TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Hash
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Lokendra Singh (3)
Jaimin Shethiya (3)
Ziggy Rafiq (3)
Rahul Bansal (3)
Sabyasachi Mishra (3)
Shubham Kumar (3)
Ashish Bhatnagar (2)
Mohammed Asief (2)
Mariusz Postol (2)
Mahesh Chand (2)
Lokesh Varman (2)
Sathiyamoorthy S (1)
Hamed Niazmand (1)
Vijay Yadav (1)
Jitendra Mesavaniya (1)
Velladurai (1)
Rajeev Punhani (1)
VIMAL LAKHERA (1)
Pradeep Tiwari (1)
Sanjoli Gupta (1)
Ehsan Sajjad (1)
Punar Dutt Rajput (1)
Rohatash Kumar (1)
Ashwani Bakshi (1)
Nilesh Jadav (1)
Zain Ul Hassan (1)
Baibhav Kumar (1)
Dhiraj Poojary (1)
Kuppu Swami (1)
Ajay Kumar (1)
Mohit Mishra (1)
Rohan Mistry (1)
Sandeep Kumar (1)
Keyur (1)
Amr Monjid (1)
C# Curator (1)
Vijayaragavan S (1)
Harshal Limaye (1)
Stefan Djokic (1)
Prasoon (1)
Hemant Srivastava (1)
Satya Karki (1)
Praveen Kumar (1)
Vidya Vrat Agarwal (1)
Kirtesh Shah (1)
Pankaj Lohani (1)
Yukta Ranka (1)
Satendra Singh Bhati (1)
Priyanka Jain (1)
Sandeep Sharma (1)
Abhishek Dubey (1)
Richa Garg (1)
Divyang Desai (1)
John Charles Olamendy (1)
Rahul Prajapat (1)
Satyajit Paul (1)
Guest User (1)
Arif Khoja (1)
Sumit Arora (1)
Santosh Kumar Adidawarpu (1)
Afzaal Ahmad Zeeshan (1)
Atul Kumar (1)
Varun Bansal (1)
Rion Williams (1)
Mohammed Ibrahim (1)
Hashim Shafiq (1)
Rajeev Ranjan (1)
Abhishek Jaiswal (1)
Mudita Rathore (1)
Daniel Stefanescu (1)
Sateesh Arveti (1)
Gayan Peiris (1)
Gowri S Paramasivam (1)
salvatore.capuano (1)
Muhammad Shakir (1)
Mike Gold (1)
krishnan.rama (1)
Suprotim Agarwal (1)
Kirtan Patel (1)
Rajendra Kumar Yerra (1)
Hrishikesh Dhruv (1)
des_kenny (1)
Alexander Filatow (1)
Related resources for Hash
No resource found
Overview Of Azure Redis Cache
10/8/2024 9:19:02 AM.
This article explores caching techniques and their implementation in Azure, focusing on Azure Redis Cache. It explains how caching enhances web application performance by storing frequently accessed d
How to Compare Two Objects in C#
10/3/2024 7:08:40 AM.
In this article, we’ll walk through how to create a generic method that can compare the objects of any class, even those with nested collections. We’ll break it down step by step so you can implement
Understanding Table Partitioning in SQL
7/24/2024 6:07:08 AM.
Table partitioning is a technique in database design that divides large tables into smaller, manageable pieces called partitions. This approach improves query performance, enhances manageability, and
HashSet Class and TreeSet Class in Java Collections
7/19/2024 6:22:36 AM.
Explore the HashSet and TreeSet classes in Java Collections Framework. Learn how HashSet uses hashing for fast access and TreeSet maintains sorted order through a Red-Black tree.
Prefer Static HashData Method over ComputeHash in C# .NET
7/8/2024 12:20:33 PM.
In .NET, the HashData method offers a modern, efficient way to perform hashing operations, eliminating the need for instantiating hashing algorithm classes like SHA256. It simplifies code, enhances pe
Creating a User Login System with SQL Server Stored Procedures
7/2/2024 7:12:28 AM.
Implementing secure user authentication in SQL Server involves creating a UsersDetails table for storing credentials and developing a LoginUser stored procedure. This procedure validates user inputs a
Understanding the Data Structure Behind HashMap in Java
6/20/2024 9:52:15 AM.
Explore the intricate workings of HashMap in Java, a pivotal data structure in the Java Collections Framework. Understand its mechanism of storing key-value pairs using hashing, handling collisions th
Optimize Big Data Performance with Broadcast Hash Join in PySpark
5/29/2024 6:15:46 AM.
Maximize your Big Data app's performance with PySpark's Broadcast Hash Join. Utilize distributed computing, parallel processing, and Spark's optimization techniques for efficient data proc
Working With HashSet In C#
5/28/2024 11:20:47 AM.
C# HashSet, introduced in .NET 3.5 within System.Collections.Generic, is an unordered collection of unique elements. It efficiently prevents duplicate entries, outperforming lists. This article covers
How to Overcome Error "Access to the Path Containing 'hash.web' is Getting Denied."
5/28/2024 11:19:52 AM.
Encountering "Access to the Path Containing 'hash.web' is Getting Denied" error? This issue often arises due to insufficient file permissions, restrictive security settings, or locke
Hash Password Generator
5/28/2024 11:19:41 AM.
This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also c
Working with HashTable in C# 2.0
5/28/2024 11:19:16 AM.
Explore Hashtable in .NET 2.0, storing data with key-value pairs, constructors for capacity and load factor, fetching data with enumerator, clearing, and searching by key or value. Get ready for more
Working with Concurrent Hash Map in Java
5/22/2024 4:21:55 AM.
ConcurrentHashMap in Java is a thread-safe Map implementation that allows concurrent access and modification by multiple threads without external synchronization, ideal for multi-threaded environments
C# HashTable
5/21/2024 9:39:15 AM.
C#'s HashTable is a data structure storing key-value pairs using a hash function for fast retrieval. It handles collisions via chaining, ensuring efficient insertion, deletion, and retrieval opera
Dictionary vs HashTable in .NET C#
5/8/2024 10:51:33 AM.
Explore the differences between Dictionary and HashTable in .NET C#. Learn about efficient key-value storage, hashing techniques, and performance contrasts. Discover when to use Dictionary<TKey, TV
Hash Table in .NET: Syntax, Usage, Methods, and Example
5/7/2024 10:26:55 AM.
A group of key/value pairs arranged according to the key's hash code is represented by the Hashtable class. This class is contained in the namespace System. Collections. To execute different kinds
HashSet .NET C#: Usage, Methods, and Example
5/3/2024 8:40:37 AM.
A hash set is an unordered list of distinct elements in C#. In.NET 3.5, this collection is released. When we wish to stop duplicate pieces from being added to the collection, we typically utilize it.
Implementing Equality For Reference Types
4/25/2024 7:58:08 AM.
Learn how to implement equality for reference types in C# to compare objects based on their values rather than their references. Understand the complexities introduced by inheritance and null handling
Learn About Collections in Rust
4/17/2024 7:41:13 AM.
In this article, we will explore all types of collections in the Rust Programming Language. Collections are essential in Rust for efficient data management. Arrays hold fixed-size elements, vectors of
A Comprehensive Guide to Secure Coding in C#
4/16/2024 10:56:29 AM.
A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Generate the Client Side Hash Password Via MD5 Algorithm and Saving it to Database
4/4/2024 9:10:42 AM.
This article shows how to convert a plain password to a hashed password using the MD5 algorithm on the client side and save it to the database.
Generate Random Password in ASP.NET
4/3/2024 10:46:55 AM.
Generate Random Password in ASP.NET: Enhance security with ASP.NET by creating a randomized password generator. Utilize built-in features or custom code to generate strong, unpredictable passwords, bo
Authenticate the Valid User Via User id and MD5 Hashed Password
4/3/2024 9:55:02 AM.
Secure user authentication with MD5 hashed passwords and user IDs. This method ensures robust password protection by encrypting passwords before storage, enhancing system security and safeguarding use
Hashing Password With Bcrypt In Node
4/3/2024 9:36:34 AM.
Learn how to use bcryptjs library for hashing and comparing passwords in a Node.js application. Build a simple API for user registration and login, ensuring password security through bcrypt hashing. U
Make Password Hash In ASP.NET Using C#
4/3/2024 9:07:42 AM.
Learn how to enhance security in your ASP.NET applications by implementing password hashing using C#. This tutorial guides you through the process of creating hashed passwords, ensuring better protect
PiP - External Streaming Data - Useful Concepts - Part 1
3/27/2024 7:21:34 AM.
To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, co
Learn About Data Structures And Algorithm (DSA) - Part Four
3/21/2024 9:28:01 AM.
This article will tell you about the crucial concepts of data structures and algorithms in terms of understanding the comparison between the array and linked list. This article is the fourth one in th
Hashing Techniques in Data Structures and Algorithms
3/21/2024 9:02:33 AM.
Hashing in data structures utilizes hash functions to map arbitrary-sized data to fixed-size values, enabling efficient storage and retrieval within large datasets commonly employed in hash tables and
Cybersecurity of External Streaming Data - Integrity
2/14/2024 4:04:35 AM.
This article delves into cybersecurity considerations for external data, particularly streaming bitstreams. It explores the use of cryptography, focusing on hash functions to ensure the integrity of b
Load Balancing Strategies: Optimizing Performance and Reliability
1/22/2024 11:06:35 AM.
This article explores the significance of load balancing in modern computing, emphasizing its role in optimizing performance and reliability for applications dealing with varying traffic levels. It co
Understanding the One-Way Nature of HASHBYTES in SQL
1/5/2024 10:48:17 AM.
This article delves into the cryptographic world of hashing algorithms, emphasizing the irreversible nature of these functions. Learn why HASHBYTES, a widely-used function for creating hash values in
HashMaps in C#
12/26/2023 12:24:41 PM.
HashMaps in C# using the Dictionary<TKey, TValue> class. This article delves into their basics, operations, and performance, providing essential insights for efficient key-value pair management
Secure Password Hashing with SHA-256 and Salt in Python
12/7/2023 5:46:50 AM.
In this article, we have discussed SHA-256 and salt. In this article, we unravel the intricacies of a clever strategy to fortify passwords—SHA-256 with salt. SHA-256, part of the SHA-2 family, transfo
Hashtable In C#
10/20/2023 10:50:22 AM.
In this article, you will learn about C# HashTable and how to use a HashTable in C#.
Overview Of Array And Collection
10/20/2023 6:19:24 AM.
Arrays and Collections are fundamental data structures used in programming to store and manipulate multiple elements. An array is a fixed-size, ordered collection of elements of the same data type. It
TripleDES Encryption and Decryption in C#
10/16/2023 5:35:37 AM.
Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Enc
Compute SHA256 Hash In C#
10/9/2023 6:38:21 AM.
How to compute SHA256 Hash in C#. Hashing (also known as hash functions) in cryptography is a process of mapping a binary string of an arbitrary length to a small binary string of a fixed length, know
Overriding The System.Object Class Methods
9/15/2023 9:48:55 AM.
In this article you will take a look on the Object class the base class for all data types in the .NET Framework. You will see also how to give your custom type a new look by overriding the Object cla
The Object Class in .NET
9/5/2023 8:34:30 AM.
All the types in .NET are represented as objects and are derived from the Object class.
C# Security: Best Practices for Secure Coding
8/31/2023 5:05:34 PM.
In this article, we will discuss some of the best practices for writing secure code in C#. These practices include using secure password hashing algorithms to store passwords, validating user input to
Activation Link Vulnerability
8/24/2023 9:15:31 AM.
Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
Cryptography actions with Hashing in Desktop flow using Microsoft Power Automate
6/19/2023 7:06:18 AM.
Reading this article, you can learn how to apply hashing using Hash text action, Hash from file action, Hash text with key action and Hash from file with key action with Desktop flow in Microsoft Powe
Generating Cryptographic Hashes with SHA-256 in JavaScript
6/12/2023 6:53:43 AM.
HashMap in Java
1/24/2023 11:36:28 AM.
A HashMap in Java is a collection that stores key-value pairs, similar to a dictionary in other programming languages. It is part of the Java Collection Framework and is implemented as a hash table. I
Hashids - What Are They, And Why Should We Use Them?
9/9/2022 4:46:49 AM.
Defining good unique identifiers for your data isn't always obvious with both security and performance impacts to consider. Check out this article, where you can see potentially better solution wi
Hashtable Sorting
8/24/2022 8:38:40 AM.
This article gives you an idea for sorting a Hashtable.
Comparative Analysis of List, HashSet and SortedSet
8/22/2022 9:43:47 AM.
In this article, I am going to give a brief idea of List, HashSet and SortedSet performances in various situations in terms of their time complexity.
Obtain Bytecode And Hash Of Smart Contract On Stratis Blockchain
8/22/2022 5:02:33 AM.
This article provides insights into Smart contract development in C#, contract validation, byte code generation on Stratis Blockchain with an example of HelloWorld Contract.
Introduction to C#
4/26/2022 10:02:58 AM.
This article concentrates on C# language programming.
How To Support Undo And Redo In Components Based On The Jtextcomponent Class
3/11/2022 3:17:11 PM.
In this article, you will learn how to support undo and redo in components based on the jtextcomponent class.
Using .NET Collections With C#
2/23/2022 9:57:04 AM.
.NET offers a variety of collections such as ArrayList, Hashtable, queues, Dictionaries.
C# - Hashset With Example
10/22/2021 12:42:33 PM.
In this article, you will learn about C# - Hashset with Example.
Password Encryption For Forms Authentication in ASP.Net
2/3/2021 10:28:39 AM.
This article explains Forms Authentication and how to generate the encrypted password for Forms Authentication.
Blockchain - Potential Innovative Technology
7/17/2020 5:57:59 AM.
Blockchain is a technology that has the ability to build new economic and social pillars in our society. At the primary level blockchain is basically just a chain of blocks but not in a classical way.
HashMap Class in Java
1/24/2020 4:05:27 PM.
In this article you will learn about the HashMap class in java and its various methods using NetBeans IDE.
Introduction to Routing in React
11/15/2019 12:44:32 AM.
This article talks about routing in ReactJs, and how sub routing can be implemented as well.
How Various Java Collection Classes Work
9/19/2019 12:46:57 AM.
In this article we discuss working of various classes in Java collection.
Working With HashMap Class in Java
9/13/2019 1:50:00 AM.
In this article, we are going to describe the HasMap Class's functionality in Java.
HashSet In C#
7/30/2019 3:12:17 PM.
C# HashSet is a collection of unique elements. The .NET HashSet<T> class represents a hash set in C# and provides methods to add, remove, and find items, find subset, superset, union, and inters
What Is Hash Function
6/17/2019 1:16:45 AM.
In this article, we will learn about the hash function and its properties– we will also see how the hash function is useful in the blockchain.
Query Optimization in SQL Server
6/7/2019 5:05:09 AM.
This article offers suggestions on how to optimize query performance in SQL Server 2005.
Overview Of Collection, Array List, Hash Table, Sorted List, Stack And Queue
5/29/2019 8:06:33 AM.
This article provides an overview of Collections, Array Lists, Hash Tables, Sorted Lists, Stacks and Queues.
Hashtable in C#
5/7/2019 6:42:09 AM.
Hashtable is useful when you need to store data in a key and value pair. This article shows how to use hashtable in C#.
Create SharePoint List Items From Twitter Hashtags
4/7/2019 10:11:25 AM.
This article explains how to create list items in SharePoint Online from Tweets based on hashtags using Flow.
Hashing In ASP.NET Core 2.0
1/9/2018 10:41:29 AM.
The new Data Protection API in .NET Core includes functionality to create hashes using PBKDF2algorithm. ASP.NET Core uses this behind the scenes in PasswordHasher class, which is used in ASP.NET Core
How To Remove Hash From Application URL In AngularJS
5/2/2017 1:45:25 AM.
This article describes how to remove Hash from Application URL in an AngularJS.
Collections in C#
8/5/2016 6:03:34 PM.
Collection in C# is a must-know concept for every developer. This article is about Collections in C#.
Sensitive Data Exposure And Its Securing Techniques
7/7/2016 11:56:35 AM.
In this article you will learn about sensitive data exposure and its securing techniques.
Hashing Passwords In .NET Core With Tips
6/8/2016 12:11:08 AM.
In this article you will learn about how to hash passwords in .NET Core with tips.
Theory Of Hashing And Hash Tables
6/3/2016 1:47:40 PM.
In this article, you will learn different things about Hashing and Hash Tables.
File Hash Comparison With MD5 And SHA1
4/3/2016 3:20:53 PM.
In this article you will learn about File Hash Comparison with MD5 and SHA1.
Get Latest Video And Images From An Instagram Hashtag Using JQuery
12/18/2015 7:38:02 AM.
This article explains how we can get and show latest video and images along with other data of a particular Instagram Hashtag Using jQuery.
Password Encryption Using Salt Hashing In ASP.NET MVC
12/11/2015 12:53:19 AM.
This is a simple user registration page where we will be saving user password using Salted hashing and decrypt it on login.
Generating An MD5 Hash From A String Using LINQ
10/27/2015 12:30:26 PM.
In this article you will learn how to generate an MD5 Hash from a String Using LINQ.
Read Tweet From A Particular Hashtag In ASP.NET
10/7/2015 12:45:36 AM.
In this article we will learn how to fetch data from Twitter of a particular Hashtag using TweetSharp API in ASP.NET.
Simple Login Form Using MD5 Hash Algorithm
9/14/2015 7:09:22 AM.
In this article, I will show how to create a login form using MD5 hash algorithm.
How a Search Engine Works
8/24/2015 12:34:41 AM.
In this article, I will try to explain search engines and how they work. I will explain the main parts/points for building a search engine.
Introduction To Hashing and the HashTable Class: Part 3
5/18/2015 2:18:55 PM.
In this article, you will learn Hashing and the HashTable class in C# .NET.
Introduction To Hashing and the HashTable Class: Part 2
5/10/2015 7:02:16 PM.
In this article you will learn about Hashing and the HashTable class in C# .NET.
Introduction To Hashing and the HashTable Class: Part 1
5/5/2015 3:54:51 PM.
In this article you will learn about Hashing and the HashTable class in C# .NET.
Change the MD5 Hashed Password of a Valid User
8/28/2014 2:39:37 PM.
This article shows how to change the hashed password of the valid user through its user id, which is saved in a database.
Hashing Overview in PHP
6/25/2014 12:24:29 PM.
We will learn what is the significance of a hash for a secure password in PHP.
Dictionaries and Hash Table in C#
4/1/2014 3:23:06 PM.
This article explains the concept of dictionaries in C#, from the basics to the level afterwards I'll explain the concept of types of dictionaries and the concept of a hash table and it's related useful operations with their respective example.
Implementation of Router and URL Hash in Backbone.js
1/27/2014 4:24:56 PM.
In this article you will learn about the router hashing techniques. In this tutorial we will create a table of, and generates numbers link. When we click on the link then the related number will be focus.
Secure WS in VB.NET
12/1/2012 3:51:52 AM.
This code covers the .NET (VB) implementation of the security of web services using the Microsoft “The Favorites Service” security modified schema.
Hash Password Generator in VB.NET
11/10/2012 2:23:30 AM.
This visual tool generates the hashed password using either SHA1 or MD5 hashing algorithm depending on the choice you make. It will display the hashed password in the read only text box, it can also copy the hashed password to clipboard on your choice for easy paste operation.
Introduction to Parametric Singleton Pattern
10/4/2012 11:55:17 AM.
This article explains about Parametric Singleton Pattern.
Developing Secure Web Site with ASP.NET and IIS: PartII
10/3/2012 11:09:36 AM.
Authentication is a very important element of developing secure sites. It is the starting point of a secure environment for the protected resources. I have discussed several authentication mechanisms available in ASP.NET and how they join with IIS to provide a secure platform to develop sites in Part I of this article. I will be looking at Form Authentication and how to implement it in several sample web applications.
Cryptography in Microsoft.NET Part I: Encryption
10/3/2012 9:41:46 AM.
Microsoft .NET has pre-built solutions to all of these in each application domain, viz., ASP. NET, Web Services, Serviced Component etc. It enables building secured application by simple configuration as in ASP.NET to full fledged programmable security as in code access security and Cryptography.
Data Access Layer based on dataSets
9/30/2012 4:38:18 AM.
This article aims to introduce the reader to several conceptual problems encountered in the development of a generic Data Access Layer (from now on referred to as DAL).
Implementation of MD-5
9/29/2012 8:37:17 AM.
Describing, how can we implement MD5 and how it works and what is purpose of Hash algorithm.
Using Genetic Algorithms to come up with Sudoku Puzzles
9/23/2012 6:48:32 AM.
Sudoku is a new type of puzzle from Japan that will keep you entertained for a time and may even get you hooked. This article demonstrates how to generate a fully populated Sudoku grid using genetic algorithms.
Securing Your ASP.NET Web Applications
5/20/2012 12:56:33 AM.
Web application security is not just about attackers hacking websites, stealing sensitive information from websites, sending high traffic to websites with denial of service attacks, viruses, worms and Trojan horses. Are these are the only problems that we have? The answer is no. There are other problems that are frequently overlooked.
Cryptography in .NET
5/13/2012 3:07:25 AM.
This article gives a brief overview of Cryptography and the Cryptography support provided by the .NET Framework. I begin by introducing Cryptography and then proceed to examine the various types of it. In particular, I review and analyze the various cryptography algorithms and objects supported by .NET. I conclude after proposing and briefly discussing the algorithmic technique that would work best for you.
Compare two files with Hash Algorithm
4/16/2010 12:40:35 AM.
This article shows you how to compare two files using Hash Algorithm.
Cryptography in Asp.net
9/7/2007 4:28:07 AM.
This article explains what is Cryptography? Why it is needed? and the types of Cryptography.
Shuffle Game for Beginners
2/2/2006 5:24:45 AM.
This code sample is a GDI+ shuffle game aimed for beginners. Attached zip file includes the exe and the Shuffle.cs file.
Marble Solitaire Solution Display in GDI+
2/2/2006 12:49:57 AM.
The application finds and displays solutions to a game of solitaire. The application was written using Visual Studio.NET Version 7.0.9254. The test suite was written using NUnit, which is a .NET port of JUnit.
Thread Safe Collections ArrayList and Queue
1/27/2006 5:29:56 AM.
The attached project provides a dll containing a wrapper around the non-thread safe ArrayList and Queue classes. The wrapper implements the most common functions of this collection elements.