You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Blog 5.2 - Password Hashing.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -152,4 +152,4 @@ The final step in the process is to build ourselves a tool to send out the e-mai
152
152
153
153
##Strong New Hash
154
154
155
-
With a minimum of effort we now have a very strong password hashing algorithm in place. The complexity of the hash should be enough to keep us safe for quite some time. Because the algorithm is tuneable we can increase the number of itterations from the default 1000 as computing power increases.
155
+
With a minimum of effort we now have a very strong password hashing algorithm in place. The complexity of the hash should be enough to keep us safe for quite some time. Because the algorithm is tuneable we can increase the number of iterations from the default 1000 as computing power increases.
0 commit comments