Tagged articles
336 articles
Page 2 of 4
Liangxu Linux
Liangxu Linux
Dec 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust

This article explains why HTTPS is needed, defines the protocol, describes the four security properties—confidentiality, integrity, authentication, and non‑repudiation—covers symmetric and asymmetric encryption, hybrid encryption, hash functions, digital signatures, certificate authorities, and the trust chain that together protect web communications.

Certificate AuthorityHTTPSInformation Security
0 likes · 15 min read
How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust
Efficient Ops
Efficient Ops
Nov 26, 2023 · Operations

Top Open‑Source Tools to Monitor HTTPS Certificate Expiration

This article reviews why HTTPS certificate expiration checks are often missed and introduces several open‑source monitoring tools—including blackbox_exporter, EaseProbe, uptime‑kuma, domain‑admin, and a simple shell script—to help operations teams ensure timely certificate renewal.

HTTPSPrometheuscertificate expiration
0 likes · 5 min read
Top Open‑Source Tools to Monitor HTTPS Certificate Expiration
MaGe Linux Operations
MaGe Linux Operations
Nov 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates

HTTPS protects online communications by combining TLS encryption, digital certificates, and cryptographic techniques such as symmetric and asymmetric encryption, hash functions, and certificate authorities, ensuring confidentiality, integrity, authentication, and non‑repudiation, while addressing key exchange, trust chains, and common security pitfalls.

Certificate AuthorityHTTPSTLS
0 likes · 17 min read
How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates
Liangxu Linux
Liangxu Linux
Sep 23, 2023 · Information Security

Why Chrome Is Switching All Sites to HTTPS by Default

Chrome’s new HTTPS‑First experiment automatically upgrades HTTP requests to HTTPS, warns about insecure downloads, and rolls out gradually, aiming to make the web safer by encrypting the majority of traffic while still handling edge cases gracefully.

BrowserChromeHSTS
0 likes · 6 min read
Why Chrome Is Switching All Sites to HTTPS by Default
dbaplus Community
dbaplus Community
Sep 18, 2023 · Information Security

Why Chrome Is Moving to HTTPS‑First: What It Means for Web Security

Chrome’s latest experiment aims to automatically upgrade all HTTP requests to HTTPS, detailing current HTTPS adoption rates, the new HTTPS‑First mode’s automatic upgrades, unsafe download warnings, phased rollout plans, and how users can enable the feature now for a more secure browsing experience.

BrowserChromeHTTPS
0 likes · 5 min read
Why Chrome Is Moving to HTTPS‑First: What It Means for Web Security
php Courses
php Courses
Aug 21, 2023 · Backend Development

Implementing HTTPS Communication in PHP with cURL

This article explains how to secure PHP communications using HTTPS by obtaining SSL certificates, configuring cURL options, creating requests, verifying server certificates, and handling SSL errors, with complete code examples for developers.

HTTPSSSLsecurity
0 likes · 5 min read
Implementing HTTPS Communication in PHP with cURL
macrozheng
macrozheng
Jul 22, 2023 · Fundamentals

Why Direct IP Access Fails: The Hidden Role of the Host Header in HTTPS

Although you can obtain a website’s IP address, accessing it directly via HTTPS often fails because the HTTP request’s Host header differs, and servers use this header to verify the intended domain, leading to 403 errors unless the correct Host value is supplied.

HTTPHTTPSHost header
0 likes · 5 min read
Why Direct IP Access Fails: The Hidden Role of the Host Header in HTTPS
Liangxu Linux
Liangxu Linux
Jul 18, 2023 · Fundamentals

Why Direct IP Access Fails: The Role of the Host Header

The article explains why visiting a website by its IP address often results in errors, showing that the HTTP Host header differs from domain‑based requests, and demonstrates this with Fiddler and Postman experiments using Baidu as an example.

DNSHTTPHTTPS
0 likes · 4 min read
Why Direct IP Access Fails: The Role of the Host Header
Test Development Learning Exchange
Test Development Learning Exchange
Jul 1, 2023 · Backend Development

Essential Nginx Configurations for Test Development

This article provides a comprehensive guide to essential Nginx configurations—including reverse proxy, static file serving, HTTPS, load balancing, caching, URL rewriting, response headers, gzip compression, SSL redirection, scheduled tasks, security, logging, and basic authentication—to improve the efficiency and stability of interface automation testing.

HTTPScachingload balancing
0 likes · 9 min read
Essential Nginx Configurations for Test Development
Architect's Tech Stack
Architect's Tech Stack
Jun 11, 2023 · Operations

Guide to Upgrading HTTP Sites to HTTPS Using acme.sh

This article explains why and how to upgrade an HTTP website to HTTPS, introduces the differences between the protocols, compares paid and free CA certificates, and provides a step‑by‑step tutorial for installing, issuing, installing, and automatically renewing certificates with the acme.sh script.

CertificateHTTPSSSL
0 likes · 8 min read
Guide to Upgrading HTTP Sites to HTTPS Using acme.sh
php Courses
php Courses
May 8, 2023 · Backend Development

Concurrent Requests to Third-Party APIs in Node.js

This article explains how to use Node.js's built‑in http/https modules to call third‑party APIs and demonstrates three concurrency techniques—Promise.all, async/await with Promise.race, and EventEmitter—to perform parallel requests efficiently, including code examples for constructing requests, handling responses, and error management.

EventEmitterHTTPSNode.js
0 likes · 8 min read
Concurrent Requests to Third-Party APIs in Node.js
Open Source Linux
Open Source Linux
Mar 3, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamental weaknesses of HTTP, demonstrates how man‑in‑the‑middle attacks exploit clear‑text communication, and shows how HTTPS—through SSL/TLS handshakes, certificate validation, and CA hierarchies—protects web traffic from interception and tampering.

HTTPHTTPSMan-in-the-Middle
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
Top Architect
Top Architect
Feb 22, 2023 · Backend Development

Resolving HTTPS Redirect and Session Consistency Issues with Nginx, Docker, and Memcached

This article explains why an Nginx reverse‑proxy configuration that proxies HTTPS requests to a backend server causes the browser URL to change, how to fix the redirect by using HTTPS in the proxy, and how to achieve session consistency across multiple Tomcat instances by deploying Memcached with Docker and adjusting Tomcat’s session manager.

DockerHTTPSMemcached
0 likes · 8 min read
Resolving HTTPS Redirect and Session Consistency Issues with Nginx, Docker, and Memcached
MaGe Linux Operations
MaGe Linux Operations
Feb 20, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamentals of HTTP, demonstrates how its plaintext nature enables man‑in‑the‑middle attacks, explores symmetric and asymmetric encryption attempts to mitigate the risk, and shows how HTTPS—through TLS handshakes, certificate validation, and a trusted CA hierarchy—provides robust protection.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
HaoDF Tech Team
HaoDF Tech Team
Feb 2, 2023 · Mobile Development

Android Client Network Optimization: Framework Unification, HttpDns Integration, and Performance Enhancements

This article details how an Android team unified multiple network libraries into OkHttp, integrated HttpDns to bypass carrier DNS hijacking, migrated to HTTPS and HTTP/2, and applied a series of performance and security optimizations that markedly improved request speed, reliability, and user experience across diverse mobile network conditions.

AndroidHTTP2HTTPDNS
0 likes · 22 min read
Android Client Network Optimization: Framework Unification, HttpDns Integration, and Performance Enhancements
Top Architect
Top Architect
Jan 15, 2023 · Backend Development

Comprehensive Nginx Configuration Guide: Installation, Core Settings, Reverse Proxy, Load Balancing, Caching, HTTPS, CORS and Performance Tuning

This article provides an in‑depth tutorial on Nginx, covering installation on Linux, core configuration directives, server name and location matching, reverse proxy setup, various load‑balancing algorithms, caching strategies, HTTPS setup, CORS handling, gzip compression, and an overview of Nginx's process architecture and module system.

ConfigurationHTTPSNginx
0 likes · 37 min read
Comprehensive Nginx Configuration Guide: Installation, Core Settings, Reverse Proxy, Load Balancing, Caching, HTTPS, CORS and Performance Tuning
Liangxu Linux
Liangxu Linux
Jan 3, 2023 · Information Security

Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption

An in‑depth guide explains the difference between symmetric and asymmetric encryption, why a public key can encrypt but not decrypt, and walks through the TLS 1.2 handshake that underpins HTTPS, covering certificates, random numbers, session key derivation, and the role of public‑private key pairs.

HTTPSHandshakeInformation Security
0 likes · 16 min read
Why Can Public Key Encrypt but Not Decrypt? Unpacking HTTPS Encryption
Su San Talks Tech
Su San Talks Tech
Dec 27, 2022 · Information Security

How to Capture and Decrypt HTTPS Traffic with Wireshark and SSLKEYLOGFILE

This guide walks through capturing Baidu.com packets using ping, tcpdump, and Wireshark, explains why HTTPS traffic is invisible to simple filters, and shows how to decrypt it by exporting TLS keys with SSLKEYLOGFILE and configuring Wireshark to reveal the encrypted data.

HTTPSPacket CaptureSSLKEYLOGFILE
0 likes · 13 min read
How to Capture and Decrypt HTTPS Traffic with Wireshark and SSLKEYLOGFILE
Tencent Cloud Developer
Tencent Cloud Developer
Nov 23, 2022 · Fundamentals

Comprehensive Overview of HTTP/1.x, HTTPS, HTTP/2, and HTTP/3 Protocols

The article surveys the evolution of web communication from HTTP/1.x through HTTPS, HTTP/2, and HTTP/3, explaining request/response structure, methods, status codes, URIs, connection handling, cookies, caching, TLS encryption, and the performance‑boosting features of header compression, multiplexing, and QUIC‑based transport.

HTTPHTTP2HTTPS
0 likes · 44 min read
Comprehensive Overview of HTTP/1.x, HTTPS, HTTP/2, and HTTP/3 Protocols
Liangxu Linux
Liangxu Linux
Nov 17, 2022 · Backend Development

Mastering Caddy 2: Installation, Configuration, and Advanced Features

This guide introduces Caddy 2, an enterprise‑grade Go‑based web server, outlines its key features and advantages over Nginx, provides step‑by‑step installation commands for various Linux distributions and macOS, and demonstrates comprehensive Caddyfile configurations including site blocks, global options, logging, TLS, reverse proxy, and modular snippets.

CaddyConfigurationHTTPS
0 likes · 11 min read
Mastering Caddy 2: Installation, Configuration, and Advanced Features
DaTaobao Tech
DaTaobao Tech
Sep 27, 2022 · Information Security

Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes

This article examines the inherent security flaws of plain HTTP, proposes four solution approaches, and explains why the fourth—combining digital certificates, asymmetric and symmetric encryption—forms the basis of HTTPS, then details TLS 1.2 handshake steps, cryptographic primitives, and practical implementation considerations.

HTTPSTLSTLS Handshake
0 likes · 21 min read
Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes
Programmer DD
Programmer DD
Sep 22, 2022 · Backend Development

Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL

This guide walks through creating a self‑signed SSL certificate with JDK’s keytool, configuring Spring Boot to use the PKCS12 keystore, redirecting HTTP to HTTPS, and alternatively obtaining a free FreeSSL certificate, covering necessary code, configuration files, and deployment steps for both Windows and Linux environments.

CertificateHTTPSSSL
0 likes · 7 min read
Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Detailed HTTPS Handshake Analysis Using Wireshark

This article explains the HTTPS protocol, its security advantages over HTTP, and provides a step‑by‑step Wireshark packet capture and analysis of a test website, covering TCP three‑way handshake, TLS ClientHello/ServerHello, certificate verification, key exchange, and encrypted data transmission.

HTTPSTLSTLS Handshake
0 likes · 15 min read
Detailed HTTPS Handshake Analysis Using Wireshark
HomeTech
HomeTech
Aug 16, 2022 · Information Security

Understanding Chrome 94 Private Network Access Restrictions and CORS Errors

The article explains why browsers like Chrome 94 block cross‑origin requests from public contexts to private‑network resources, illustrates the issue with a reproducible example, analyzes the underlying policy changes, and provides practical solutions and configuration steps to mitigate the problem.

CORSChromeHTTPS
0 likes · 6 min read
Understanding Chrome 94 Private Network Access Restrictions and CORS Errors
iQIYI Technical Product Team
iQIYI Technical Product Team
Jul 22, 2022 · Information Security

HTTPS Request Optimization Strategies for Mobile Video Streaming

To achieve sub‑second start‑up for mobile video streaming, the iQIYI overseas project applies layered HTTPS optimizations—including DNS and certificate caching, ECDHE/X25519 key exchange, false start, lightweight cipher suites, ECDSA certificates, OCSP stapling, and session‑ID/ticket reuse—while transitioning toward TLS 1.3 0‑RTT and HTTP/3 QUIC for further latency reduction.

HTTPSMobile StreamingOCSP stapling
0 likes · 10 min read
HTTPS Request Optimization Strategies for Mobile Video Streaming
Code DAO
Code DAO
May 2, 2022 · Information Security

Understanding the Principles Behind HTTPS

This article explains how HTTPS combines HTTP with SSL/TLS, walks through the TLS handshake steps, describes symmetric and asymmetric encryption, the role of X.509 certificates, digital signatures, certificate chains, and provides a hands‑on OpenSSL guide for manually verifying a server certificate.

CertificateHTTPSOpenSSL
0 likes · 25 min read
Understanding the Principles Behind HTTPS
ELab Team
ELab Team
Apr 29, 2022 · Information Security

Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS

This article explains the evolution from HTTP to HTTPS, detailing HTTP’s history, its security shortcomings, the principles of symmetric and asymmetric encryption, digital signatures, certificate authorities, and the complete HTTPS handshake process, helping readers understand how secure web communication works.

Certificate AuthorityHTTPSTLS
0 likes · 16 min read
Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS
Java Captain
Java Captain
Apr 23, 2022 · Information Security

How to Obtain and Configure an SSL Certificate for Mini Program Deployment

This guide details the step‑by‑step process of obtaining a free SSL certificate, exporting it, and configuring the server with the appropriate key‑store settings to enable HTTPS for a mini‑program, including tips on common pitfalls and verification methods.

CertificateHTTPSMini Program
0 likes · 3 min read
How to Obtain and Configure an SSL Certificate for Mini Program Deployment
IT Services Circle
IT Services Circle
Apr 8, 2022 · Backend Development

Comprehensive Guide to Installing and Using the Caddy Web Server

This article provides a detailed tutorial on installing Caddy on CentOS and Docker, configuring its powerful Caddyfile syntax, enabling HTTPS, reverse and forward proxy, gzip compression, address rewriting, and directory routing, demonstrating how Caddy can replace Nginx for modern web hosting.

CaddyConfigurationDocker
0 likes · 11 min read
Comprehensive Guide to Installing and Using the Caddy Web Server
ELab Team
ELab Team
Apr 1, 2022 · Information Security

Why Your DNS Queries Are Exposed: Hidden Threats and Modern Defenses

This article explains how everyday network protocols such as DNS, HTTP, and IP routing expose your traffic to eavesdropping, hijacking, and spoofing, and it reviews practical mitigations like DNSSEC, DoH, ODoH, TLS 1.3, HSTS, and user‑focused security hygiene.

DNS securityDNSSECDoH
0 likes · 30 min read
Why Your DNS Queries Are Exposed: Hidden Threats and Modern Defenses
Java Backend Technology
Java Backend Technology
Jan 25, 2022 · Information Security

Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC

This article walks through the TLS handshake, explains how client and server derive symmetric keys and MAC secrets, illustrates the encryption process, and shows why the sequence number in TLS MAC calculations prevents replay attacks, answering whether HTTPS can block such attacks.

HTTPSKey derivationMac
0 likes · 9 min read
Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC
IT Xianyu
IT Xianyu
Jan 23, 2022 · Information Security

Upgrading an HTTP Site to HTTPS with acme.sh

This guide explains why and how to migrate an HTTP website to HTTPS, covering the differences between the protocols, options for obtaining SSL certificates, step‑by‑step installation of the acme.sh script, generating, installing, and automatically renewing certificates using both HTTP and DNS validation methods.

CertificateHTTPSSSL
0 likes · 9 min read
Upgrading an HTTP Site to HTTPS with acme.sh
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Selected Java Interview Questions
Selected Java Interview Questions
Oct 13, 2021 · Information Security

Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication

This article explains the fundamentals of the HTTP protocol, illustrates how plain‑text communication enables man‑in‑the‑middle attacks, and describes how symmetric and asymmetric encryption, SSL/TLS handshakes, and CA certificate chains are used in HTTPS to secure web traffic.

HTTPHTTPSMan-in-the-Middle
0 likes · 8 min read
Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2021 · Backend Development

Backend Interview Questions and Answers: HTTP, HTTPS, TCP, Virtual Memory, Eureka, Hystrix, Zookeeper, and Longest Substring Algorithm

This article compiles a series of backend interview questions covering HTTP header fields, HTTPS handshake, TCP connection states, virtual and physical memory concepts, TCP connection limits, Eureka architecture and consistency, Hystrix fault‑tolerance mechanisms, Zookeeper's Zab protocol and leader election, and provides a Java solution for finding the longest substring without repeating characters.

HTTPSTCPalgorithm
0 likes · 19 min read
Backend Interview Questions and Answers: HTTP, HTTPS, TCP, Virtual Memory, Eureka, Hystrix, Zookeeper, and Longest Substring Algorithm
NiuNiu MaTe
NiuNiu MaTe
Oct 4, 2021 · Fundamentals

Master the Basics: 19 Essential TCP/IP and HTTP Interview Questions Explained

This comprehensive guide answers 19 core networking interview questions, covering the TCP/IP five‑layer model, HTTP fundamentals, GET vs POST, ping, status codes, differences among HTTP/1.0, 1.1, 2, 3, HTTPS, TCP connection handshake and teardown, sliding windows, flow control, half‑ and full‑connection queues, packet framing, and the browser request lifecycle.

HTTPHTTP2HTTPS
0 likes · 23 min read
Master the Basics: 19 Essential TCP/IP and HTTP Interview Questions Explained
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Selected Java Interview Questions
Selected Java Interview Questions
Aug 15, 2021 · Information Security

Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures

This article examines common security vulnerabilities in web login processes, demonstrates how plain‑text passwords can be intercepted over HTTP/HTTPS, evaluates symmetric and asymmetric encryption, discusses the limitations of MD5, and proposes token‑based and digital‑signature solutions to protect credentials and data integrity.

AuthenticationHTTPSMD5
0 likes · 14 min read
Understanding Web Login Security: Risks, Encryption Methods, Tokens, and Digital Signatures
Selected Java Interview Questions
Selected Java Interview Questions
Aug 13, 2021 · Information Security

Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation

This article explains why HTTP lacks confidentiality, introduces symmetric, asymmetric, and hybrid encryption, describes the HTTPS handshake steps, and shows how Apache HttpClient builds SSL connections with code examples, highlighting key components such as SSLConnectionSocketFactory and HostnameVerifier.

HTTPSHttpClientSSL
0 likes · 15 min read
Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation
Laravel Tech Community
Laravel Tech Community
Aug 7, 2021 · Information Security

Differences Between HTTP and HTTPS and How HTTPS Ensures Security

The article explains the key differences between HTTP and HTTPS—including transmission security, connection methods, port numbers, and certificate requirements—and describes how HTTPS uses SSL/TLS, public‑key cryptography, and session keys to guarantee secure data exchange.

HTTPHTTPSSSL/TLS
0 likes · 4 min read
Differences Between HTTP and HTTPS and How HTTPS Ensures Security
Programmer DD
Programmer DD
Aug 2, 2021 · Information Security

Why Simple HTML Login Forms Leak Passwords and How to Secure Them

This article examines common security flaws in basic HTML login forms, demonstrates how plaintext passwords can be intercepted over HTTP, evaluates symmetric and asymmetric encryption, discusses the limitations of HTTPS, and proposes practical safeguards such as MD5 hashing, token-based authentication, captchas, and digital signatures to protect user credentials.

HTTPSMD5Token
0 likes · 14 min read
Why Simple HTML Login Forms Leak Passwords and How to Secure Them
macrozheng
macrozheng
Jun 9, 2021 · Information Security

Secure API Authentication: Token vs Signature with Java Code

This article compares token-based and signature-based API authentication methods, discusses their advantages and drawbacks, and provides complete Java code examples—including JWT token utilities, authentication interceptors, and signature verification—to help developers implement robust API security in real-world projects.

API SecurityHTTPSJWT
0 likes · 13 min read
Secure API Authentication: Token vs Signature with Java Code
Top Architect
Top Architect
May 20, 2021 · Backend Development

Comprehensive Guide to Nginx: Overview, Core Configuration, and Practical Deployment

This article provides a detailed introduction to Nginx, covering its architecture, core configuration directives, installation steps, reverse proxy and load‑balancing setups, caching, HTTPS, CORS handling, gzip compression, and practical examples to help developers and operations engineers configure and use Nginx effectively.

CORSConfigurationGzip
0 likes · 39 min read
Comprehensive Guide to Nginx: Overview, Core Configuration, and Practical Deployment
Sohu Tech Products
Sohu Tech Products
May 19, 2021 · Information Security

Understanding HTTPS: TLS/SSL Principles, Encryption, Digital Signatures, and Certificate Authorities

This article explains the fundamental concepts of HTTPS, covering TLS/SSL algorithms, the roles of symmetric and asymmetric encryption, digital signatures, certificate authorities, the TLS 1.2 handshake process, and why HTTPS is preferred over HTTP despite deployment challenges.

Certificate AuthorityHTTPSInformation Security
0 likes · 21 min read
Understanding HTTPS: TLS/SSL Principles, Encryption, Digital Signatures, and Certificate Authorities
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityHTTPSTLS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
Programmer DD
Programmer DD
May 9, 2021 · Information Security

How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More

This article explains practical security measures for login interfaces, covering brute‑force attacks, captcha integration, IP throttling, mobile verification, man‑in‑the‑middle protection with HTTPS, and additional best‑practice recommendations to harden web back‑end authentication.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Open Source Linux
Open Source Linux
Apr 30, 2021 · Backend Development

How to Cut Nginx HTTPS Latency by 30% with TLS Tweaks

This article explains why optimizing Nginx HTTPS latency matters for instant search, describes how TLS handshakes add round‑trip delays, and provides step‑by‑step Nginx TLS configuration changes—such as enabling HTTP/2, adjusting ciphers, enabling OCSP stapling, tuning buffer sizes and session cache—that together reduced request latency by about 30% in a real‑world search service.

BackendHTTPSLatency
0 likes · 13 min read
How to Cut Nginx HTTPS Latency by 30% with TLS Tweaks
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
37 Mobile Game Tech Team
37 Mobile Game Tech Team
Apr 8, 2021 · Information Security

Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes

HTTPS enhances web security over HTTP by encrypting data, authenticating parties with digital certificates, and employing a combined symmetric‑asymmetric handshake using SSL/TLS, which ensures confidentiality, integrity, and trust through certificate chains, hash functions, and secure key exchange mechanisms.

HTTPSSSL/TLSdigital certificates
0 likes · 18 min read
Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes
Programmer DD
Programmer DD
Apr 7, 2021 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms like HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, comparing short and persistent connections, and outlining the security, compatibility, extensibility, and performance requirements that drive HTTPS design.

HTTPSSSL/TLSencryption
0 likes · 13 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPHTTPS
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Programmer DD
Programmer DD
Apr 4, 2021 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article reviews the fundamentals of the HTTP protocol, explains why its plaintext transmission makes it vulnerable to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and CA certificate verification—protects data integrity and confidentiality.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
Architect's Tech Stack
Architect's Tech Stack
Mar 6, 2021 · Information Security

Spring nohttp Project: Scanning and Blocking Insecure HTTP URLs

The Spring nohttp project is an open‑source tool that scans and replaces insecure http:// URLs with HTTPS, preventing man‑in‑the‑middle attacks, updating Maven and documentation links, offering multiple modules and a command‑line interface, and providing example XML configuration for secure classpath resolution.

HTTPSmavennohttp
0 likes · 4 min read
Spring nohttp Project: Scanning and Blocking Insecure HTTP URLs
Java Backend Technology
Java Backend Technology
Feb 28, 2021 · Information Security

Why HTTP Is Unsafe and How HTTPS Secures Your Data

This article examines the vulnerabilities of HTTP, illustrates man‑in‑the‑middle attacks, and explains how HTTPS—through SSL/TLS handshakes, certificate authorities, and asymmetric encryption—protects communications, providing a comprehensive understanding of web security fundamentals for developers and users alike.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Unsafe and How HTTPS Secures Your Data
21CTO
21CTO
Feb 25, 2021 · Information Security

How to Secure Mobile API Calls with Token and Signature Design

This article explains how to secure mobile app open APIs by enforcing HTTPS, designing request signatures with timestamps and tokens, validating them on the server, and managing token‑UID relationships using Redis, complete with Java code examples for parameter extraction and signature generation.

API SecurityHTTPSbackend-development
0 likes · 7 min read
How to Secure Mobile API Calls with Token and Signature Design
Liangxu Linux
Liangxu Linux
Feb 19, 2021 · Backend Development

Master Nginx on CentOS: Installation, Configuration, Reverse Proxy, Load Balancing and HTTPS

This comprehensive guide walks you through installing Nginx on CentOS 7.6, explains core concepts such as simple vs non‑simple requests, CORS, forward and reverse proxies, then shows step‑by‑step configurations for virtual hosts, reverse proxying, gzip compression, load balancing, high‑availability with keepalived, device‑specific routing, HTTPS setup and dozens of practical tricks for production environments.

CORSCentOSGzip
0 likes · 41 min read
Master Nginx on CentOS: Installation, Configuration, Reverse Proxy, Load Balancing and HTTPS
MaGe Linux Operations
MaGe Linux Operations
Jan 27, 2021 · Operations

How to Cut Nginx HTTPS Latency by 30%: Practical TLS Tuning Guide

This article explains why Nginx HTTPS latency matters for instant search, describes how TLS handshake round‑trips affect response time, and provides step‑by‑step Nginx TLS configuration tweaks—including HTTP/2, cipher ordering, OCSP stapling, buffer sizing, and session caching—that together reduced real‑world latency by about 30%.

HTTP2HTTPSLatency
0 likes · 13 min read
How to Cut Nginx HTTPS Latency by 30%: Practical TLS Tuning Guide
ITPUB
ITPUB
Jan 20, 2021 · Information Security

Is HTTPS Really Private? Uncovering Corporate Monitoring and MITM Risks

The article explains how HTTPS works, why it is considered secure, reveals its limitations such as exposed domain names via SNI, describes man‑in‑the‑middle attacks, SSL pinning, and the various ways companies can monitor employee web traffic even when using encrypted connections.

Corporate MonitoringHTTPSMITM
0 likes · 11 min read
Is HTTPS Really Private? Uncovering Corporate Monitoring and MITM Risks
Python Programming Learning Circle
Python Programming Learning Circle
Jan 12, 2021 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

The article explains the vulnerabilities of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and describes the evolution of security mechanisms—including symmetric and asymmetric encryption, TLS handshakes, and certificate authority verification—that together make HTTPS a robust solution for protecting web communications.

Certificate AuthorityHTTPHTTPS
0 likes · 8 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
macrozheng
macrozheng
Jan 7, 2021 · Information Security

How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt

This article explains why transmitting passwords over plain HTTP is unsafe, introduces HTTPS and its TLS encryption process, compares symmetric and asymmetric encryption methods, and recommends secure password storage techniques such as salted hashing and BCrypt to protect against rainbow‑table and brute‑force attacks.

HTTPSHashingbcrypt
0 likes · 11 min read
How to Securely Transmit and Store User Passwords: HTTPS, Encryption, and Bcrypt
21CTO
21CTO
Jan 5, 2021 · Information Security

Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt

This guide explains why and how to upgrade an HTTP website to HTTPS using free Let’s Encrypt certificates and the acme.sh script, covering installation, certificate generation via HTTP or DNS validation, deployment to Apache/Nginx, and automated renewal.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt