How to Search on Securely Encrypted Database Fields
Scott explains how we can have a secure, encrypted, and hack-proof database, but still use normal SELECT and search queries on it. Interesting stuff!
Scott explains how we can have a secure, encrypted, and hack-proof database, but still use normal SELECT and search queries on it. Interesting stuff!
David Bush discusses the importance of understanding core functionality in Rails, showing how indexes work and how to implement a database by yourself.