In this article, I will briefly go through hashing and encrypting, explaining the differences between them, and showing how they can be utilized in a real world scenario.