Support My TikTokFollow Me

Hashing v.s. Encryption!

January 26th, 2025

In this tutorial, I break down the key differences between hashing and encryption in data security. I explain how hashing is a one-way function used to verify data integrity (such as passwords), while encryption is a two-way process that allows data to be encoded and later decrypted using a key. The video also highlights practical examples of when to use each approach in real-world applications, helping developers understand which method is suitable for protecting sensitive information.


Recent videos

Hashing v.s. Encryption!

a y

In this tutorial, I break down the key differences between hashing and encryption in data security. I explain how hashing is a one-way function used to verify data integrity (such as passwords), while encryption is a two-way process that allows data to be encoded and later decrypted using a key. The video also highlights practical examples of when to use each approach in real-world applications, helping developers understand which method is suitable for protecting sensitive information.

Membuat pohon natal pakai JavaScript!

a y

In this video, I make a simple challenge to make a christmas tree in the console with for loops.

Pake line-clamp biar gak kepanjangan👌🏻

a y

In this tutorial, I demonstrate how to use Tailwind CSS’s line-clamp utility to control text overflow and limit the number of visible lines in a paragraph or component. The video covers real-world examples such as truncating long descriptions in cards or previews, improving UI readability, and maintaining a clean layout without manually writing custom CSS.

Biar password ga ketauan isinya apa, wajib kudu mesti dihash!

a y

In this tutorial video, I demonstrate how to securely hash passwords using bcrypt in a Node.js environment. The video explains the concept of salting and hashing, showing how bcrypt generates unique hashes even for identical passwords. It emphasizes the importance of storing hashed values instead of plain text passwords to protect user data against leaks and brute-force attacks.

© 2026 Reinhard Kevin @reinhaaard13