From e5618e81e4eae96b87da19373bddfc6e03a9ac34 Mon Sep 17 00:00:00 2001 From: Chris Christoff Date: Sat, 22 Jun 2013 10:14:19 -0300 Subject: [PATCH 1/3] Update 07-03-01-Password-Hashing.md --- _posts/07-03-01-Password-Hashing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/07-03-01-Password-Hashing.md b/_posts/07-03-01-Password-Hashing.md index 88f6f55..9ae41fc 100644 --- a/_posts/07-03-01-Password-Hashing.md +++ b/_posts/07-03-01-Password-Hashing.md @@ -10,7 +10,7 @@ It is important that you properly [_hash_][3] passwords before storing them. Pas **Hashing passwords with `password_hash`** -In PHP 5.5 `password_hash` will be introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will be updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. +In PHP 5.5 `password_hash` was be introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will be updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. Below we hash a string, we then check the hash against a new string. Because our two source strings are different ('secret-password' vs. 'bad-password') this login will fail. From 97caf3e9ef627cd3f09699154fca4d9b8e1ee6b4 Mon Sep 17 00:00:00 2001 From: Chris Christoff Date: Sat, 22 Jun 2013 10:16:01 -0300 Subject: [PATCH 2/3] Update 05-05-01-Exceptions.md --- _posts/05-05-01-Exceptions.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/_posts/05-05-01-Exceptions.md b/_posts/05-05-01-Exceptions.md index 685caa1..56311b6 100644 --- a/_posts/05-05-01-Exceptions.md +++ b/_posts/05-05-01-Exceptions.md @@ -38,6 +38,10 @@ catch(Fuel\Email\SendingFailedException $e) { // The driver could not send the email } +finally +{ + // Use this to let user know email was sent +} {% endhighlight %} ### SPL Exceptions From c618db21e9ab111a4b5e64ecb547d1add871be90 Mon Sep 17 00:00:00 2001 From: Chris Christoff Date: Thu, 4 Jul 2013 14:35:50 -0400 Subject: [PATCH 3/3] Update 07-03-01-Password-Hashing.md --- _posts/07-03-01-Password-Hashing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/07-03-01-Password-Hashing.md b/_posts/07-03-01-Password-Hashing.md index 9ae41fc..b44d230 100644 --- a/_posts/07-03-01-Password-Hashing.md +++ b/_posts/07-03-01-Password-Hashing.md @@ -10,7 +10,7 @@ It is important that you properly [_hash_][3] passwords before storing them. Pas **Hashing passwords with `password_hash`** -In PHP 5.5 `password_hash` was be introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will be updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. +In PHP 5.5 `password_hash` was introduced. At this time it is using BCrypt, the strongest algorithm currently supported by PHP. It will be updated in the future to support more algorithms as needed though. The `password_compat` library was created to provide forward compatibility for PHP >= 5.3.7. Below we hash a string, we then check the hash against a new string. Because our two source strings are different ('secret-password' vs. 'bad-password') this login will fail.