Not only should you follow the recommended way to hash passwords you should be using proven code that does it the correct way. Now that these "proven methods" exists there is no need to write your own code because chances are you will make mistakes. Crackstation explains this and provides source code that you can use.