The backend to a successful email verification system has now been installed. Only the decoration (eye candy) remains.
So what is email verification!
Step 1 – The subscriber fills out a form and submits it.
Step 2 – His data is checked for proper format and passed through a filter to clean it of foul play (a possible malicious hack).
Step 3 – A hash (one-way encryption) is created from a randomly generated password and placed into a database along with the user’s email address and other less sensitive information that he entered into the subscription form.
Step 4 – A confirmation email is sent to the user along with the encrypted password (hash) in the form of a verification link.
Step 5 – When the user clicks on the link, the hash is sent to a webpage that compares the returned hash with the email address and the hash stored in the database.
Step 6 – If a match is found the user’s account is activated, and the user is informed of his new account via another email that contains his first free edition of Seven Gates, Grammar Captive‘s weekly newsletter.
The user’s password is never seen, but by the user, and only then, if it is sent to him. It is the hash that gets stored, and the hash cannot be decrypted. For the moment, not even the password will be sent, as the user will have no need of it. It will simply perish in the system.
This coming week will be spent on the completion of a personalized newsletter, the styling of the subscription page, and another unpublished podcast.
Roddy