Secure Password Hashing for Python Developers

<span
class=”drop_cap”>It is important to store the passwords of user accounts in a secure fashion. There have been many high profile incidents where a security breach resulted in hackers obtaining database dumps of user passwords. The 2012 LinkedIn hack and the recent Adobe hack are two out of many similar cases. Due to the fact that the passwords were stored in an inappropriate fashion, the hackers (read as crackers) were able to recover the passwords of many user accounts and publish them on the Internet, resulting in an embarrassing PR fiasco for the companies.

Read post: “Secure Password Hashing for Python Developers

Linux and Unix nload App: Monitor Network Traffic and Bandwidth Usage In Real Time

If you want to monitor network throughput on the command line interface, use nload application. It is a console application which monitors network traffic and bandwidth usage in real time. It visualizes the in and outgoing traffic using two graphs and provides additional info like total amount of transferred data and min/max network usage.

Read post: “Linux and Unix nload App: Monitor Network Traffic and Bandwidth Usage In Real Time

Tweet this    Share on Facebook

10 Linux/Unix Bash and KSH Shell Job Control Examples

Linux and Unix are multitasking operating systems i.e. a system that can run multiple tasks (process) during the same period of time. In this new blog series, I am going to list the Linux and Unix job control commands that you can use for multitasking with the Bash or Korn or POSIX shell.

Read post: “10 Linux/Unix Bash and KSH Shell Job Control Examples

Tweet this    Share on Facebook