In this chapter, we will cover the following recipes:
- Asking for passwords—when asking for a password in a terminal-based software, make sure you don't leak it.
- Hashing passwords—how can passwords be stored without a risk of leaking them?
- Verifying a file's integrity—how to check that a file transferred over a network wasn't corrupted.
- Verify a message's integrity—how to check that a message you are sending to another software hasn't been altered.