Tag

password hashing

1 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Mar 10, 2025 · Information Security

Security Protection Strategies and Vulnerability Mitigation for PHP Applications

This article examines essential security measures for PHP applications, covering protection against SQL injection, XSS, CSRF, unsafe file uploads, session fixation, weak passwords, error disclosure, and the importance of HTTPS, with practical code examples and configuration tips to build more resilient web services.

CSRFFile UploadHTTPS
0 likes · 8 min read
Security Protection Strategies and Vulnerability Mitigation for PHP Applications
php中文网 Courses
php中文网 Courses
Jul 16, 2024 · Backend Development

Using PHP password_hash Function for Secure Password Hashing

This article explains how to securely hash passwords in PHP using the password_hash function, covering the concept of hashing, code examples for creating and verifying hashes, automatic salting, and best practices for protecting user credentials.

Backend DevelopmentPHPSecurity
0 likes · 5 min read
Using PHP password_hash Function for Secure Password Hashing
php中文网 Courses
php中文网 Courses
Jul 1, 2024 · Information Security

PHP Security Best Practices: Protecting Applications from Common Vulnerabilities

This article explains why PHP security is critical and outlines five common PHP vulnerabilities—SQL injection, XSS, CSRF, remote code execution, and file inclusion—along with comprehensive best‑practice recommendations such as input validation, secure password storage, session management, error handling, and continuous learning.

Best PracticesPHPSecurity
0 likes · 18 min read
PHP Security Best Practices: Protecting Applications from Common Vulnerabilities
macrozheng
macrozheng
May 9, 2024 · Information Security

Why Servers Never Store Your Original Password: A Deep Dive into Secure Hashing

This article explains why servers cannot know your original password, covering the principles of password hashing, the difference between cryptographic and non‑cryptographic hash functions, the role of salts, and a Java example using SHA‑256 with salt to securely store passwords.

JavaSHA-256Security
0 likes · 6 min read
Why Servers Never Store Your Original Password: A Deep Dive into Secure Hashing
php中文网 Courses
php中文网 Courses
Apr 26, 2024 · Backend Development

PHP Password Encryption Methods: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash, and crypt—providing detailed code examples and guidance on securely storing user passwords during registration and login processes.

MD5PHPSecurity
0 likes · 5 min read
PHP Password Encryption Methods: md5, password_hash, and crypt
macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

Information SecurityKDFMD5
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
php中文网 Courses
php中文网 Courses
Feb 8, 2024 · Backend Development

Password Encryption Methods in PHP: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash (using BCrypt), and crypt—detailing their security considerations and providing complete code examples for user registration and login verification.

MD5Securitybackend
0 likes · 6 min read
Password Encryption Methods in PHP: md5, password_hash, and crypt
php中文网 Courses
php中文网 Courses
Oct 11, 2023 · Information Security

Best Practices for Data Security and Encryption in PHP Development

This article explains essential PHP techniques—including HTTPS, password hashing, prepared statements, encryption algorithms, and captchas—along with practical code examples to help developers protect sensitive data from attacks and leaks.

Data SecurityPHPcaptcha
0 likes · 4 min read
Best Practices for Data Security and Encryption in PHP Development
php中文网 Courses
php中文网 Courses
May 20, 2023 · Information Security

Preventing Brute‑Force Attacks in PHP Applications

This article explains what brute‑force attacks are, why they threaten PHP applications, and presents three practical defenses—two‑factor authentication, enforced password policies, and brute‑force mitigation techniques—along with complete PHP code examples for each method.

Brute ForceSecurityTwo-factor authentication
0 likes · 4 min read
Preventing Brute‑Force Attacks in PHP Applications
Code Ape Tech Column
Code Ape Tech Column
Sep 14, 2022 · Information Security

Understanding BCrypt and Password Hashing in Spring Security

This article explains the differences between hashing and encryption, demonstrates Java's built‑in hash implementations, discusses the insecurity of MD5 and rainbow‑table attacks, and provides a detailed guide on using BCrypt with Spring Security, including code examples and the PasswordEncoder interface.

Information SecuritySpring Securitybcrypt
0 likes · 12 min read
Understanding BCrypt and Password Hashing in Spring Security
Jike Tech Team
Jike Tech Team
Aug 29, 2019 · Information Security

Why Argon2 Beats Traditional Password Hashes: A Deep Dive into Memory‑Hard Functions

Argon2, the 2015 PHC champion, is a memory‑hard password‑hashing function that leverages large memory usage and configurable parameters to thwart GPU, FPGA, and ASIC attacks, offering three variants (d, i, id) and detailed security, performance, and implementation analysis.

Argon2Securitycryptography
0 likes · 16 min read
Why Argon2 Beats Traditional Password Hashes: A Deep Dive into Memory‑Hard Functions
Architect
Architect
Feb 25, 2016 · Information Security

Password Hashing with PBKDF2 in C# (ASP.NET) and Ruby on Rails

The article presents complete, licensed implementations of salted PBKDF2‑SHA1 password hashing for both ASP.NET (C#) and Ruby on Rails, detailing the source code, usage methods, and verification procedures to securely store and validate passwords.

ASP.NETC++PBKDF2
0 likes · 7 min read
Password Hashing with PBKDF2 in C# (ASP.NET) and Ruby on Rails
Architect
Architect
Feb 25, 2016 · Information Security

Proper Password Hashing: Salting, Key Stretching, and Secure Implementation

This article explains why simple password hashing is insufficient, describes common attacks such as dictionary, brute‑force, lookup‑table and rainbow‑table attacks, and provides best‑practice guidance—including random salts, CSPRNGs, key‑stretching algorithms like PBKDF2, bcrypt and scrypt—and complete PHP reference implementations.

PBKDF2PHPSecurity
0 likes · 34 min read
Proper Password Hashing: Salting, Key Stretching, and Secure Implementation
High Availability Architecture
High Availability Architecture
Jul 30, 2015 · Information Security

Web Application Security Threats and Mitigation Strategies

This article outlines the most common web application security threats—including XSS, SQL injection, CSRF, transmission hijacking, credential leaks, brute‑force attacks, and token theft—and provides practical mitigation techniques such as proper escaping, CSP, parameterized queries, CSRF tokens, HTTPS, HSTS, HPKP, encrypted password storage, two‑factor authentication, and robust token handling.

CSPCSRFHTTPS
0 likes · 26 min read
Web Application Security Threats and Mitigation Strategies
Architect
Architect
Jun 9, 2015 · Information Security

Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.

The article explains that general‑purpose hash functions like MD5 and SHA families are fast and vulnerable to brute‑force attacks, while bcrypt’s deliberately slow, work‑factor‑adjustable design makes it a far more secure choice for storing passwords.

Securitybcryptcryptography
0 likes · 4 min read
Why Use bcrypt for Password Hashing Instead of MD5, SHA1, SHA256, etc.