Tagged articles
7 articles
Page 1 of 1
php Courses
php Courses
Jan 8, 2026 · Backend Development

Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code

This guide walks through three common PHP password‑hashing techniques—md5, password_hash (BCrypt), and crypt—showing complete registration and login code samples, highlighting security drawbacks of md5 and recommending stronger, salted hashing for safe user authentication.

Backend SecurityMD5crypt
0 likes · 5 min read
Secure PHP Password Storage: md5, password_hash, and crypt Explained with Code
php Courses
php Courses
Apr 26, 2024 · Backend Development

PHP Password Encryption Methods: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash, and crypt—providing detailed code examples and guidance on securely storing user passwords during registration and login processes.

BackendMD5crypt
0 likes · 5 min read
PHP Password Encryption Methods: md5, password_hash, and crypt
php Courses
php Courses
Feb 8, 2024 · Backend Development

Password Encryption Methods in PHP: md5, password_hash, and crypt

This article explains three common PHP password encryption techniques—md5, password_hash (using BCrypt), and crypt—detailing their security considerations and providing complete code examples for user registration and login verification.

MD5cryptpassword hashing
0 likes · 6 min read
Password Encryption Methods in PHP: md5, password_hash, and crypt
Programmer DD
Programmer DD
Dec 20, 2021 · Operations

Master Linux System Commands: crypt, kill, shred, zombies, at & daemons Explained

This article introduces essential Linux commands—including crypt for file encryption, kill variants for terminating processes, shred for secure deletion, zombie process identification, the at scheduler, and daemon management—explaining their usage, options, and practical examples for effective system administration.

Linuxcryptdaemons
0 likes · 7 min read
Master Linux System Commands: crypt, kill, shred, zombies, at & daemons Explained
21CTO
21CTO
Oct 13, 2019 · Information Security

How Ken Thompson’s Vintage Unix Password Was Finally Cracked

Leah Neukirchen uncovered historic Unix passwords, cracked many using John the Ripper and hashcat, and after months of effort Nigel Williams finally revealed Ken Thompson’s long‑uncracked password, which turns out to be a clever chess‑notation hint.

Information SecurityKen ThompsonUnix
0 likes · 4 min read
How Ken Thompson’s Vintage Unix Password Was Finally Cracked
MaGe Linux Operations
MaGe Linux Operations
Nov 6, 2017 · Operations

Spooky Linux Commands: Crypt, Kill, Shred, Zombies, and More

As Halloween approaches, this guide explores Linux commands with eerie names—crypt for encryption, kill families for terminating processes, shred for secure deletion, zombie processes, at midnight scheduling, and daemon services—providing examples and practical tips for each.

cryptdaemonskill
0 likes · 6 min read
Spooky Linux Commands: Crypt, Kill, Shred, Zombies, and More