Before THE advent of HTTPS, data exchanges through HTTP are transmitted in plaintext. When certain conditions are met during network data transmission, such as passing...
Some tutorials often mention that POST is more secure than GET for submitting data, but really, from a security perspective, any Http request is not...
This article introduces the steps, benefits and problems of integrating IoT applications and using CSE based on Spring Boot 2.0. Using the CSE, a prototype...
This article is a text-edited version of my Password-related PPT "My Password-related License" that I gave at the CSDN Developer conference a few months ago,...
Abstract: that year 12306 should install their own certificates... Man-in-the-middle attack: Abbreviated to MITM: A hacker is abbreviated to the two parties of communication, intercepting...
Use the Certbot tool to configure the Let's Encrypt wildcard certificate. All subdomain names under the domain name can easily use HTTPS certificates, and it...
The author of this article: Eggplant fruit, focus on front-end development field, more articles please pay attention to zhihu column "front-end small" now open each...
Most of the students should know that HTTP websites are not secure and there is the situation of middleman hijacking. Therefore, the webpage we usually...
The primary purpose of HTTPS is to create a secure channel over an insecure network and provide reasonable protection against eavesdropping and manin-the-middle attacks when...
The application of SSL/TLS ensures the dual security of encrypted transmission of Internet data from client to server and website identity authentication. More and more...
Abstract: "IP direct connection scheme" is mainly to solve DNS pollution, save DNS resolution time, usually we can use NSURLProtocol in the project to intercept...
Here are 8 common security issues you may encounter when developing a front-end application: XSS beware of iframe, don't be clickjacked, False inference fire, theft,...
Certbot's website is https://certbot.eff.org/, we open the link, select the web server and operating system for their own use. After the selection, the official website...
Large-scale container technology application is never an independent project, but a collection of virtualization technology, container scheduling, task scheduling, operating system, container warehouse, cross-node network,...
Today, I need to use HTTPS for small programs. I looked for information on the Internet. There are appropriate and inappropriate ones, and there are...
One hundred years of repair with the ship crossing, in March repair a version, congratulations Kubernetes successful emperor. It has been updated quarterly since 1.0GA...
In my previous traffic hijacking article, I talked about an "HTTPS downgrading" scheme -- replacing all HTTPS hyperlinks in a page with HTTP versions, so...
This article describes how to monitor victim traffic and obtain sensitive information through SSLstrip attack in a LAN. It is divided into the following two...