this post was submitted on 07 May 2025
290 points (95.0% liked)

Technology

69846 readers
5132 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Paywall removed: https://archive.is/ydJJN

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 5 points 1 day ago* (last edited 1 day ago)

If you’re coding or whatever this is fine.

I want coders to learn from trusted sources too. How do you authorize a user and store the password (plain text, hash, encrypt)? Do you use MD5 or SHA-256? (Always hash passwords, don't use MD5)

If you have to encrypt some information, do you use AES or Triple DES ? (never Triple DES)

When authorizing with OAuth, should one send the auth url, client id, client secret, scopes, and redirect url to the client machine? (yes, yes, no, yes, yes)


These are basic questions with answers that are easy to find...and many programmers get them very, very wrong. Mostly out of carelessness, often the question itself doesn't even pop into their head.

Relavent XKCD