From 2ef0afb415a0b6e8ecb1a23e850ff6c4fba46e71 Mon Sep 17 00:00:00 2001 From: hashim <116718140+hashimahammad@users.noreply.github.com> Date: Thu, 6 Nov 2025 16:08:50 +0530 Subject: [PATCH] Update password storage reference link The Codahale password-storage article link was no longer accessible, so I updated it to a new credible resource covering secure password storage best practices. --- src/content/4/en/part4c.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/4/en/part4c.md b/src/content/4/en/part4c.md index 649601f7b82..14a36ad0df0 100644 --- a/src/content/4/en/part4c.md +++ b/src/content/4/en/part4c.md @@ -248,7 +248,7 @@ module.exports = usersRouter The password sent in the request is not stored in the database. We store the hash of the password that is generated with the _bcrypt.hash_ function. -The fundamentals of [storing passwords](https://codahale.com/how-to-safely-store-a-password/) are outside the scope of this course material. We will not discuss what the magic number 10 assigned to the [saltRounds](https://github.com/kelektiv/node.bcrypt.js/#a-note-on-rounds) variable means, but you can read more about it in the linked material. +The fundamentals of [storing passwords](https://bytebytego.com/guides/how-to-store-passwords-in-the-database/) are outside the scope of this course material. We will not discuss what the magic number 10 assigned to the [saltRounds](https://github.com/kelektiv/node.bcrypt.js/#a-note-on-rounds) variable means, but you can read more about it in the linked material. Our current code does not contain any error handling or input validation for verifying that the username and password are in the desired format.