Tag

MD5

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 15, 2025 · Operations

How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux

This guide explains the principles of MD5 and SHA‑512 checksums, demonstrates how to generate and compare them using md5sum and sha512sum commands, and shows practical steps to ensure files remain unchanged during transfer or storage on Linux systems.

LinuxMD5SHA-512
0 likes · 7 min read
How to Verify File Integrity with MD5 and SHA‑512 Checksums on Linux
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Feb 17, 2025 · Backend Development

Large File Upload with Chunking, Instant Upload, and Resume Using React, Vue and NestJS

This article explains how to implement a large‑file upload system that splits files into chunks, computes MD5 hashes for instant‑upload detection, supports breakpoint resume, and merges the chunks on the server using React or Vue on the frontend and NestJS with TypeScript on the backend.

ChunkingFile UploadMD5
0 likes · 6 min read
Large File Upload with Chunking, Instant Upload, and Resume Using React, Vue and NestJS
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 12, 2024 · Information Security

How to Compute an MD5 Hash of a String in Java Using MessageDigest

This article explains how to generate an MD5 hash for a string in Java with the java.security.MessageDigest class, provides a complete example program, details each step of the MD5 algorithm, and describes the core methods and internal workings of MessageDigest for cryptographic hashing.

HashingJavaMD5
0 likes · 12 min read
How to Compute an MD5 Hash of a String in Java Using MessageDigest
php中文网 Courses
php中文网 Courses
Apr 26, 2024 · Backend Development

PHP Password Encryption Methods: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash, and crypt—providing detailed code examples and guidance on securely storing user passwords during registration and login processes.

BackendMD5PHP
0 likes · 5 min read
PHP Password Encryption Methods: md5, password_hash, and crypt
Java Tech Enthusiast
Java Tech Enthusiast
Apr 13, 2024 · Information Security

Why Websites Require Password Reset Instead of Revealing Original Passwords

Websites cannot reveal original passwords because they store only salted, one‑way hashes, not the plaintext, making recovery impossible; therefore, when users forget their credentials, the secure approach is to verify identity and issue a password reset rather than expose any stored data.

AuthenticationHashingMD5
0 likes · 6 min read
Why Websites Require Password Reset Instead of Revealing Original Passwords
macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

KDFMD5bcrypt
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
php中文网 Courses
php中文网 Courses
Feb 8, 2024 · Backend Development

Password Encryption Methods in PHP: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash (using BCrypt), and crypt—detailing their security considerations and providing complete code examples for user registration and login verification.

BackendMD5crypt
0 likes · 6 min read
Password Encryption Methods in PHP: md5, password_hash, and crypt
Selected Java Interview Questions
Selected Java Interview Questions
Jun 9, 2023 · Backend Development

Debugging a First‑Request MD5 Performance Bottleneck in a Java Backend with Arthas

The article recounts how a Java backend’s MD5‑based snapshot generation caused the first request to time out, details the investigation using Arthas to pinpoint the slow initialization of BouncyCastle algorithms, and explains the final fix by switching to a lightweight MD5 implementation.

ArthasBackendJava
0 likes · 9 min read
Debugging a First‑Request MD5 Performance Bottleneck in a Java Backend with Arthas
Xingsheng Youxuan Technology Community
Xingsheng Youxuan Technology Community
Sep 27, 2022 · Frontend Development

How WebAssembly Supercharges Front‑End File Hashing Compared to JavaScript

By replacing JavaScript’s SparkMD5 with a Rust‑compiled WebAssembly module, the team dramatically reduced MD5 hash computation time for large files, cutting processing from over 30 seconds to under 7 seconds, while also improving CPU usage and enhancing data security for their cloud storage project.

File HashingMD5Rust
0 likes · 6 min read
How WebAssembly Supercharges Front‑End File Hashing Compared to JavaScript
Java Architect Essentials
Java Architect Essentials
Sep 20, 2022 · Backend Development

Server‑Side Request Deduplication in Java Using Redis and MD5

The article explains how to prevent duplicate write requests on the server by using unique request IDs with Redis, computing MD5 digests of business parameters (excluding volatile fields like timestamps), and provides a reusable Java helper class with example code and test logs.

JavaMD5Redis
0 likes · 9 min read
Server‑Side Request Deduplication in Java Using Redis and MD5
Code Ape Tech Column
Code Ape Tech Column
Aug 3, 2022 · Backend Development

Server‑Side Request Deduplication Using Unique IDs and Parameter Hashing in Java

The article explains how to prevent duplicate write requests on the server side by using unique request identifiers stored in Redis, hashing request parameters (with optional exclusion of volatile fields) to generate MD5 signatures, and provides a reusable Java utility class with example code and logs.

BackendIdempotencyJava
0 likes · 9 min read
Server‑Side Request Deduplication Using Unique IDs and Parameter Hashing in Java
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESEncryptionMD5
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
IT Architects Alliance
IT Architects Alliance
May 23, 2022 · Backend Development

Server‑Side Request Deduplication Using Redis and MD5 in Java

The article explains how to prevent duplicate requests on the server side by using unique request IDs, business‑parameter hashing with MD5, exclusion of volatile fields, and atomic Redis SETNX operations, providing a complete Java implementation and testing logs.

BackendIdempotencyJava
0 likes · 11 min read
Server‑Side Request Deduplication Using Redis and MD5 in Java
Top Architect
Top Architect
May 21, 2022 · Backend Development

Handling Duplicate Requests in Backend Services with Redis and Java

This article explains various techniques for detecting and preventing duplicate backend requests—using unique request IDs, business parameter hashing, MD5 summaries, and Redis SETNX with expiration—providing Java code examples and a complete deduplication utility.

BackendDuplicate RequestJava
0 likes · 9 min read
Handling Duplicate Requests in Backend Services with Redis and Java
Top Architect
Top Architect
Apr 29, 2022 · Backend Development

Server‑Side Request Deduplication Using Redis and Java

The article explains how to prevent duplicate user requests on the server by using unique request IDs, hashing request parameters, excluding volatile fields, and implementing an atomic Redis SETNX‑with‑expiration pattern with Java code examples and a reusable deduplication helper class.

BackendIdempotencyJava
0 likes · 10 min read
Server‑Side Request Deduplication Using Redis and Java
Java Architect Essentials
Java Architect Essentials
Apr 23, 2022 · Backend Development

Server‑Side Request Deduplication Strategies in Java

The article explains how to prevent duplicate user requests on the server side by using unique request IDs with Redis, constructing business‑parameter keys, computing MD5 digests of sorted JSON payloads, and provides a complete Java utility class with code examples and testing logs.

BackendJavaMD5
0 likes · 10 min read
Server‑Side Request Deduplication Strategies in Java
Architect's Tech Stack
Architect's Tech Stack
Apr 9, 2022 · Backend Development

Server‑Side Request Deduplication Using Unique IDs, Parameter Hashing, and Redis in Java

This article explains how to prevent duplicate user requests on the server side by leveraging unique request IDs, hashing request parameters (excluding time fields) to generate MD5 signatures, and implementing an atomic Redis SETNX‑with‑expiration solution in Java, complete with utility code and test logs.

BackendJavaMD5
0 likes · 9 min read
Server‑Side Request Deduplication Using Unique IDs, Parameter Hashing, and Redis in Java
Selected Java Interview Questions
Selected Java Interview Questions
Apr 6, 2022 · Backend Development

Server‑Side Request Deduplication Using Redis and Java

This article explains how to prevent duplicate user requests on the server side by leveraging unique request IDs or business‑parameter MD5 hashes with Redis, provides Java helper utilities, code examples, and practical tips for handling time‑related fields and atomic SETNX operations.

BackendJavaMD5
0 likes · 9 min read
Server‑Side Request Deduplication Using Redis and Java
Code Ape Tech Column
Code Ape Tech Column
Apr 3, 2022 · Backend Development

Server‑Side Request Deduplication Using Unique IDs and Parameter Hashing in Java

The article explains how to prevent duplicate requests on the server side by using unique request identifiers stored in Redis, hashing request parameters (excluding volatile fields) with MD5, and provides a reusable Java helper class with example code and test logs.

BackendIdempotencyJava
0 likes · 7 min read
Server‑Side Request Deduplication Using Unique IDs and Parameter Hashing in Java
Code Ape Tech Column
Code Ape Tech Column
Jan 27, 2022 · Backend Development

Implementing Fast File Upload: Instant Upload, Chunked Upload, and Resume Upload with Java Backend

This article explains how to improve large file upload experience by using instant (MD5‑based) upload, chunked (slice) upload, and breakpoint‑resume upload, detailing the Redis‑based state management and providing Java backend implementations with RandomAccessFile and MappedByteBuffer.

BackendChunked UploadFile Upload
0 likes · 16 min read
Implementing Fast File Upload: Instant Upload, Chunked Upload, and Resume Upload with Java Backend