Please go through the points below and answer questions in the comments and discuss them with your mates.
- What are the benefits of registration and signing in on GitHub?
- What is the difference between authentication and authorization?
- How can we prevent a request from being fulfilled? Like trying to access a private GitHub repo of someone else?
- After the user logs in using the backend end-point we create, how can we can keep that user logged in all the time without asking them to login again each time they visit the website or send a request that require authentication?
- What is base64 encoding?
- What are salt rounds? how does it work?
- What is Caesar Cipher? How only the communicating sides knows how to decrypt the message?
Yaman-Cengiz-Rasha-Dilara
1. What are the benefits of registration and signing in on GitHub?
We can interact with other users, it’s more secure, we can access our info anytime, you can save time, we can use full features of the website
2. What is the difference between authentication and authorization?
Authentication is when a user is trying to log is so that the server can check the credentials and authorize the log in. Authentication is done before accessing to the system.
authorization is when we have a multiple level inside an organization and each user has a specific level of authority and accessibility. Authorization is done after you sign in.
3. How can we prevent a request from being fulfilled? Like trying to access a private GitHub repo of someone else?
By making a repository private we can limit the access authority either to all the users inside the organizations or only to the creator and the owners of the organization, or specific authorized users, so basically adding an authorization level to that repo.
After the user logs in using the backend end-point we create, we can keep that users logged in all the time without asking them to login again each time they visit the website or send a request that requires authentication?
localStorage keeps data as key-value pairs and we can hold the user info and token even after closing the browser for a certain amount of time.
4. What is base64 encoding?
When it comes to encoding binary data that needs to be saved and transferred across ASCII-compatible media, Base64 encoding strategies are often utilized. This is done to ensure that the data is not tampered with during transit. Base64 is widely used in a variety of applications, including Multipurpose Internet Mail Extensions(MIME) email and Extensible Markup Language (XML) data storage.
5. What are salt rounds? How does it work?
Password salting is a technique to protect passwords stored in databases by adding a string of 32 or more characters and then hashing them. Salting prevents hackers who breach an enterprise environment from reverse-engineering passwords and stealing them from the database.
6. What is Caesar Cipher? How only the communicating sides knows how to decrypt the message?
It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on. To decrypt it we need to know the shift number and then we can reverse the process.