
Sessions vs JWTs - A Complete Guide to Authentication
Authentication or auth for short is the process where a server recognizes the identity of a user. This post goes over the methods for implementing authentication, each of their drawbacks, and which one you may want to choose.

How to Secure API tokens
Securing API tokens is important to avoid their misuse. This post will show you how to secure your API tokens!

Lock a Folder in Windows with no mess
Learn how to lock a folder on your computer to safeguard it from unauthorized access.
Contribute to the Genics Blog!
Genics Blog is a purely open source publication. Authors at Genics post highly resourceful content on varied topics relevant to the developer community. Join us and start publishing today!