Abstract: The growing number of data breaches has brought attention to how important it is for web apps to use secure password hashing procedures. The drawbacks of conventional hashing algorithms, ...
Learned how password leak databases (like Have I Been Pwned) work. Used Python’s requests library to access the Pwned Passwords API. Implemented a local, privacy-safe password checker. Compared SHA-1 ...
ABSTRACT: Educational software deployment in Sub-Saharan Africa faces significant challenges due to intermittent internet connectivity and limited digital payment infrastructure. This necessitates ...