Summary
In this chapter, you learned how to encrypt and decrypt using symmetric encryption, how to generate a salted hash, how to find out who is running the application, and how to check that the user running the application is allowed to access a feature of the application.
In the next chapter, you will use the Task
type to improve the performance of your applications.