排序
Generating SECRET_KEY for production deployment of Django project
Generating SECRET_KEY for production deployment of Django project,Django SECRET_KEY need for providing cryptographic signing (documentation). This value is stored in <your_app&g...
Introducing Altikrity: A Multi-Layer Encryption Library
Introducing Altikrity: A Multi-Layer Encryption Library,I'm thrilled to introduce you to Altikrity, a multi-layer encryption library designed to provide robust protection for your ...
Giới thiệu căn bản về thư viện JasperReports
Giới thiệu căn bản về thư viện JasperReports,1. Lời mở đầu Trong thực tế, ta thấy yêu cầu thống kê và xuất dữ liệu ra theo một định dạng nhất định rất...
Hacking Python functions by changing their source code
Hacking Python functions by changing their source code,Welcome to the next pikoTutorial! Changing function behavior by modifying its implementation manually is obvious, but can we ...
Password Hashing in Python
Password Hashing in Python,One must never store passwords plainly. Let's learn the technique of hashing passwords securely using Python: import hashlib password = 'securepassword' ...
Two-Factor Authentication System
Two-Factor Authentication System,This project implements a basic TOTP (Time-Based One-Time Password) generator using Python's pyotp library. Code Example: import pyotp import time ...
KeePassDiff: A diff/merge tool for KeePassXC databases
KeePassDiff: A diff/merge tool for KeePassXC databases,I started using KeePass back in 2021 and I have been using it since then to store my passwords. But I didn't set up a proper ...
Trusted publishing ‐ It has never been easier to publish your python packages
Trusted publishing ‐ It has never been easier to publish your python packages,Publishing Python packages used to be a daunting task, but not any more. Even better, it has become s...
Authentication and Authorization in Django: Django session
Authentication and Authorization in Django: Django session, Introduction to Django Sessions In modern web applications, maintaining user state across multiple requests is essential...
Conquering Notification Overload: A Developer’s Guide to Digital Peace
Conquering Notification Overload: A Developer's Guide to Digital Peace,As developers, we're bombarded with notifications from multiple channels - Git repositories, CI/CD pipelines,...
Unlocking the Secrets of Authentication: A Human’s Guide to Digital Security
Unlocking the Secrets of Authentication: A Human's Guide to Digital Security , My Authentication Awakening Imagine this scenario: You're scrolling through your bank account one mor...
Understanding JWT Authentication: Spring Security’s Architecture and Go Implementation
Understanding JWT Authentication: Spring Security's Architecture and Go Implementation,After setting up JWT stateless authentication (available here), I wanted to understand what h...