 2026 · Fundamentals

Why Go’s New Hasher[T] Interface Redefines Safe Generic Hashing

Go’s 2025 addition of the generic Hasher[T] interface to hash/maphash standardizes safe hashing by embedding a random seed throughout recursive calls, resolves previous design flaws, and provides clear guidelines for custom hashers, comparable types, and practical applications such as Bloom filters, all while ensuring performance and correctness.

BloomFilterGenericsHashing
0 likes · 18 min read
Why Go’s New Hasher[T] Interface Redefines Safe Generic Hashing
php Courses
php Courses
Jan 22, 2026 · Backend Development

Secure Your PHP Apps: Mastering password_hash for Safe Password Storage

This guide explains why password hashing is essential in modern web applications, introduces PHP's password_hash function, demonstrates its usage with clear code examples, and highlights automatic salting and verification with password_verify to protect user credentials.

AuthenticationHashingpassword_hash
0 likes · 4 min read
Secure Your PHP Apps: Mastering password_hash for Safe Password Storage
php Courses
php Courses
Jan 12, 2026 · Information Security

How to Secure User Passwords in PHP with password_hash

This guide explains why password hashing is crucial for protecting user credentials, introduces PHP's password_hash and password_verify functions, provides a complete code example, and highlights automatic salting and verification best practices for robust password security.

Hashingpassword_hashpassword_verify
0 likes · 4 min read
How to Secure User Passwords in PHP with password_hash
Python Programming Learning Circle
Python Programming Learning Circle
Sep 1, 2025 · Fundamentals

Why Python Dictionary Keys Overwrite Each Other: Hashing, Equality & Identity

This article explores three Python quirks: how dictionary keys with equal numeric values overwrite each other due to hashing and equality rules, why a return statement inside a try block is superseded by a return in the finally clause, and how object identity and id values behave, including hash collisions and memory reuse.

Exception HandlingHashingPython
0 likes · 4 min read
Why Python Dictionary Keys Overwrite Each Other: Hashing, Equality & Identity
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
php Courses
php Courses
Jun 3, 2025 · Backend Development

Using PHP password_hash for Secure Password Storage

This article explains how PHP's password_hash function can securely hash passwords, automatically handle salting, and be verified with password_verify, providing code examples and best practices for protecting user credentials in web applications.

BackendHashingSecurity
0 likes · 5 min read
Using PHP password_hash for Secure Password Storage
php Courses
php Courses
May 7, 2025 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to improve website password security in PHP by using modern hash functions, adding random salts, employing built‑in password hashing APIs, enforcing strong password policies, scheduling regular password changes, and implementing measures to prevent brute‑force attacks.

Hashingbest-practicespassword security
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
php Courses
php Courses
Dec 27, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how PHP's password_hash function creates cryptographically strong, salted password hashes, demonstrates its usage with example code, and shows how to verify passwords securely using password_verify, emphasizing best practices for backend security.

BackendHashingpassword security
0 likes · 4 min read
Using PHP password_hash for Secure Password Hashing
DaTaobao Tech
DaTaobao Tech
Nov 15, 2024 · Big Data

Engineering Practices for a Billion‑Scale Image Asset Platform

The article recounts how the author built a billion‑scale AI image‑asset library by replacing a week‑long import with a clustered‑table, sharded pipeline, MD5‑based unique keys, a custom DataWorks task scheduler, and multi‑engine query layers, sharing practical engineering practices learned through successive iterations.

Big DataHashingImage Processing
0 likes · 14 min read
Engineering Practices for a Billion‑Scale Image Asset Platform
Lobster Programming
Lobster Programming
Nov 4, 2024 · Fundamentals

Bloom vs Cuckoo Filters: Choosing the Right Probabilistic Data Structure

This article compares Bloom filters and Cuckoo filters, explaining their underlying hash‑based mechanisms, performance characteristics, false‑positive behavior, support for deletions, and suitable use cases to help developers select the appropriate probabilistic data structure for their applications.

Cuckoo FilterHashingbloom-filter
0 likes · 9 min read
Bloom vs Cuckoo Filters: Choosing the Right Probabilistic Data Structure
IT Services Circle
IT Services Circle
Oct 27, 2024 · Information Security

Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures

This article explains what password salting is, why it is essential for protecting stored passwords against rainbow‑table and brute‑force attacks, outlines step‑by‑step how to generate, apply, and verify salted hashes, and lists additional best practices for enhancing overall credential security.

AuthenticationHashingpassword
0 likes · 5 min read
Understanding Password Salting: Why It Matters, How to Generate and Use It, and Additional Security Measures
BirdNest Tech Talk
BirdNest Tech Talk
Oct 9, 2024 · Fundamentals

Unlocking the Power of Bit Manipulation: Real‑World Uses and Go Tips

This article explains why bit manipulation is a staple technique in computer science, detailing performance gains, state flag encoding, mask operations, data compression, cryptography, image processing, hash structures, binary counting, and algorithm design, with practical Go examples.

GoHashingImage Processing
0 likes · 3 min read
Unlocking the Power of Bit Manipulation: Real‑World Uses and Go Tips
php Courses
php Courses
Sep 30, 2024 · Information Security

Using PHP password_hash for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, demonstrates code examples, describes verification with password_verify, and highlights automatic salting and best practices for protecting user credentials.

BackendHashingPHP
0 likes · 4 min read
Using PHP password_hash for Secure Password Hashing
php Courses
php Courses
Sep 14, 2024 · Backend Development

Using PHP password_hash for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, demonstrates code examples for hashing and verifying passwords, discusses automatic salting, and highlights best practices for protecting user credentials.

BackendHashingSecurity
0 likes · 5 min read
Using PHP password_hash for Secure Password Hashing
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
php Courses
php Courses
Jul 4, 2024 · Information Security

Overview of Common PHP Encryption Algorithms

This article introduces several widely used PHP encryption algorithms—including MD5, SHA family, AES, RSA, and Base64 encoding—explaining their functions, security considerations, and PHP functions for implementation, while also mentioning additional algorithms like DES, RC4, and Blowfish for specific use cases.

AESHashingPHP
0 likes · 3 min read
Overview of Common PHP Encryption Algorithms
php Courses
php Courses
Apr 9, 2024 · Information Security

Using PHP password_hash Function for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, describes the underlying hash concept, provides example code for hashing and verifying passwords, and highlights PHP's automatic salting and best practices for protecting user credentials.

HashingSecuritypassword_hash
0 likes · 4 min read
Using PHP password_hash Function for Secure Password Hashing
Ops Development & AI Practice
Ops Development & AI Practice
Mar 14, 2024 · Artificial Intelligence

Do Vector Embeddings Offer the Same Consistency as Hash Functions?

While both vectorization and hashing are essential for handling large datasets, this article examines whether vector embeddings can match the deterministic consistency of hash functions, comparing their collision handling, data structure design implications, and suitability for retrieval and machine‑learning tasks.

AIConsistencyHashing
0 likes · 8 min read
Do Vector Embeddings Offer the Same Consistency as Hash Functions?
JD Tech
JD Tech
Mar 13, 2024 · Frontend Development

Best Practices for Large File Upload with Chunking, Hashing, and Concurrent Requests

This article explains how to efficiently upload large files (e.g., 1.5 GB) from the browser by calculating a file hash with spark‑md5, checking server status for instant or resumable uploads, slicing the file into chunks, uploading them concurrently, and finally merging the chunks, while also offering optimization tips such as using Web Workers and adjusting chunk size.

HashingLarge File UploadWeb Worker
0 likes · 10 min read
Best Practices for Large File Upload with Chunking, Hashing, and Concurrent Requests
php Courses
php Courses
Jan 3, 2024 · Backend Development

How to Strengthen Website Password Security Using PHP

This article explains how to enhance website password security in PHP by using hash functions, adding salts, employing password_hash and password_verify, enforcing strong password policies, scheduling regular password changes, and implementing measures against brute‑force attacks.

BackendHashingPHP
0 likes · 5 min read
How to Strengthen Website Password Security Using PHP
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
Su San Talks Tech
Su San Talks Tech
Jun 20, 2023 · Information Security

Master the 5 Most Common Encryption Algorithms in Java

This article introduces the five most widely used encryption algorithms—MD5, SHA‑256, DES, AES, and RSA—explaining their principles, strengths, weaknesses, and providing complete Java code examples for hashing, symmetric, and asymmetric encryption, along with practical usage scenarios such as password storage and HTTPS.

Hashingasymmetricencryption
0 likes · 19 min read
Master the 5 Most Common Encryption Algorithms in Java
Java Architect Essentials
Java Architect Essentials
Jun 13, 2023 · Fundamentals

How Bloom, Counting Bloom, and Cuckoo Filters Cut Database I/O

To reduce costly database I/O, the article explains how Bloom filters, Counting Bloom filters, and Cuckoo filters work, detailing their bitmap/hash mechanisms, false‑positive behavior, deletion limitations, and practical enhancements such as multi‑hash functions and bucket‑level fingerprints.

Counting BloomCuckoo FilterData Structures
0 likes · 13 min read
How Bloom, Counting Bloom, and Cuckoo Filters Cut Database I/O
Laravel Tech Community
Laravel Tech Community
Jun 6, 2023 · Fundamentals

Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters

This article explains how Bloom filters, their counting variant, and Cuckoo filters work to reduce unnecessary database I/O by using bitmap or fingerprint techniques, discusses their false‑positive and deletion limitations, and presents practical optimizations for high‑performance hash‑based filtering.

Counting Bloom FilterCuckoo FilterData Structures
0 likes · 11 min read
Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters
JD Retail Technology
JD Retail Technology
May 26, 2023 · Databases

Overview of Database Evolution, Types, and Data Structure Design

This article traces the history of database development from early file systems to relational models, outlines major database categories such as hierarchical, relational, NoSQL, NewSQL, and columnar stores, and explores practical data structure designs like chain tables, bitwise operations, and circular queues for modern software engineering.

Data StructuresHashingNewSQL
0 likes · 28 min read
Overview of Database Evolution, Types, and Data Structure Design
ITPUB
ITPUB
Apr 22, 2023 · Databases

Choosing the Right Sharding Algorithm: From Range to Consistent Hash

This article compares common database sharding strategies—range sharding, mapping tables, ID modulo, hash‑based sharding, and consistent hashing—explaining their implementation complexity, data distribution characteristics, scalability concerns, and practical trade‑offs with code examples.

Consistent HashHashingsharding
0 likes · 11 min read
Choosing the Right Sharding Algorithm: From Range to Consistent Hash
21CTO
21CTO
Nov 30, 2022 · Big Data

Mastering Data Sharding: Hash, Range, and Consistent Hash Techniques

This article explains core data sharding concepts and models—including hash‑based, range‑based, and consistent hashing—detailing their mappings, routing strategies, scalability considerations, and practical implementation examples for handling massive datasets in distributed systems.

Big DataHashingconsistent hashing
0 likes · 11 min read
Mastering Data Sharding: Hash, Range, and Consistent Hash Techniques
Java Architect Essentials
Java Architect Essentials
Nov 1, 2022 · Databases

Designing Routing Keys for Sharding in an Order Platform

The article explains how to select and implement routing keys for database sharding in an order platform, covering time‑based and business‑related keys, user and merchant scenarios, hash‑modulo strategies for single and multi‑database environments, and the overall data flow.

BackendHashingRouting Key
0 likes · 5 min read
Designing Routing Keys for Sharding in an Order Platform
Xingsheng Youxuan Technology Community
Xingsheng Youxuan Technology Community
Oct 28, 2022 · Backend Development

How We Processed 1 Million Images in Sub-Second: Backend Optimization Secrets

Facing a challenge of managing roughly one million server-side images and 180 client images, the TOOSIMPLE team built a high-performance backend using fingerprinting, parallel processing, mmap-SSE2 acceleration, and sparsemap indexing, achieving sub-second response times while ensuring correct ordered display.

GolangHashinglarge-scale data
0 likes · 12 min read
How We Processed 1 Million Images in Sub-Second: Backend Optimization Secrets
DataFunTalk
DataFunTalk
Oct 24, 2022 · Artificial Intelligence

Efficient Target Attention (ETA) for Long-Term User Behavior Modeling in Click‑Through Rate Prediction

Efficient Target Attention (ETA) introduces a low‑cost hash‑based attention operator that enables end‑to‑end modeling of ultra‑long user behavior sequences for CTR prediction, achieving significant online CTR, GMV, and QPS improvements in Alibaba’s Taobao feed recommendation system.

Attention MechanismCTR predictionHashing
0 likes · 20 min read
Efficient Target Attention (ETA) for Long-Term User Behavior Modeling in Click‑Through Rate Prediction
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Oct 23, 2022 · Backend Development

Five Core Load Balancing Algorithms Explained

This article introduces the essential concept of load balancing in distributed systems and provides a detailed overview of five fundamental algorithms—Round Robin, Weighted Round Robin, Random, Least Connections, and Source IP Hash—explaining their mechanisms and suitable scenarios.

Hashingload balancing
0 likes · 4 min read
Five Core Load Balancing Algorithms Explained
JavaEdge
JavaEdge
Jul 10, 2022 · Databases

How to Partition Massive Datasets: Strategies, Trade‑offs, and Hotspot Prevention

This article explains why large‑scale systems need data partitioning beyond replication, defines partitions and sharding, compares key‑range and hash‑based partitioning methods, discusses load‑balancing and hotspot avoidance, and shows how replication works together with partitioning to improve scalability.

HashingPartitioningScalability
0 likes · 12 min read
How to Partition Massive Datasets: Strategies, Trade‑offs, and Hotspot Prevention
ELab Team
ELab Team
Jul 7, 2022 · Information Security

Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained

This article examines why passwords are often insecure, explains how they should be stored using hash algorithms and salts, outlines common password‑weaknesses and system vulnerabilities, and introduces FIDO/WebAuthn as a modern, password‑less authentication solution.

AuthenticationFIDOHashing
0 likes · 31 min read
Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained
MaGe Linux Operations
MaGe Linux Operations
May 7, 2022 · Information Security

Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures

This article introduces fundamental cryptography concepts, explaining how symmetric and asymmetric encryption work, the role of key exchange, the purpose and properties of hashing algorithms, and how digital signatures combine encryption and hashing to ensure data authenticity and integrity.

Hashingcryptographydigital signatures
0 likes · 7 min read
Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures
Top Architect
Top Architect
Jan 20, 2022 · Fundamentals

Understanding Bloom Filter, Counting Bloom Filter, and Cuckoo Filter: Principles, Issues, and Optimizations

This article explains the concepts, advantages, and limitations of Bloom filters, Counting Bloom filters, and Cuckoo filters, illustrating how they reduce unnecessary I/O in backend systems and offering practical improvements such as multi‑hash functions and bucket designs to enhance space and time efficiency.

Counting Bloom FilterCuckoo FilterHashing
0 likes · 13 min read
Understanding Bloom Filter, Counting Bloom Filter, and Cuckoo Filter: Principles, Issues, and Optimizations
Top Architect
Top Architect
Dec 30, 2021 · Fundamentals

Understanding Bloom Filter, Counting Bloom Filter, and Cuckoo Filter: Principles, Issues, and Optimizations

This article explains the motivation behind using probabilistic filters to reduce I/O, describes how Bloom filters, Counting Bloom filters, and Cuckoo filters work, analyzes their false‑positive and deletion problems, and presents practical optimizations such as multiple hash functions and multi‑slot buckets.

Counting Bloom FilterCuckoo FilterData Structures
0 likes · 12 min read
Understanding Bloom Filter, Counting Bloom Filter, and Cuckoo Filter: Principles, Issues, and Optimizations
Java Interview Crash Guide
Java Interview Crash Guide
Dec 24, 2021 · Fundamentals

How Bloom, Counting, and Cuckoo Filters Optimize Database I/O

This article explains how Bloom filters, counting Bloom filters, and Cuckoo filters work, their advantages and limitations, and how they can be used to reduce unnecessary database I/O by efficiently testing element membership before querying the database.

Cuckoo FilterData StructuresDatabase Optimization
0 likes · 11 min read
How Bloom, Counting, and Cuckoo Filters Optimize Database I/O
Programmer DD
Programmer DD
Dec 4, 2021 · Fundamentals

How to Prevent Duplicate File Uploads with Reliable Hash Checks in Java

This article explains why using only file name and size to detect duplicate uploads is unreliable, demonstrates how to compute reliable file checksums in Java, and shows through experiments that identical content yields identical hashes regardless of name or type, providing a robust deduplication solution.

HashingJavabackend fundamentals
0 likes · 7 min read
How to Prevent Duplicate File Uploads with Reliable Hash Checks in Java
Top Architect
Top Architect
Oct 29, 2021 · Fundamentals

Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters

The article explains how Bloom filters, Counting Bloom filters, and Cuckoo filters work, their hash‑based bitmap mechanisms, advantages and limitations such as false positives and deletion issues, and presents practical improvements and hash functions for efficient cache and database query optimization.

Cuckoo FilterData StructuresHashing
0 likes · 12 min read
Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters
IT Architects Alliance
IT Architects Alliance
Oct 28, 2021 · Fundamentals

Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters

The article explains the principles, advantages, and limitations of Bloom filters, introduces Counting Bloom filters as an enhanced version, and then details Cuckoo filters and Cuckoo hashing, including their algorithms, performance trade‑offs, and practical improvements for reducing unnecessary I/O operations.

Counting Bloom FilterCuckoo FilterData Structures
0 likes · 11 min read
Understanding Bloom Filters, Counting Bloom Filters, and Cuckoo Filters
Architect
Architect
Jul 15, 2021 · Backend Development

Designing a High‑Performance Short URL System

This article explains the benefits of short URLs and presents a comprehensive, interview‑friendly design for a high‑performance short‑link service, covering redirect mechanics, hash‑based and auto‑increment generation methods, database schema, collision handling, and an OpenResty‑based architecture for massive concurrency.

HashingOpenRestySystem Design
0 likes · 14 min read
Designing a High‑Performance Short URL System
Efficient Ops
Efficient Ops
May 11, 2021 · Big Data

How to Store Billions of Keys in Redis: Cut Memory, Reduce Fragmentation, and Scale Real‑Time DMP

This article examines the challenges of storing massive DMP data in Redis, analyzes memory fragmentation, key‑size issues, and latency constraints, and presents practical strategies such as TTL eviction, bucket‑hashing, custom key compression, and fragmentation‑reduction techniques to enable scalable, real‑time querying.

BucketIdDMPHashing
0 likes · 11 min read
How to Store Billions of Keys in Redis: Cut Memory, Reduce Fragmentation, and Scale Real‑Time DMP
macrozheng
macrozheng
Jan 7, 2021 · Information Security

How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt

This article explains why transmitting passwords over plain HTTP is unsafe, introduces HTTPS and its TLS encryption process, compares symmetric and asymmetric encryption methods, and recommends secure password storage techniques such as salted hashing and BCrypt to protect against rainbow‑table and brute‑force attacks.

HTTPSHashingbcrypt
0 likes · 11 min read
How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt
21CTO
21CTO
Jan 4, 2021 · Information Security

How to Secure Passwords with Salt in Java: MD5 Salting Explained

This article explains the concept of password salting, its security benefits, and provides a complete Java implementation using MD5, including salt generation, hashing with and without salt, storing salt within the hash, and verification procedures for registration and login.

HashingJavaMD5
0 likes · 12 min read
How to Secure Passwords with Salt in Java: MD5 Salting Explained
Big Data Technology & Architecture
Big Data Technology & Architecture
Dec 24, 2020 · Big Data

Common Techniques for Processing Massive Data Sets

This article summarizes a range of practical methods—including Bloom filters, hashing, bit‑maps, heaps, bucket partitioning, database indexes, inverted indexes, external sorting, trie trees, and MapReduce—that are commonly used to handle, deduplicate, and query extremely large data volumes in big‑data applications.

Big DataHashingHeap
0 likes · 11 min read
Common Techniques for Processing Massive Data Sets
360 Quality & Efficiency
360 Quality & Efficiency
Nov 27, 2020 · Artificial Intelligence

Image Similarity Detection Methods: Hashing, Histograms, Feature Matching, BOW+K‑Means, and CNN‑Based Approaches

This article reviews common image similarity detection techniques—including hash-based methods (aHash, pHash, dHash), histogram comparison, feature matching with ORB and SIFT/SURF, bag‑of‑words with K‑Means, and CNN‑based VGG16 features—detailing their algorithms, Python implementations, performance characteristics, and practical considerations.

Computer VisionDeep LearningHashing
0 likes · 15 min read
Image Similarity Detection Methods: Hashing, Histograms, Feature Matching, BOW+K‑Means, and CNN‑Based Approaches
Programmer DD
Programmer DD
Aug 30, 2020 · Information Security

Why Plaintext Passwords Are Dangerous and How to Secure Them Properly

Storing passwords in plaintext is insecure; instead, use cryptographic hash functions with proper salting, avoid simple encryption like AES, understand rainbow table attacks, and adopt modern password‑hash algorithms such as Argon2, Bcrypt or Scrypt to protect user credentials against modern threats.

Hashingcryptographic hashinformation security
0 likes · 13 min read
Why Plaintext Passwords Are Dangerous and How to Secure Them Properly
Architect's Alchemy Furnace
Architect's Alchemy Furnace
Jul 19, 2020 · Fundamentals

Understanding Consistent Hashing: Principles, Design, and Real-World Applications

This article explains the fundamentals of hash functions, outlines the key characteristics of a good hash algorithm, and dives deep into consistent hashing—its background, mechanism, desirable properties, fault tolerance, scalability, and the use of virtual nodes to solve data skew in distributed systems.

Distributed SystemsHashingScalability
0 likes · 12 min read
Understanding Consistent Hashing: Principles, Design, and Real-World Applications
Fulu Network R&D Team
Fulu Network R&D Team
Jun 29, 2020 · Information Security

Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle

This article introduces various cryptographic primitives—including MD, SHA, MAC, and digital signature algorithms such as RSA, DSA, and ECDSA—explains their usage and security considerations, and provides complete .NET Core code examples using the BouncyCastle library for implementation.

.NET CoreBouncyCastleECDSA
0 likes · 24 min read
Comprehensive Guide to Message Digest, MAC, and Digital Signature Algorithms in .NET Core with BouncyCastle
macrozheng
macrozheng
Mar 26, 2020 · Backend Development

How to Build a High‑Performance URL Shortening Service: Architecture & Algorithms

This article explores the design of a high‑performance short‑link system, covering its benefits, redirection mechanics, hash‑based and auto‑increment generation methods, database schema, Bloom filter optimization, and a scalable OpenResty‑based architecture for handling massive traffic.

Backend ArchitectureHashingOpenResty
0 likes · 15 min read
How to Build a High‑Performance URL Shortening Service: Architecture & Algorithms
Programmer DD
Programmer DD
Dec 15, 2019 · Backend Development

Java ThreadLocal Deep Dive: Structure, 0x61c88647 Hash Trick & Usage

This article explains the internal architecture of Java's ThreadLocal, including its ThreadLocalMap implementation, the purpose of the special hash code 0x61c88647, collision handling strategies, proper usage patterns in web applications, and precautions for avoiding memory leaks in thread pools.

HashingJavaMemoryLeak
0 likes · 12 min read
Java ThreadLocal Deep Dive: Structure, 0x61c88647 Hash Trick & Usage
360 Tech Engineering
360 Tech Engineering
Jul 17, 2019 · Information Security

Practical SSL/TLS and Cryptography Guide Using Go and kubeadm

This article provides a comprehensive walkthrough of using Go's crypto library for hashing, symmetric and asymmetric encryption, certificate generation, and TLS/HTTPS server and client implementation, illustrating how these techniques are applied in kubeadm to simplify Kubernetes cluster security.

GoHashingKubernetes
0 likes · 18 min read
Practical SSL/TLS and Cryptography Guide Using Go and kubeadm
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jul 16, 2019 · Databases

Mastering SQL Performance: Indexes, Hashing, and Parallel Access

This article reviews advanced SQL optimization techniques—including using indexes to avoid sorting, reasons an optimizer may skip indexes, hash‑based access methods, and parallel query execution—while summarizing a four‑part series on DBMS‑agnostic performance tuning.

HashingParallel QueryPerformance Optimization
0 likes · 9 min read
Mastering SQL Performance: Indexes, Hashing, and Parallel Access
Big Data Technology & Architecture
Big Data Technology & Architecture
Jun 26, 2019 · Big Data

Common Techniques for Processing Massive Data Sets

This article summarizes a variety of practical methods—including Bloom filters, hashing, bit‑maps, heaps, bucket partitioning, database indexes, inverted indexes, external sorting, tries, and MapReduce—that can be used to efficiently handle and analyze extremely large data volumes in real‑world scenarios.

Data StructuresHashingexternal sort
0 likes · 15 min read
Common Techniques for Processing Massive Data Sets
NetEase Media Technology Team
NetEase Media Technology Team
Jun 5, 2019 · Product Management

Mastering AB Testing: From Basics to Scalable Multi‑Layer Architecture

This article explains the fundamentals of AB testing, outlines the iterative workflow, shares best‑practice guidelines, compares single‑layer and multi‑layer experiment frameworks, and details the technical implementation—including SDK design, hashing algorithms, data denoising, and statistical evaluation methods.

AB testingBackendHashing
0 likes · 15 min read
Mastering AB Testing: From Basics to Scalable Multi‑Layer Architecture
JD Tech
JD Tech
Dec 25, 2018 · Blockchain

Blockchain-Enabled Leasing: Use Cases, Pain Points, and Technical Solutions

This article explains how JD's ZRobot leverages alliance‑chain blockchain to address leasing business challenges such as breach disputes by providing real‑time, immutable evidence, legal endorsement, and secure data storage, while outlining the broader regulatory and industry context in China.

BlockchainHashingdigital evidence
0 likes · 8 min read
Blockchain-Enabled Leasing: Use Cases, Pain Points, and Technical Solutions
AntTech
AntTech
Aug 22, 2018 · Artificial Intelligence

Ant Financial’s KDD 2018 Papers: Graph-Based Fraud Detection, GeniePath GNN, and Distributed Collaborative Hashing

The article presents three Ant Financial research papers featured at KDD 2018—one on graph‑learning fraud detection for return‑freight insurance, another introducing the adaptive GeniePath graph neural network, and a third describing a distributed collaborative hashing system for large‑scale recommendation—highlighting their methodologies, experimental results, and practical impact on Ant Financial’s services.

Ant FinancialHashingRecommendation Systems
0 likes · 21 min read
Ant Financial’s KDD 2018 Papers: Graph-Based Fraud Detection, GeniePath GNN, and Distributed Collaborative Hashing
ITPUB
ITPUB
Jun 19, 2018 · Databases

Can Machine Learning Replace Traditional Hashing? A Deep Dive into Learned Indexes

This article explores the evolution of indexing from classic hash tables and B‑Trees to learned index structures, explaining hash functions, collision handling, machine‑learning fundamentals, and the promise and limits of using ML models to improve memory efficiency and query performance.

Hashingcuckoo hashinglearned indexes
0 likes · 24 min read
Can Machine Learning Replace Traditional Hashing? A Deep Dive into Learned Indexes
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

HTTPSHashingPBKDF2
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
Java High-Performance Architecture
Java High-Performance Architecture
May 3, 2018 · Blockchain

Understanding Blockchain’s Core Technologies: Hashing, Public-Key Encryption, and Proof of Work

Blockchain relies on three fundamental technologies—SHA‑256 hashing, public‑key cryptography, and proof‑of‑work consensus—each ensuring data integrity, secure identity verification, and decentralized block creation, with detailed examples illustrating hash collisions, transaction signing, and nonce‑driven mining challenges.

HashingProof of Workcryptography
0 likes · 6 min read
Understanding Blockchain’s Core Technologies: Hashing, Public-Key Encryption, and Proof of Work
Java Captain
Java Captain
Nov 11, 2017 · Fundamentals

Understanding Java's equals() and hashCode() Methods and How to Override Them

This article explains the default implementations of Java's Object.equals() and Object.hashCode(), the required contracts for overriding them, demonstrates their behavior in the String class, and provides practical guidelines and example code for correctly overriding these methods in custom classes.

HashingOverrideString
0 likes · 11 min read
Understanding Java's equals() and hashCode() Methods and How to Override Them
21CTO
21CTO
Aug 27, 2017 · Information Security

How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt

This article examines common password‑storage techniques, explains why plain‑text, symmetric encryption, and simple hashes are insecure, and demonstrates how modern algorithms like PBKDF2, bcrypt, and scrypt, together with proper salting and iteration, can effectively protect user credentials against large‑scale cracking attacks.

HashingPBKDF2bcrypt
0 likes · 8 min read
How to Secure User Passwords: From Weak Hashes to PBKDF2, bcrypt, and scrypt
Ctrip Technology
Ctrip Technology
Oct 24, 2016 · Information Security

User Password Encryption and Cracking Techniques

This article explains common user password storage methods, compares their security characteristics, and details various cracking approaches—including hash collisions, rainbow tables, and advanced algorithms like PBKDF2, bcrypt, and scrypt—while emphasizing the importance of strong encryption to mitigate data breach risks.

HashingPBKDF2Security
0 likes · 8 min read
User Password Encryption and Cracking Techniques
dbaplus Community
dbaplus Community
Jun 19, 2016 · Backend Development

Beyond Cache+Hash: Real Strategies for Building High‑Concurrency Systems

This article demystifies the common belief that cache‑plus‑hash alone solves high‑concurrency challenges, explores essential techniques such as static resource serving, read‑write separation, advanced caching, hash‑based sharding, and especially the design trade‑offs of various Trie‑based data structures for search‑suggestion services, and offers practical optimization steps.

Backend ArchitectureHashingTrie
0 likes · 28 min read
Beyond Cache+Hash: Real Strategies for Building High‑Concurrency Systems
Architects' Tech Alliance
Architects' Tech Alliance
Jan 27, 2016 · Fundamentals

Deduplication and Compression Techniques in All‑Flash Arrays: Implementation Details and Vendor Comparisons

All‑flash storage arrays increasingly rely on deduplication combined with compression to extend SSD lifespan, and this article explains the underlying block‑level workflow, hash‑based fingerprinting, and key implementation differences among vendors such as EMC Xtremio, Pure Storage, and HP 3PAR.

HashingPure StorageSSD endurance
0 likes · 6 min read
Deduplication and Compression Techniques in All‑Flash Arrays: Implementation Details and Vendor Comparisons
ITPUB
ITPUB
Nov 23, 2015 · Information Security

Why Storing Plaintext Passwords Is Dangerous and How Salting & Hashing Protect Users

The article explains why storing plaintext passwords is insecure, describes one‑way hashing, the danger of rainbow tables, how salting and strong hash functions protect credentials, warns against multiple hashing, and outlines practical strategies—including HTTPS and server‑side salts—to secure user authentication.

Hashingpassword securityrainbow tables
0 likes · 8 min read
Why Storing Plaintext Passwords Is Dangerous and How Salting & Hashing Protect Users
Qunar Tech Salon
Qunar Tech Salon
Mar 30, 2015 · Backend Development

Lesser‑Known but Practical Features of Google Guava

This article explores several under‑used yet useful Google Guava utilities—including unsigned primitive types, 128‑bit MurmurHash, InternetDomainName parsing, class‑path reflection, and CharMatcher string handling—providing code examples and explanations of how they can improve Java development efficiency.

HashingReflectionString
0 likes · 9 min read
Lesser‑Known but Practical Features of Google Guava