Tag

cookie

0 views collected around this technical thread.

Top Architecture Tech Stack
Top Architecture Tech Stack
May 15, 2025 · Backend Development

Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions

This article explains the Cookie + Session mechanism for maintaining user state, discusses its limitations such as size, performance and security, examines challenges in distributed environments, and reviews common solutions including session replication, sticky load balancing, centralized storage, and the use of ThreadLocal for small‑scale backend applications.

Web Developmentbackendcookie
0 likes · 17 min read
Understanding Cookie + Session Mechanism and Distributed Session Sharing Solutions
Lobster Programming
Lobster Programming
Jan 23, 2025 · Backend Development

How to Implement Secure Auto‑Login with Cookie + Token in Java Spring

This guide explains how to create a seamless auto‑login feature by persisting a token in a cookie after the first successful login, storing the token in Redis, and validating it on subsequent visits, complete with Java Spring code examples.

Auto LoginJavaSpring
0 likes · 5 min read
How to Implement Secure Auto‑Login with Cookie + Token in Java Spring
php中文网 Courses
php中文网 Courses
Dec 27, 2024 · Backend Development

Using PHP's setcookie Function to Create and Manage Cookies

This article explains the PHP setcookie function, detailing its syntax, parameters, and practical examples for setting cookies with various attributes such as expiration time, path, domain, security, and HttpOnly flags.

Securitycookiesetcookie
0 likes · 4 min read
Using PHP's setcookie Function to Create and Manage Cookies
Architect's Guide
Architect's Guide
Sep 18, 2024 · Backend Development

Understanding Cookie+Session, Distributed Session Sharing, and ThreadLocal for Maintaining User Login State

This article explains the limitations of traditional Cookie+Session authentication, explores distributed session sharing techniques such as replication, sticky sessions, and centralized storage, and demonstrates why using ThreadLocal can simplify user state management in a web application like the Echo project.

Session Managementbackendcookie
0 likes · 9 min read
Understanding Cookie+Session, Distributed Session Sharing, and ThreadLocal for Maintaining User Login State
vivo Internet Technology
vivo Internet Technology
Sep 4, 2024 · Information Security

Analysis of Loop Login Issues in Single Sign-On (SSO) and Their Solutions

The article examines a single sign‑on loop‑login problem caused by Secure‑flagged cookies being set over HTTP, explains how missing tokens trigger endless redirects, and recommends enforcing HTTPS or using a non‑Secure auxiliary token to break the redirect cycle.

Information securityLoop LoginSSO
0 likes · 12 min read
Analysis of Loop Login Issues in Single Sign-On (SSO) and Their Solutions
Lobster Programming
Lobster Programming
Jun 9, 2024 · Information Security

How Authentication Evolved: From Cookies & Sessions to JWT in Distributed Systems

This article traces the evolution of login authentication across system architectures—from monolithic apps using cookies and sessions, through front‑end/back‑end separation and CORS, to distributed systems employing SSO and stateless JWT, highlighting their mechanisms, challenges, and trade‑offs.

JWTSSOauthentication
0 likes · 7 min read
How Authentication Evolved: From Cookies & Sessions to JWT in Distributed Systems
Cognitive Technology Team
Cognitive Technology Team
Feb 18, 2024 · Information Security

Understanding Cross‑Site Request Forgery (CSRF) and Its Prevention Techniques

This article explains what CSRF attacks are, how they exploit authenticated browsers through forged requests, outlines the three essential conditions for a successful attack, and presents practical defense measures such as token validation, cookie handling, secondary authentication, and code examples in Java and JSP.

CSRFJavaSpring Security
0 likes · 7 min read
Understanding Cross‑Site Request Forgery (CSRF) and Its Prevention Techniques
php中文网 Courses
php中文网 Courses
Jan 31, 2024 · Information Security

How to Defend Against CSRF Attacks in PHP

This article explains the principles of CSRF attacks and provides practical PHP techniques to prevent them, including token generation and verification, checking Referer and Origin headers, configuring secure cookie attributes, and ensuring safe login and logout processes.

CSRFOriginPHP
0 likes · 5 min read
How to Defend Against CSRF Attacks in PHP
JD Tech
JD Tech
Jun 8, 2023 · Operations

Extending Cookie Lifetime for Seamless UI and API Automation

This article presents a practical solution to overcome login obstacles in UI and HTTP API automation by converting short‑lived cookies into permanent ones through a micro‑service, enabling continuous end‑to‑end automated testing without manual re‑login.

API testingAutomationMicroservice
0 likes · 8 min read
Extending Cookie Lifetime for Seamless UI and API Automation
Laravel Tech Community
Laravel Tech Community
Feb 27, 2023 · Information Security

Understanding Authentication, Authorization, Credentials, Cookies, Sessions, Tokens, and JWT

This article explains the fundamentals of authentication and authorization, the role of credentials, the differences between cookies and sessions, various token types including access and refresh tokens, and the principles, usage, and security considerations of JSON Web Tokens (JWT).

AuthorizationJWTSecurity
0 likes · 20 min read
Understanding Authentication, Authorization, Credentials, Cookies, Sessions, Tokens, and JWT
Laravel Tech Community
Laravel Tech Community
Aug 25, 2022 · Backend Development

Encapsulating Cookie and Session Operations in PHP

This tutorial shows how to create reusable PHP functions for reading, writing, and managing cookies and session data, including helper utilities to streamline backend web development by abstracting common operations and handling expiration, paths, and nested session keys.

PHPWeb Developmentbackend
0 likes · 4 min read
Encapsulating Cookie and Session Operations in PHP
Python Programming Learning Circle
Python Programming Learning Circle
Jun 25, 2022 · Operations

How to Build a Simple Python Auto‑Like Bot for Web Platforms

This article explains how to create a Python‑based auto‑like robot for web sites by simulating login, handling cookies, and sending POST requests to platform APIs, while also covering common challenges like captchas and IP anti‑scraping measures.

HTTPLike BotPython
0 likes · 7 min read
How to Build a Simple Python Auto‑Like Bot for Web Platforms
Architecture and Beyond
Architecture and Beyond
Jan 17, 2022 · Information Security

Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication

This article explains the fundamentals of web session management, compares server‑side, cookie‑based, and token‑based storage methods, discusses authentication versus authorization, and outlines security considerations and best‑practice recommendations for managing user sessions in modern web applications.

AuthorizationSession ManagementWeb Security
0 likes · 11 min read
Understanding Web Session Management: Concepts, Storage Strategies, and Token‑Based Authentication
Top Architect
Top Architect
Jan 16, 2022 · Information Security

Understanding Authentication, Authorization, Sessions, Cookies, Tokens and JWT

This article explains the concepts of authentication and authorization, the role of credentials, the differences between cookies and sessions, various session‑sharing strategies, token‑based authentication including JWT, common security algorithms and practical considerations for implementing secure access control in web applications.

AuthorizationJWTSecurity
0 likes · 35 min read
Understanding Authentication, Authorization, Sessions, Cookies, Tokens and JWT
macrozheng
macrozheng
Oct 21, 2021 · Information Security

Where Should You Store JWT in the Browser? Cookie vs localStorage vs sessionStorage

This article compares three browser storage options for JWT—Cookie, localStorage, and sessionStorage—examining their automatic transmission, CSRF and XSS vulnerabilities, and security configurations such as SameSite and HttpOnly to help developers choose the safest method.

CSRFJWTWeb Security
0 likes · 4 min read
Where Should You Store JWT in the Browser? Cookie vs localStorage vs sessionStorage
Sohu Tech Products
Sohu Tech Products
Oct 20, 2021 · Mobile Development

Comprehensive Guide to WKWebView: Migration, Performance, Delegates, Caching, and Cookie Management

This article explains why UIWebView was deprecated, how WKWebView improves performance and memory usage, details its multi‑process architecture, outlines page loading flow, delegate methods, container design, caching strategies, cookie handling across processes, and solutions for white‑screen crashes in iOS apps.

CachingPerformanceWKWebView
0 likes · 22 min read
Comprehensive Guide to WKWebView: Migration, Performance, Delegates, Caching, and Cookie Management
Top Architect
Top Architect
Sep 29, 2021 · Information Security

Authentication, Authorization, and Credential Mechanisms: Cookies, Sessions, Tokens, and JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and token‑based approaches, discusses token and JWT structures, outlines common authentication patterns, and provides practical guidance on their use and pitfalls in distributed systems.

AuthorizationJWTSecurity
0 likes · 33 min read
Authentication, Authorization, and Credential Mechanisms: Cookies, Sessions, Tokens, and JWT
Top Architect
Top Architect
Jul 3, 2021 · Backend Development

Three Practical Methods for Implementing Single Sign-On (SSO) in B/S Systems

This article explains the principle of single sign‑on and compares three implementation techniques—parent‑domain cookies, a dedicated authentication centre, and cross‑domain LocalStorage—detailing their mechanisms, advantages, limitations, and providing sample code for the LocalStorage approach.

Cross-DomainFrontendSSO
0 likes · 11 min read
Three Practical Methods for Implementing Single Sign-On (SSO) in B/S Systems
macrozheng
macrozheng
May 31, 2021 · Information Security

Cookie vs Session vs JWT: When to Use Each for Secure Authentication

This article compares the mechanisms of Cookie, Session, and JWT token for user authentication, explaining their histories, workflows, scalability challenges, security trade‑offs, and best‑practice scenarios such as single sign‑on, mobile access, and CSRF protection.

JWTWeb Securityauthentication
0 likes · 16 min read
Cookie vs Session vs JWT: When to Use Each for Secure Authentication
Full-Stack Internet Architecture
Full-Stack Internet Architecture
May 18, 2021 · Information Security

Understanding Cookies, Sessions, and JWT Tokens: Comparison, Advantages, and Pitfalls

This article explains the evolution from cookies to server‑side sessions and finally to JWT tokens, compares their mechanisms, discusses scalability and security challenges such as CSRF, and provides guidance on when to choose each authentication method.

CSRFJWTWeb Security
0 likes · 14 min read
Understanding Cookies, Sessions, and JWT Tokens: Comparison, Advantages, and Pitfalls