Book Image

Phalcon Cookbook

By : Serghei Iakovlev, David Schissler
1 (2)
Book Image

Phalcon Cookbook

1 (2)
By: Serghei Iakovlev, David Schissler

Overview of this book

Phalcon is a high-performance PHP framework delivered as a PHP extension. This provides new opportunities for speed and application design, which until recently have been unrealized in the PHP ecosystem. Packed with simple learning exercises, technology prototypes, and real-world usable code, this book will guide you from the beginner and setup stage all the way to advanced usage. You will learn how to avoid niche pitfalls, how to use the command-line developer tools, how to integrate with new web standards, as well as how to set up and customize the MVC application structure. You will see how Phalcon can be used to quickly set up a single file web application as well as a complex multi-module application suitable for long-term projects. Some of the recipes focus on abstract concepts that are vital to get a deep comprehension of Phalcon and others are designed as a vehicle to deliver real-world usable classes and code snippets to solve advanced problems. You’ll start out with basic setup and application structure and then move onto the Phalcon MVC and routing implementation, the power of the ORM and Phalcon Query Language, and Phalcon’s own Volt templating system. Finally, you will move on to caching, security, and optimization.
Table of Contents (17 chapters)
Phalcon Cookbook
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Securing passwords with hashing


In this recipe, we will create a solution for protecting passwords from data security breaches by using cryptographic one-way irreversible hashing. Using this technique will make it so that if anyone is ever able to penetrate the security of the website to steal the user's passwords, the data will be useless for signing into a user's profile or for using on other websites. While it may sound like we are resigning ourselves to defeat from the very start this is in fact not the best way to think about this issue.

We must do many things to protect our system and users, and each additional step simply builds our overall protection to contain a security breach from completely compromising all aspects of the system. Users may use the same password on multiple sites and this will allow us to protect their other accounts. Additionally, hashing the user passwords is a very simple step and without this step, any security audit of any value would most certainly give...