Tagged articles
336 articles
Page 1 of 4
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Ops Community
Ops Community
Apr 28, 2026 · Operations

How Dangerous Is an HTTPS Certificate Expiration and How Ops Can Prevent It?

When an HTTPS certificate expires, browsers show warnings, users abandon sites, services become unavailable, and security is weakened, so this article explains the TLS fundamentals, the risks of expiration, real‑world outage cases, and provides step‑by‑step guidance on acquisition, deployment, automated renewal, monitoring, and best‑practice procedures for reliable certificate management.

HTTPSOperationsTLS
0 likes · 25 min read
How Dangerous Is an HTTPS Certificate Expiration and How Ops Can Prevent It?
Java Architect Handbook
Java Architect Handbook
Mar 19, 2026 · Information Security

Why HTTPS Beats HTTP: Deep Dive for Java Interview Success

This article provides a comprehensive technical guide for Java interviewers, detailing HTTP’s security flaws, how HTTPS resolves them through SSL/TLS encryption, certificate verification, and hybrid cryptography, and includes handshake steps, performance comparisons, common follow‑up questions, and concise memory mnemonics.

HTTPHTTPSJava interview
0 likes · 14 min read
Why HTTPS Beats HTTP: Deep Dive for Java Interview Success
IT Services Circle
IT Services Circle
Mar 2, 2026 · Information Security

Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained

This article explains why HTTP is insecure—prone to eavesdropping, tampering, and identity spoofing—and how HTTPS uses symmetric and asymmetric encryption, hash functions, digital certificates, and a four‑step SSL/TLS handshake to provide confidentiality, integrity, and authentication for web traffic.

HTTPSInformation SecuritySSL handshake
0 likes · 17 min read
Why HTTPS Beats HTTP: Encryption, Certificates, and TLS Handshake Explained
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 21, 2026 · Fundamentals

What Happens After You Type a URL? A Step‑by‑Step Animation

When you enter a URL, the browser checks multiple caches for the IP, performs recursive DNS lookup if needed, establishes a TCP connection and HTTPS handshake, sends an HTTP request, receives a 200 response, and then parses HTML, CSS, and JavaScript to build and render the page.

Browser RenderingDNSHTTPS
0 likes · 4 min read
What Happens After You Type a URL? A Step‑by‑Step Animation
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Jan 31, 2026 · Backend Development

How to Make a Python Project Support Both Elasticsearch and Easysearch – A Practical Walkthrough

This article explains how to configure a Python codebase to connect simultaneously to Elasticsearch (8.x/9.x) and Easysearch by selecting the elasticsearch‑7.13.1 client, handling product‑validation differences, applying NumPy 2.0 compatibility patches, and configuring HTTPS self‑signed certificates, while comparing three implementation options and recommending the most maintainable solution.

EasysearchElasticsearchHTTPS
0 likes · 8 min read
How to Make a Python Project Support Both Elasticsearch and Easysearch – A Practical Walkthrough
Top Architect
Top Architect
Dec 21, 2025 · Information Security

Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles

This article presents a comprehensive design for API request and response protection that combines symmetric and asymmetric encryption, HTTPS fundamentals, and WeChat Pay specific cryptographic mechanisms, detailing key exchange, data signing, parameter handling, implementation code, common pitfalls, and a security analysis.

API SecurityHTTPSWeChat Pay
0 likes · 14 min read
Securing API Calls with Hybrid Symmetric‑Asymmetric Encryption and HTTPS Principles
IT Services Circle
IT Services Circle
Dec 13, 2025 · Information Security

Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data

This article explains how HTTPS upgrades plain HTTP by adding authentication, encryption, and integrity checks, walks through its three security layers, traces the protocol’s evolution from SSL 2.0 to TLS 1.3, and discusses the practical benefits, costs, and adoption challenges of securing web traffic.

HTTPSSSLTLS
0 likes · 16 min read
Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
Efficient Ops
Efficient Ops
Nov 19, 2025 · Information Security

Master HTTPS Certificate Creation: From CA Basics to Automated Shell Scripts

This guide walks you through the four core stages of HTTPS certificate handling—CA distribution, domain request, validation, and data encryption—while providing detailed OpenSSL commands, Linux/Windows/macOS trust‑store paths, and a ready‑to‑run shell script for fully automated certificate generation.

CertificateHTTPSOpenSSL
0 likes · 17 min read
Master HTTPS Certificate Creation: From CA Basics to Automated Shell Scripts
Ray's Galactic Tech
Ray's Galactic Tech
Nov 15, 2025 · Information Security

Spring Boot Security Guide: HTTPS, CSRF, XSS, and Dependency Hardening

This comprehensive guide walks you through securing Spring Boot applications by configuring TLS, implementing Spring Security for authentication, CSRF, XSS and SQL injection defenses, hardening HTTP headers, scanning third‑party dependencies with OWASP Dependency‑Check, and applying best‑practice DevOps hardening steps for a defense‑in‑depth posture.

CSRFDependency-CheckHTTPS
0 likes · 7 min read
Spring Boot Security Guide: HTTPS, CSRF, XSS, and Dependency Hardening
Su San Talks Tech
Su San Talks Tech
Nov 12, 2025 · Operations

Master Nginx: From Reverse Proxy to HTTPS in Six Practical Scenarios

This guide walks backend engineers through six real‑world Nginx configurations—reverse proxy and load balancing, static asset handling, rate limiting with IP black/white lists, HTTPS encryption, and step‑by‑step deployment—showing how to secure, accelerate, and stabilize services.

HTTPSNginxrate limiting
0 likes · 10 min read
Master Nginx: From Reverse Proxy to HTTPS in Six Practical Scenarios
Selected Java Interview Questions
Selected Java Interview Questions
Oct 22, 2025 · Backend Development

How to Seamlessly Migrate a Spring Boot 3.0 App from HTTP to HTTPS

This comprehensive guide walks you through migrating a Spring Boot 3.0 JavaWeb application from HTTP to HTTPS, covering certificate acquisition (including Let’s Encrypt), conversion to Java keystore, Spring Boot and reverse‑proxy configuration, application adjustments, automated renewal, testing, rollback, and ongoing monitoring.

CertbotDeploymentHTTPS
0 likes · 13 min read
How to Seamlessly Migrate a Spring Boot 3.0 App from HTTP to HTTPS
Architect's Guide
Architect's Guide
Oct 14, 2025 · Information Security

How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption

This article explains why HTTPS is considered secure, details the underlying TLS handshake—including certificate verification and symmetric data encryption—and clarifies common misconceptions such as the role of CAs, the possibility of man‑in‑the‑middle attacks, and whether HTTPS traffic can be intercepted.

Certificate AuthorityHTTPSMITM attack
0 likes · 11 min read
How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption
Top Architect
Top Architect
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks

This article explains common security risks of login interfaces such as brute‑force attacks, CAPTCHA bypass, IP‑based rate limiting, mobile verification, and man‑in‑the‑middle threats, and provides practical mitigation techniques including code examples, HTTPS adoption, and additional hardening measures.

Brute-force protectionCaptchaHTTPS
0 likes · 13 min read
How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks
Raymond Ops
Raymond Ops
Sep 20, 2025 · Fundamentals

Understanding HTTP vs HTTPS: From Basics to Secure Web Communication

This article explains the fundamentals of HTTP and HTTPS, compares their features, details how internet messages travel through DNS, routers, IP and MAC addresses, describes request and response structures, ports, encryption methods, cookies versus sessions, and provides a comprehensive summary of their differences.

HTTPHTTPSNetworking
0 likes · 20 min read
Understanding HTTP vs HTTPS: From Basics to Secure Web Communication
Java Captain
Java Captain
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse

This article explains common security risks in login interfaces—such as brute‑force attacks, captcha bypass, account and IP lockouts, man‑in‑the‑middle threats—and provides practical mitigation techniques like password attempt limits, captcha, phone verification, HTTPS, and comprehensive logging.

Brute-force protectionCaptchaHTTPS
0 likes · 9 min read
How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
Su San Talks Tech
Su San Talks Tech
Sep 6, 2025 · Backend Development

How Spring’s nohttp Project Eliminates Insecure HTTP URLs

Spring’s open‑source nohttp project scans, replaces, and blocks insecure http:// URLs across codebases, ensuring HTTPS usage to prevent man‑in‑the‑middle attacks, and includes modules like nohttp‑cli, nohttp‑checkstyle, and Gradle integration, while addressing cases where HTTPS isn’t feasible.

BackendHTTPSjava
0 likes · 5 min read
How Spring’s nohttp Project Eliminates Insecure HTTP URLs
php Courses
php Courses
Sep 5, 2025 · Information Security

How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption

This guide explains essential PHP techniques for protecting sensitive data, covering HTTPS usage, password hashing algorithms, prepared statements to prevent SQL injection, encryption methods like AES and RSA, and CAPTCHA implementation, with clear code examples for each security measure.

CaptchaHTTPSPrepared Statements
0 likes · 4 min read
How to Secure Data in PHP: HTTPS, Hashing, Prepared Statements, and Encryption
Selected Java Interview Questions
Selected Java Interview Questions
Sep 2, 2025 · Backend Development

Master Nginx: Essential Configurations for Backend Engineers

This guide walks backend engineers through essential Nginx configurations—including reverse proxy, load balancing, static file handling, rate limiting, and HTTPS—providing code examples and deployment steps to ensure stable, secure, and high‑performance services while keeping servers resilient during traffic spikes.

HTTPSload balancingrate limiting
0 likes · 10 min read
Master Nginx: Essential Configurations for Backend Engineers
大转转FE
大转转FE
Aug 5, 2025 · Information Security

Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data

With SSL/TLS certificates now limited to 13 months and soon to just 47 days, this article explains why encryption is essential, details symmetric and asymmetric cryptography, illustrates HTTPS handshake and certificate verification, and shows how these mechanisms protect against man‑in‑the‑middle attacks.

CertificateHTTPSMITM
0 likes · 22 min read
Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data
Lin is Dream
Lin is Dream
Jul 22, 2025 · Information Security

Why HTTPS Needs More Than a Handshake: One‑Way vs Mutual TLS Explained

This article walks through the differences between plain HTTP, HTTPS one‑way authentication, and mutual TLS, detailing the TCP handshake, TLS handshakes, certificate creation, file‑type conventions, and practical security considerations for developers and engineers.

HTTPSHandshakeOpenSSL
0 likes · 16 min read
Why HTTPS Needs More Than a Handshake: One‑Way vs Mutual TLS Explained
Liangxu Linux
Liangxu Linux
Jun 15, 2025 · Fundamentals

HTTP vs HTTPS: Protocol Basics, Security, Cookies & Sessions

This article explains the fundamentals of HTTP and HTTPS, comparing their features, security mechanisms, ports, and performance, and details how internet messages travel through DNS, routers, IP and MAC addresses, as well as the roles, characteristics, and differences of cookies and sessions.

HTTPSSessionsWeb Protocols
0 likes · 17 min read
HTTP vs HTTPS: Protocol Basics, Security, Cookies & Sessions
JavaScript
JavaScript
Jun 15, 2025 · Information Security

Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight

This guide explains how to answer the common interview question “Can you talk about HTTPS?” by covering its fundamental differences from HTTP, the role of SSL/TLS, confidentiality, integrity and authentication, the TLS handshake process, performance considerations, certificate chains, and how to present this knowledge to showcase both depth and breadth of security expertise.

HTTPSSecurity InterviewTLS
0 likes · 9 min read
Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight
Java Architect Essentials
Java Architect Essentials
Jun 7, 2025 · Information Security

How to Instantly Generate Trusted Local SSL Certificates with mkcert

This guide explains what mkcert is, its key features, and provides step‑by‑step instructions for installing the tool, generating trusted local SSL/TLS certificates for multiple domains and IPs, and configuring Nginx to enable HTTPS in a local development environment across Windows, macOS, and Linux.

CertificateHTTPSLocal Development
0 likes · 6 min read
How to Instantly Generate Trusted Local SSL Certificates with mkcert
Linux Ops Smart Journey
Linux Ops Smart Journey
Jun 5, 2025 · Cloud Native

Secure Longhorn UI on Kubernetes: Add Basic Auth and Enable HTTPS

This guide walks you through securing the Longhorn UI in a Kubernetes environment by configuring basic authentication and enabling HTTPS via Ingress and cert‑manager, including prerequisite setup, secret creation, Helm upgrades, and verification steps to ensure production‑grade protection.

Basic AuthHTTPSIngress
0 likes · 6 min read
Secure Longhorn UI on Kubernetes: Add Basic Auth and Enable HTTPS
Java One
Java One
May 25, 2025 · Information Security

How to Implement Mutual SSL Authentication in Spring Boot (HTTPS)

This guide explains the difference between one‑way and two‑way SSL/TLS authentication, shows how to generate self‑signed and CA certificates with keytool, configures Spring Boot for mutual authentication, and demonstrates testing the setup using Postman, including detailed steps, code snippets, and troubleshooting tips.

HTTPSMutual TLSPostman
0 likes · 10 min read
How to Implement Mutual SSL Authentication in Spring Boot (HTTPS)
Java One
Java One
May 24, 2025 · Backend Development

How to Secure Your Spring Boot Application with HTTPS: A Step‑by‑Step Guide

This tutorial walks you through obtaining or generating SSL certificates, configuring Spring Boot to use JKS or PKCS12 keystores, redirecting HTTP to HTTPS, and distributing the certificate to clients, with complete command‑line examples and code snippets for a production‑ready setup.

HTTPSSSLSpring Boot
0 likes · 13 min read
How to Secure Your Spring Boot Application with HTTPS: A Step‑by‑Step Guide
Linux Ops Smart Journey
Linux Ops Smart Journey
May 22, 2025 · Information Security

How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows

This guide explains why browsers show “not secure” warnings, why self‑signed certificates are a cost‑effective solution for small‑to‑medium businesses, and provides step‑by‑step instructions—including MMC configuration and certificate import—to remove those warnings without purchasing commercial SSL certificates.

Browser SecurityHTTPSWindows MMC
0 likes · 5 min read
How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows
php Courses
php Courses
Apr 25, 2025 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, introduces HTTPS, demonstrates how to apply symmetric encryption algorithms like AES in PHP, and shows how to use PHP's OpenSSL extension for asymmetric encryption, providing practical code examples and key‑management tips.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSInformation Security
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Open Source Linux
Open Source Linux
Apr 18, 2025 · Fundamentals

Understanding HTTP vs HTTPS: Protocol Basics, Security, and Session Management

This article explains the fundamental differences between HTTP and HTTPS, how internet messages travel through DNS and routers, the roles of IP and MAC addresses, port conventions, request/response structures, encryption methods, digital certificates, and compares cookies with server‑side sessions for state management.

HTTPHTTPSNetworking
0 likes · 16 min read
Understanding HTTP vs HTTPS: Protocol Basics, Security, and Session Management
Liangxu Linux
Liangxu Linux
Apr 13, 2025 · Fundamentals

Why HTTPS Matters: A Deep Dive into HTTP, Encryption, Cookies, and Sessions

This article explains the fundamentals of HTTP and HTTPS, detailing how web requests travel across the internet, the roles of IP and MAC addresses, port numbers, request and response structures, encryption methods, digital certificates, and the differences between cookies and sessions.

HTTPHTTPSSessions
0 likes · 18 min read
Why HTTPS Matters: A Deep Dive into HTTP, Encryption, Cookies, and Sessions
MaGe Linux Operations
MaGe Linux Operations
Apr 12, 2025 · Backend Development

Master Nginx Basics: From Installation to Advanced Configuration

This comprehensive guide walks you through Nginx fundamentals, including its advantages, installation methods, core configuration hierarchy, key modules such as stub_status, random_index, sub_filter and gzip, log management, virtual host setup, HTTPS, rewrite rules, and smooth upgrade techniques, empowering you to deploy and optimize a high‑performance web server.

ConfigurationHTTPSload balancing
0 likes · 32 min read
Master Nginx Basics: From Installation to Advanced Configuration
Liangxu Linux
Liangxu Linux
Apr 12, 2025 · Information Security

Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates

mkcert, an open‑source tool by Filippo Valsorda, lets developers quickly create and trust local SSL/TLS certificates across Linux, macOS, and Windows without manual configuration, offering zero‑setup installation, multi‑domain support, advanced features, and simple Nginx integration for secure local testing.

CertificateHTTPSLocal Development
0 likes · 5 min read
Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates
Top Architect
Top Architect
Apr 6, 2025 · Backend Development

Quickly Generate Trusted Local SSL/TLS Certificates with mkcert – Installation, Usage, and Nginx Configuration

This article introduces the open‑source mkcert tool for effortlessly creating locally trusted SSL/TLS certificates, provides step‑by‑step installation and usage commands for multiple platforms, shows how to configure Nginx with the generated files, and then promotes related AI and ChatGPT community offers and paid resources.

HTTPSLocal DevelopmentNginx
0 likes · 9 min read
Quickly Generate Trusted Local SSL/TLS Certificates with mkcert – Installation, Usage, and Nginx Configuration
MaGe Linux Operations
MaGe Linux Operations
Mar 22, 2025 · Fundamentals

Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic

This article explains the fundamental differences between HTTP and HTTPS, how internet messages travel through DNS and routers, the roles of ports, request and response structures, encryption methods, digital certificates, and compares cookies with sessions for state management.

HTTPHTTPSNetworking
0 likes · 18 min read
Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic
MaGe Linux Operations
MaGe Linux Operations
Feb 14, 2025 · Information Security

How to Harden Nginx: Essential Security Practices for Safer Web Servers

This guide provides a comprehensive, step‑by‑step hardening roadmap for Nginx, covering version hiding, directory protection, HTTPS enablement, custom error pages, CSP, file permissions, security headers, connection limits, IP whitelisting, SSL optimization, secure file uploads, common attack mitigations, logging best practices, and additional hardening measures to protect web services from a wide range of threats.

CSPHTTPSNginx
0 likes · 31 min read
How to Harden Nginx: Essential Security Practices for Safer Web Servers
Open Source Linux
Open Source Linux
Feb 13, 2025 · Information Security

Simplify Local HTTPS with mkcert: Fast, Trusted SSL/TLS Certificates

This guide introduces mkcert, a free open‑source tool that quickly creates locally trusted SSL/TLS certificates, outlines its key features, provides step‑by‑step installation and usage instructions—including Nginx configuration—and explains how it streamlines secure development environments.

HTTPSLocal DevelopmentSSL
0 likes · 5 min read
Simplify Local HTTPS with mkcert: Fast, Trusted SSL/TLS Certificates
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jan 23, 2025 · Backend Development

Why Nginx Is the Go‑to Choice for High‑Performance Web and Proxy Services

This article explains Nginx’s key advantages—high‑concurrency handling, efficient load balancing, versatile mail proxying, simple installation and zero‑downtime upgrades—illustrates its architecture with master/worker processes, and outlines essential configuration topics from basic setup to advanced HTTPS and reverse‑proxy techniques.

ConfigurationHTTPSNginx
0 likes · 7 min read
Why Nginx Is the Go‑to Choice for High‑Performance Web and Proxy Services
php Courses
php Courses
Jan 16, 2025 · Information Security

Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to secure PHP data transmission using HTTPS, symmetric encryption (AES, DES, 3DES) and asymmetric encryption with OpenSSL, providing code examples and key management advice to protect confidentiality, integrity, and prevent man‑in‑the‑middle attacks.

HTTPSPHPasymmetric encryption
0 likes · 4 min read
Securing PHP Data Transmission with HTTPS, Symmetric and Asymmetric Encryption
ITPUB
ITPUB
Jan 12, 2025 · Operations

Why a TLS Handshake Can Saturate 100Mbps Uplink and How to Cut Bandwidth by 70%

A high‑concurrency data‑collection service quickly filled a 100 Mbps uplink because each GET request incurred a 1.68 KB TLS handshake, but switching to plain HTTP or enabling Keep‑Alive can dramatically reduce per‑request size and server load, saving up to 70% bandwidth.

HTTPSKeep-AliveTLS
0 likes · 5 min read
Why a TLS Handshake Can Saturate 100Mbps Uplink and How to Cut Bandwidth by 70%
Radish, Keep Going!
Radish, Keep Going!
Jan 6, 2025 · Information Security

How Much Data Does a Simple HTTPS Request Actually Transfer?

Using a local Go server and Wireshark, the author measured that a basic HTTPS request transmits 2,164 bytes—about ten times more than an equivalent HTTP request—revealing the bandwidth impact of TLS handshakes and suggesting when HTTP may be preferable for internal, non‑sensitive traffic.

GoHTTPSTLS
0 likes · 4 min read
How Much Data Does a Simple HTTPS Request Actually Transfer?
iKang Technology Team
iKang Technology Team
Dec 4, 2024 · Information Security

Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments

Enterprises should follow a six‑phase plan—inventorying domains, securing and installing SSL certificates, configuring servers, redirecting traffic, updating links and sitemaps, testing, and finally enforcing HTTPS‑only access—while monitoring performance impacts such as latency, bandwidth, CPU load, and handshake overhead.

EnterpriseHTTPSSSL
0 likes · 9 min read
Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments
php Courses
php Courses
Nov 14, 2024 · Information Security

Best Practices for Securing Laravel Web Applications

This article outlines essential Laravel security practices, including built‑in authentication, CSRF protection, input validation, HTTPS enforcement, secure session handling, regular dependency updates, and rate limiting, providing developers with concrete steps to protect web applications from common attacks.

AuthenticationCSRFHTTPS
0 likes · 6 min read
Best Practices for Securing Laravel Web Applications
Top Architect
Top Architect
Nov 13, 2024 · Backend Development

Using mkcert to Quickly Generate Trusted Local SSL/TLS Certificates

This article introduces the open‑source tool mkcert, explains its features, shows how to install it on various operating systems, generate multi‑domain certificates, and configure Nginx for HTTPS, while also noting additional community resources and promotional offers.

HTTPSLocal DevelopmentSSL
0 likes · 8 min read
Using mkcert to Quickly Generate Trusted Local SSL/TLS Certificates
macrozheng
macrozheng
Nov 5, 2024 · Information Security

How TLS Handshake Makes a Tiny GET Request Eat 1.68KB and How to Cut Bandwidth

After discovering that a simple GET request consumes 1.68 KB due to the TLS handshake, the article explains the handshake’s components, calculates the resulting bandwidth demand, and demonstrates how switching to HTTP or enabling Keep‑Alive can dramatically reduce traffic and server load in high‑concurrency scenarios.

HTTPHTTPSKeep-Alive
0 likes · 5 min read
How TLS Handshake Makes a Tiny GET Request Eat 1.68KB and How to Cut Bandwidth
IT Services Circle
IT Services Circle
Oct 22, 2024 · Information Security

Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark

This article provides a step‑by‑step analysis of a TLS 1.2 HTTPS handshake captured with Wireshark, explaining the ClientHello, ServerHello, certificate parsing, key‑exchange messages, master secret derivation, and the final encrypted application data exchange.

HTTPSTLSTLS Handshake
0 likes · 14 min read
Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark
MaGe Linux Operations
MaGe Linux Operations
Oct 21, 2024 · Information Security

How to Secure Your Docker‑Hosted Nginx Site with Free Let’s Encrypt SSL

Learn step‑by‑step how to configure HTTPS for a Docker‑run Nginx website on Azure using free Let’s Encrypt certificates, including environment setup, creating HTTP site, generating and installing SSL/TLS certificates, configuring Nginx for HTTPS, and automating renewal with Dockerized Certbot.

HTTPSautomationletsencrypt
0 likes · 11 min read
How to Secure Your Docker‑Hosted Nginx Site with Free Let’s Encrypt SSL
Architecture Digest
Architecture Digest
Oct 14, 2024 · Information Security

Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services

The article analyzes why a high‑concurrency data‑collection service quickly saturates a 100 Mbps uplink due to large TLS handshake payloads, demonstrates the bandwidth savings of switching to plain HTTP or using Keep‑Alive, and highlights practical considerations for secure versus performance‑optimized deployments.

HTTPSHandshakeKeep-Alive
0 likes · 4 min read
Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services
php Courses
php Courses
Sep 9, 2024 · Information Security

What Is ServBay Local CA and How to Manage It

This guide explains what ServBay Local CA is, how to locate it using macOS Keychain Access, and provides step‑by‑step instructions for reinstalling or deleting the certificate to resolve HTTPS errors during local development.

HTTPSKeychain AccessLocal CA
0 likes · 4 min read
What Is ServBay Local CA and How to Manage It
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
Selected Java Interview Questions
Selected Java Interview Questions
Aug 10, 2024 · Information Security

Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, demonstrates how man‑in‑the‑middle attacks exploit its plaintext nature, discusses symmetric and asymmetric encryption attempts to mitigate these risks, and describes how HTTPS (TLS) and the CA trust model provide robust protection against such attacks.

HTTPHTTPSInformation Security
0 likes · 9 min read
Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication
php Courses
php Courses
Jul 31, 2024 · Information Security

How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption

This article explains why encrypting data transmission is essential, then demonstrates three PHP-based methods—enabling HTTPS via SSL/TLS, applying symmetric algorithms such as AES, and using asymmetric encryption with OpenSSL—to protect confidentiality, integrity, and authentication of web communications.

HTTPSasymmetric encryptiondata security
0 likes · 4 min read
How to Secure Data Transmission with PHP: HTTPS, Symmetric and Asymmetric Encryption
Top Architect
Top Architect
Jul 12, 2024 · Information Security

API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques

This article presents a comprehensive API encryption scheme that combines symmetric and asymmetric cryptography, hashing, and digital signatures, explains HTTPS fundamentals, details WeChat Pay encryption, outlines key exchange and data protection processes, provides Java code examples, and analyzes security, anti‑tampering, anti‑replay, and performance considerations.

API SecurityHTTPSHashing
0 likes · 16 min read
API Encryption and Security Design: Combining Symmetric, Asymmetric, Hashing, and Signature Techniques
Selected Java Interview Questions
Selected Java Interview Questions
Jul 10, 2024 · Information Security

Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway

This article explains the fundamentals of symmetric and asymmetric encryption, how digital signatures and HTTPS work with certificate authorities, and demonstrates a practical implementation of secure URL encryption, key exchange, and request validation using custom Spring Cloud Gateway filters written in Java.

HTTPSSpring Cloud Gatewaydigital signature
0 likes · 22 min read
Symmetric and Asymmetric Encryption, Digital Signatures, HTTPS, and Secure URL Handling with Spring Cloud Gateway
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API SecurityHTTPSWeChat Pay
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Architect
Architect
Apr 27, 2024 · Information Security

How to Stop Malicious API Calls: 8 Practical Defense Strategies

This article walks through eight concrete techniques—firewall rules, captchas, authentication checks, IP whitelists, HTTPS encryption, rate limiting, monitoring, and an API gateway—to prevent abusive requests from draining resources or compromising critical services.

API SecurityAuthenticationCaptcha
0 likes · 11 min read
How to Stop Malicious API Calls: 8 Practical Defense Strategies
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSInformation Security
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

HTTPSInformation SecuritySSL/TLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
Architect
Architect
Mar 13, 2024 · Information Security

11 Essential Practices to Secure Your APIs – From Validation to Risk Control

This article outlines eleven practical techniques for protecting API endpoints, covering parameter validation, unified response wrapping, XSS escaping, captcha integration, rate limiting, IP whitelisting, sensitive‑word checks, HTTPS adoption, data encryption, and comprehensive risk control measures, each illustrated with concrete code snippets and step‑by‑step workflows.

API SecurityHTTPSParameter Validation
0 likes · 18 min read
11 Essential Practices to Secure Your APIs – From Validation to Risk Control
vivo Internet Technology
vivo Internet Technology
Mar 13, 2024 · Operations

Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)

By integrating Intel QuickAssist hardware and AVX‑512 software acceleration into the VUA component of Vivo’s load‑balancing platform, the article demonstrates asynchronous OpenSSL offloading that boosts HTTPS forwarding throughput to roughly 44 000 QPS with QAT cards and 51 000 QPS with software, while preserving scalability and security.

HTTPSHardware accelerationIntel QAT
0 likes · 12 min read
Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)
Liangxu Linux
Liangxu Linux
Mar 10, 2024 · Information Security

How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks

This article explains common login security risks such as brute‑force cracking, CAPTCHA bypass, IP‑based blocking, man‑in‑the‑middle attacks, and shows practical countermeasures like captcha enforcement, login throttling, phone verification, HTTPS adoption, and data encryption.

CaptchaHTTPSInformation Security
0 likes · 10 min read
How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
Liangxu Linux
Liangxu Linux
Feb 6, 2024 · Information Security

How Chrome’s New HTTPS‑First Mode Will Secure the Web by Default

Chrome is trialing an HTTPS‑First approach that automatically upgrades insecure HTTP requests, warns about risky downloads, and gradually rolls out secure‑by‑default settings, aiming to protect the majority of web traffic from eavesdropping and tampering.

ChromeHSTSHTTPS
0 likes · 5 min read
How Chrome’s New HTTPS‑First Mode Will Secure the Web by Default
php Courses
php Courses
Jan 30, 2024 · Information Security

Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption

This article explains how to protect data transmission in PHP applications by employing HTTPS (SSL/TLS), implementing symmetric encryption such as AES, and using asymmetric encryption with OpenSSL, while highlighting key management practices to ensure confidentiality, integrity, and resistance to man‑in‑the‑middle attacks.

HTTPSOpenSSLPHP
0 likes · 4 min read
Using PHP to Secure Data Transmission with HTTPS, Symmetric and Asymmetric Encryption