Archive for the ‘Developer Resources’ Category

JavaScript Events: Bubbling, Capturing, and Propagation

Events, in JavaScript, are occurrences that can trigger certain functionality, and can result in certain behaviour. A common example of an event, is a “click”, or a “hover”. You can set listeners to watch for these events …

Read more

Using JWT with OAuth2: When and Why

JWT and OAuth2 are different and serve separate purposes, but they are compatible and can be used together. This article goes over two basic use cases for incorporating JWT into OAuth2, as well as what advantage this might provide.

Read more

Let’s Encrypt with SSL Certificates

What is an SSL Certificate?

Let’s start with some working definitions of the HTTP and HTTPS protocols. HTTP is the Internet protocol over which data is sent between a browser and a server when they are communicating. HTTPS is the secure counterpart of HTTP…

Read more

Encryption and Hashing

Both encryption and hashing have significant uses in cryptology and other fields. One defining difference between them is that encryption is reversible, while hashing is irreversible. Because of this, encryption is often used for protecting the confidentiality of data. Only authorized people with the key should be able to access the data.

Read more

JSON Web Token

A JSON Web Token (JWT) is a JSON object that is defined in RFC 7519 as a safe way of transmitting information between two parties. Information in the JWT is digitally-signed, so that it can be verified and trusted.

Read more