Tagged articles
61 articles
Page 1 of 1
php Courses
php Courses
Jan 8, 2026 · Backend Development

Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code

This guide walks through three common PHP password‑hashing techniques—md5, password_hash (BCrypt), and crypt—showing complete registration and login code samples, highlighting security drawbacks of md5 and recommending stronger, salted hashing for safe user authentication.

Backend SecurityMD5crypt
0 likes · 5 min read
Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code
21CTO
21CTO
Dec 4, 2024 · Databases

Why PostgreSQL Is Dropping MD5 Password Support and What It Means for You

PostgreSQL has officially deprecated MD5 password authentication, outlining a phased removal across upcoming releases and urging users to transition to the more secure SCRAM‑SHA‑256 method to protect against hash‑based attacks.

MD5deprecationpassword-authentication
0 likes · 3 min read
Why PostgreSQL Is Dropping MD5 Password Support and What It Means for You
php Courses
php Courses
Apr 26, 2024 · Backend Development

PHP Password Encryption Methods: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash, and crypt—providing detailed code examples and guidance on securely storing user passwords during registration and login processes.

BackendMD5crypt
0 likes · 5 min read
PHP Password Encryption Methods: md5, password_hash, and crypt
macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

Information SecurityKDFMD5
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
php Courses
php Courses
Feb 8, 2024 · Backend Development

Password Encryption Methods in PHP: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash (using BCrypt), and crypt—detailing their security considerations and providing complete code examples for user registration and login verification.

MD5cryptpassword hashing
0 likes · 6 min read
Password Encryption Methods in PHP: md5, password_hash, and crypt
Liangxu Linux
Liangxu Linux
Aug 22, 2023 · Backend Development

Why Does My First MD5 Call Take Seconds? Debugging Java Hashing Slowness with Arthas

The article explains a real‑world issue where the first invocation of a MD5 hash in a Java backend took dozens of seconds, describes how the problem was traced using the Arthas diagnostic tool, reveals that the delay stemmed from BouncyCastle algorithm loading, and shows how replacing the library resolved the performance bottleneck.

ArthasBackendMD5
0 likes · 10 min read
Why Does My First MD5 Call Take Seconds? Debugging Java Hashing Slowness with Arthas
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESMD5RSA
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
IT Architects Alliance
IT Architects Alliance
May 23, 2022 · Backend Development

Server‑Side Request Deduplication Using Redis and MD5 in Java

The article explains how to prevent duplicate requests on the server side by using unique request IDs, business‑parameter hashing with MD5, exclusion of volatile fields, and atomic Redis SETNX operations, providing a complete Java implementation and testing logs.

IdempotencyMD5java
0 likes · 11 min read
Server‑Side Request Deduplication Using Redis and MD5 in Java
Top Architect
Top Architect
May 21, 2022 · Backend Development

Handling Duplicate Requests in Backend Services with Redis and Java

This article explains various techniques for detecting and preventing duplicate backend requests—using unique request IDs, business parameter hashing, MD5 summaries, and Redis SETNX with expiration—providing Java code examples and a complete deduplication utility.

BackendMD5Request ID
0 likes · 9 min read
Handling Duplicate Requests in Backend Services with Redis and Java
Java Architect Essentials
Java Architect Essentials
Apr 23, 2022 · Backend Development

Server‑Side Request Deduplication Strategies in Java

The article explains how to prevent duplicate user requests on the server side by using unique request IDs with Redis, constructing business‑parameter keys, computing MD5 digests of sorted JSON payloads, and provides a complete Java utility class with code examples and testing logs.

MD5SpringBootredis
0 likes · 10 min read
Server‑Side Request Deduplication Strategies in Java
Programmer DD
Programmer DD
Apr 9, 2022 · Backend Development

Graceful Server‑Side Request Deduplication with Redis and Java

This article explains how to prevent harmful duplicate write requests by using unique request IDs or parameter‑based signatures, leveraging Redis for atomic SETNX with expiration, computing MD5 hashes of sorted JSON payloads, and providing a reusable Java helper class for robust backend deduplication.

IdempotencyMD5java
0 likes · 11 min read
Graceful Server‑Side Request Deduplication with Redis and Java
Selected Java Interview Questions
Selected Java Interview Questions
Apr 6, 2022 · Backend Development

Server‑Side Request Deduplication Using Redis and Java

This article explains how to prevent duplicate user requests on the server side by leveraging unique request IDs or business‑parameter MD5 hashes with Redis, provides Java helper utilities, code examples, and practical tips for handling time‑related fields and atomic SETNX operations.

MD5request deduplicationspring
0 likes · 9 min read
Server‑Side Request Deduplication Using Redis and Java
Tencent Cloud Developer
Tencent Cloud Developer
Jan 19, 2022 · Information Security

Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable

This article explores the MD5 hashing algorithm in depth, detailing its fixed 128‑bit output, the padding and block processing steps defined in RFC 1321, the internal round functions, and the reasons it is considered irreversible yet vulnerable to collisions and various cracking techniques such as brute‑force, rainbow tables, and differential attacks.

Information SecurityMD5collision attack
0 likes · 15 min read
Unveiling MD5: How It Works, Its Fixed Length, and Why It’s Vulnerable
Python Crawling & Data Mining
Python Crawling & Data Mining
Nov 15, 2021 · Information Security

Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA

This article introduces common encryption methods—including Base64, MD5, SHA‑1, HMAC, DES, AES, and RSA—explains their principles, and provides complete Python code examples for encoding, decoding, and key handling, enabling readers to implement secure data transformations in their own projects.

AESBase64MD5
0 likes · 12 min read
Python Encryption Guide: Base64, MD5, SHA1, HMAC, DES, AES, RSA
21CTO
21CTO
Aug 25, 2021 · Information Security

Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens

This article examines common security flaws in basic web login forms, demonstrates how plain‑text passwords can be intercepted, and presents practical countermeasures such as client‑side encryption, hashing, captchas, tokens, and digital signatures to protect credentials and data integrity.

CaptchaMD5Token
0 likes · 13 min read
Why Simple Web Login Is Vulnerable and How to Secure It with Encryption and Tokens
Top Architect
Top Architect
Aug 23, 2021 · Information Security

Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, illustrating how plain HTTP exposes credentials, evaluating symmetric and asymmetric encryption, token-based authentication, and digital signatures, and proposes layered protection strategies such as MD5 hashing, CAPTCHA, and token mechanisms to safeguard user data.

MD5TokenWeb Security
0 likes · 12 min read
Security Considerations for Web Login: From Plain HTTP to Encryption, Tokens, and Digital Signatures
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2021 · Information Security

Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, demonstrates how plain‑text passwords can be intercepted over HTTP/HTTPS, evaluates symmetric and asymmetric encryption, discusses the limitations of MD5, and proposes token‑based and digital‑signature solutions to protect credentials and data integrity.

AuthenticationHTTPSMD5
0 likes · 14 min read
Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2021 · Information Security

Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained

This article introduces common encryption algorithms—including symmetric, asymmetric, and digital signature methods—and provides detailed Go code examples for MD5, HMAC, SHA1, AES (with various modes), and RSA, helping developers understand and implement secure cryptographic operations in Go.

AESHMACMD5
0 likes · 16 min read
Master Go Encryption: MD5, HMAC, SHA1, AES, RSA and More Explained
Java Backend Technology
Java Backend Technology
Jun 4, 2021 · Backend Development

How to Prevent Duplicate Requests in Java Services with Redis and MD5

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common duplication scenarios, and presents a complete server‑side solution using unique request IDs with Redis as well as business‑parameter hashing with MD5 to achieve reliable idempotency in Java back‑end systems.

BackendIdempotencyMD5
0 likes · 9 min read
How to Prevent Duplicate Requests in Java Services with Redis and MD5
21CTO
21CTO
Jun 3, 2021 · Backend Development

How to Prevent Duplicate Requests on the Server Using Redis and Request Hashing

This article explains how to handle duplicate user requests—especially write operations—by using unique request IDs with Redis, computing MD5 hashes of sorted JSON parameters, and providing a Java helper class to reliably deduplicate requests on the server side.

MD5deduplicationjava
0 likes · 8 min read
How to Prevent Duplicate Requests on the Server Using Redis and Request Hashing
Java Interview Crash Guide
Java Interview Crash Guide
May 31, 2021 · Backend Development

How to Prevent Duplicate Requests with Redis: A Complete Backend Deduplication Guide

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common duplication scenarios, and provides a comprehensive server‑side solution using unique request IDs, parameter hashing with MD5, and Redis SETNX with expiration to reliably detect and block repeats.

MD5deduplicationduplicate request
0 likes · 10 min read
How to Prevent Duplicate Requests with Redis: A Complete Backend Deduplication Guide
Java Architect Essentials
Java Architect Essentials
Feb 26, 2021 · Backend Development

How to Gracefully Prevent Duplicate Requests on the Server Side

This article explains why duplicate requests—especially write operations—can cause serious issues, outlines common causes such as replay attacks and client retries, and provides a comprehensive server‑side solution using unique request IDs, Redis, and MD5‑based parameter deduplication with Java code examples.

IdempotencyMD5duplicate request
0 likes · 9 min read
How to Gracefully Prevent Duplicate Requests on the Server Side
21CTO
21CTO
Jan 4, 2021 · Information Security

How to Secure Passwords with Salt in Java: MD5 Salting Explained

This article explains the concept of password salting, its security benefits, and provides a complete Java implementation using MD5, including salt generation, hashing with and without salt, storing salt within the hash, and verification procedures for registration and login.

HashingInformation SecurityMD5
0 likes · 12 min read
How to Secure Passwords with Salt in Java: MD5 Salting Explained
Programmer DD
Programmer DD
Nov 2, 2020 · Information Security

Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle

This article introduces Java developers to the Bouncy Castle library, detailing how to integrate it via Maven, demonstrating MD5 hashing and AES encryption/decryption code, and highlighting usage considerations and export compliance risks associated with cryptographic algorithms.

AESBouncy CastleMD5
0 likes · 5 min read
Unlock Java Encryption: A Hands‑On Guide to Bouncy Castle
NetEase Game Operations Platform
NetEase Game Operations Platform
Nov 16, 2019 · Frontend Development

WebAssembly with Emscripten: High‑Performance MD5 Hashing and Archive Extraction in the Browser

This article demonstrates how to leverage WebAssembly and Emscripten to compile C code for high‑performance MD5 hashing and archive (zip/7z) parsing in the browser, covering library selection, memory management, file I/O via WorkerFS, async processing, and integration of C functions with JavaScript.

BrowserEmscriptenFileIO
0 likes · 18 min read
WebAssembly with Emscripten: High‑Performance MD5 Hashing and Archive Extraction in the Browser
360 Tech Engineering
360 Tech Engineering
Jan 15, 2019 · Backend Development

Implementing MD5 Signature for API Parameters Using JMeter and Postman

This article explains how to dynamically encrypt API request parameters with an MD5 signature by creating a Java utility, integrating it into JMeter via a BeanShell PreProcessor, and alternatively configuring the same logic in Postman's Pre-request Script for testing and load‑testing purposes.

BeanShellJMeterMD5
0 likes · 3 min read
Implementing MD5 Signature for API Parameters Using JMeter and Postman
21CTO
21CTO
Apr 8, 2016 · Frontend Development

How to Auto-Update Static Assets with MD5 Fingerprinting in Frontend Projects

This article explains the challenges of caching static resources in frontend development, especially in environments like WeChat, and presents a solution using MD5 fingerprinting, Gulp preprocessing, manifest generation, and RequireJS mapping to automatically update only changed files while preserving cache efficiency.

MD5RequireJScaching
0 likes · 6 min read
How to Auto-Update Static Assets with MD5 Fingerprinting in Frontend Projects
Baidu Tech Salon
Baidu Tech Salon
Sep 4, 2014 · Information Security

Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming

MD5 is a one‑way hash, not an encryption method, and its 128‑bit output cannot be mathematically reversed; understanding this requires solid algorithmic and mathematical foundations, which the author argues are essential for programmers alongside broader theoretical knowledge rather than relying on mere trial‑and‑error experience.

MD5collision attackcryptography
0 likes · 7 min read
Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming