Tagged articles
5 articles
Page 1 of 1
IT Architects Alliance
IT Architects Alliance
Jun 22, 2022 · Information Security

Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation

This article examines the challenges of securing API interfaces—including authentication for third‑party services and protection against request hijacking—and proposes a comprehensive RPC encryption framework that uses asymmetric and symmetric keys, signed payloads, and HTTPS fallback, detailing both client‑side and server‑side workflows, data structures, and providing links to the full source code.

API SecurityAuthenticationInformation Security
0 likes · 5 min read
Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation
21CTO
21CTO
Jun 10, 2016 · Information Security

Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures

This article explains what HTTP and DNS hijacking are, illustrates real-world examples, analyzes root causes such as ad injection and malicious attacks, and presents concrete anti‑hijacking techniques like data legitimacy checks, timeliness verification, HttpDNS, and operator cache mitigation.

DNS hijackingHTTP hijackingHTTPDNS
0 likes · 10 min read
Understanding HTTP & DNS Hijacking: Causes, Risks, and Practical Countermeasures
Architect
Architect
Jul 19, 2015 · Information Security

Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps

This article explains the mechanisms of HTTP and DNS hijacking, illustrates real‑world examples, analyzes their causes and impacts on mobile applications, and presents practical anti‑hijacking techniques such as data validation, HttpDNS, ISP cache handling, illegal redirect blocking, and monitoring strategies.

DNS hijackingHTTP hijackingMobile Security
0 likes · 10 min read
Understanding HTTP and DNS Hijacking and Practical Anti‑Hijacking Solutions for Mobile Apps