1. Question:What is the most convenient hashing method to be used to hash passwords? 

    Answer
    It is preferable to use crypt() which natively supports several hashing algorithms or the function hash() which supports more variants than crypt() rather than using the common hashing algorithms such as md5, sha1 or sha256 because they are conceived to be fast. hence, hashing passwords with these algorithms can vulnerability.

    1. Report
  2. Question:Which cryptographic extension provide generation and verification of digital signatures? 

    Answer
    The PHP-openssl extension provides several cryptographic operations including generation and verification of digital signatures.

    1. Report
  3. Question:What is htaccess? Why do we use this and Where? 

    Answer
    .htaccess files are configuration files of Apache Server which provide a way to make configuration changes on a per-directory basis. A file, containing one or more configuration directives, is placed in a particular document directory, and the directives apply to that directory, and all sub directories thereof.

    1. Report
  4. Question:34.What are the benefits of using PEAR? 

    Answer
    PHP users have a particularly useful trove of code at their disposal, made available through the PHP Extension and Application Repository, better known as PEAR. 

    1.PEAR taking advantage of this community-driven service will save you countless hours of programming time.
    2.PEAR packages are available for accomplishing everything from creating barcode images,
    compressing files, abstracting database access, documenting code, and much more.

    1. Report
  5. Question:What is data encryption? 

    Answer

    Data Encryption:
    Data encryption can be defined as the translation of data into a format that is intended to be unreadable by anyone except the intended party. The intended party can then decode, or decrypt, the encrypted data through the use of some secret, typically a secret key or password.

    1. Report
  6. Question:What are the three methodology of authentication? 

    Answer
    coming soon...

    1. Report
  7. Question:What are the PHP authentication variables? 

    Answer
    coming soon...

    1. Report
  8. Question:

    Breifly explain the following functions:

    1. explode()
    2. list()
    3. fwrite()
    4. fputs()
    5. fclose()
    6. md5()
    7. rand()
    8. uniqid()
    9. substr()
    10. filter_var()
     

    Answer
    coming soon...

    1. Report
  9. Question:How to send http authentication header with php header() function? 

    Answer
    coming soon...

    1. Report
  10. Question:What are the four lines we need to write to .htaccess file to restrict any folder in the webserver? 

    Answer
    coming soon...

    1. Report
Copyright © 2024. Powered by Intellect Software Ltd