Commit b2a91e4c by Nenad Zivkovic

Fixes typos in security-passwords.md

parent fa0418f8
...@@ -36,7 +36,7 @@ if (Yii::$app->getSecurity()->validatePassword($password, $hash)) { ...@@ -36,7 +36,7 @@ if (Yii::$app->getSecurity()->validatePassword($password, $hash)) {
Generating Pseudorandom data Generating Pseudorandom data
----------- -----------
Pseudorandom data is useful in many situations. For example when resetting a password via email you need to generate a token, save it to the database, and send it via email to end user which in turn will allow them to prove ownership of that account. It is very important that this token be unique and hard to guess, else there is a possibility and attacker can predict the token's value and reset the user's password. Pseudorandom data is useful in many situations. For example when resetting a password via email you need to generate a token, save it to the database, and send it via email to end user which in turn will allow them to prove ownership of that account. It is very important that this token be unique and hard to guess, else there is a possibility that attacker can predict the token's value and reset the user's password.
Yii security helper makes generating pseudorandom data simple: Yii security helper makes generating pseudorandom data simple:
...@@ -50,7 +50,7 @@ Note that you need to have the `openssl` extension installed in order to generat ...@@ -50,7 +50,7 @@ Note that you need to have the `openssl` extension installed in order to generat
Encryption and decryption Encryption and decryption
------------------------- -------------------------
Yii provides convenient helper functions that allow you to encrypt/decrypt data using a secret key. The data is passed through and encryption function so that only the person which has the secret key will be able to decrypt it. Yii provides convenient helper functions that allow you to encrypt/decrypt data using a secret key. The data is passed through the encryption function so that only the person which has the secret key will be able to decrypt it.
For example, we need to store some information in our database but we need to make sure only the user which has the secret key can view it (even if the application database is compromised): For example, we need to store some information in our database but we need to make sure only the user which has the secret key can view it (even if the application database is compromised):
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment