2013年11月30日星期六

Community News: Packagist Latest Releases for 11.30.2013

Recent releases from the Packagist:

2013年11月29日星期五

SitePoint PHP Blog: Imagick vs GD


In a new post to the SitePoint PHP blog Jacek Barecki has written up a comparison of two of the most widely used PHP image manipulation libraries - Imagick and GD.



If you want to create a thumbnail, apply a filter to an image or transform it in any other way, you will have to employ an image processing library in your PHP application. It means that you will probably choose GD or ImageMagick. But which one supports a wider range of image formats? Maybe one of them is slower than the other? What other criteria should be taken under consideration when choosing the right library?

He compares them on a few different aspects:



  • Availability
  • Supported file types
  • Functionality
  • Performance
  • Coding style
  • Popularity


He also provides three alternatives to using GD or Imagick, most involving outside services or software.


Link: http://www.sitepoint.com/imagick-vs-gd/

Site News: Popular Posts for the Week of 11.29.2013

Popular posts from PHPDeveloper.org for the past week:

Community News: Packagist Latest Releases for 11.29.2013

Recent releases from the Packagist:

Timoh's Blog: Aggressive password stretching - A solution to the low-entropy keys problem?


While not specifically related to PHP, this new post from Timoh looks at the idea of "aggressive password stretching" to help with a common problem in password-based systems - the poor choice of passwords from the application's users.



Practically speaking, "weak" means a user generated password will not contain enough guessing entropy to resist an adversary who managed to gain the user database dump, and who is able to run efficient offline attack against leaked hashes. Here comes in the need to make adversary's job harder, which is achieved by using the above-named algorithms.


He doesn't talk much about the actual password hashing itself, instead focusing on how the password stretching - the addition of more information not from the user (usually an automated source) to increase it password entropy. He goes through some of the math about how much extra work is required for an attacker with this method and some of the problems that can come with it. He talks about how much time should be spent in the hashing of the passwords and suggests that it's "a matter of finding a sweet spot between you and attacker's patience and the security gain" and not just about the security.



A bit more on the PHP-specific side, he briefly looks at the password_hash function and some of the defaults the more current frameworks use (hint: bcrypt all the things).



Proper password hashing is clearly not enough to make sure the password hashes are not weak. The other half of the job is a good password policy. No algorithm or setting will save passwords like "password" or "12345" etc. This is why we need to make sure the user's password will initially contain enough entropy itself.

Link: http://timoh6.github.io/2013/11/26/Aggressive-password-stretching.html

2013年11月28日星期四

Site News: Blast from the Past - One Year Ago in PHP

Here's what was popular in the PHP community one year ago today:

Community News: Packagist Latest Releases for 11.28.2013

Recent releases from the Packagist:

2013年11月27日星期三

Community News: Latest Releases from PHPClasses.org