Related Posts

14 Comments

  1. Nice tutorial
    My comments, instead of using a fixed salt rather use something like this

    $salt = rand (999999, 99999999999999);
    $password = $_POST['password'] . $salt;
    $password = sha1($password);

    So every time it will be a random generated number to use as a salt.
    Regards

  2. Hello,
    My name is Stacy Hines with http://www.softwarevideo.com. We are inviting you to become an author to create training video tutorials for us as your videos are very informative and well done. What we would do is have you create courses for our site where you will make money every time one of our members clicks on your course. You can create training video tutorials wherever you are located. Additionally, you will have your own author page where you can showcase your business, portfolio, experience, etc. Once you become an author, you will make money and drive business back to you. To become an author go to: http://www.softwarevideo.com/author . For additional information, please contact me: Stacy Hines phone 951.230.1842 or stacyhines@softwarevideo.com

  3. Thank you for sharing this video. I was using only MD5, and this video helped me to learn about the vulnerability of reversing unsalted password, so now I am salting my passwords and using SHA1

Leave a Reply

Your email address will not be published.

© 2022 Code As Pro - Theme by WPEnjoy · Powered by WordPress