Magento 2: Disable Admin Password Expiration/Change

Magento’s backend/admin password expires in 90 days by default. So, in every 90 days, when you login to admin, you will be asked to change your admin user’s password. This is a useful security feature in production/live site. However, this can be annoying to have in a development/testing site. This article shows on how you … Read more

Cryptography: Verify file integrity with md5 hash checksum

Checksum is used to verify the data integrity of files. It can be used to detect errors while transmitting data between devices or over the internet. The checksum functions as a digital fingerprint of a file. Computer programs like md5sum and sha256sum calculate and verify checksum. md5sum calculates and verifies 128-bit MD5 hashes and sha1sum … Read more

Magento: How to disable / remove Secret Key from Admin URL?

A new secret key is created every time you login to Magento Admin. So, there will be a unique key (32 chars long) for each session of your Magento admin login. This key is appended to the admin URL as http://your-admin-url/key/743c37b1…adf6588/ This is basically added for security reason. In their release note, Magento say that … Read more

Magento: There has been an error processing your request. Exception printing is disabled by default for security reasons

Problem: I am using Magento 1.4. Homepage loads fine. When I go to category (product listing) page, it works fine. But when I go to any product detail page, I get the following error:- There has been an error processing your request Exception printing is disabled by default for security reasons. I don’t get the … Read more

Cryptography: Public-key Encryption & Digital Signature

History Public-key encryption makes key-management much easier. It was invented in 1976 by two Stanford mathematicians, Whitfield Diffie and Martin Hellman. Their discovery can be phrased simply: enciphering schemes should be asymmetric. For thousands of years all ciphers were symmetric—the key for encrypting a message was identical to the key for decrypting it, but used, … Read more