Tagged articles
336 articles
Page 3 of 4
Java Interview Crash Guide
Java Interview Crash Guide
Jan 1, 2021 · Information Security

How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, details the role of Certificate Authorities, illustrates the handshake process, and clarifies common misconceptions about its safety and vulnerability to packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks
Liangxu Linux
Liangxu Linux
Dec 30, 2020 · Information Security

Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks

The article explains the vulnerabilities of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and then details how HTTPS—built on SSL/TLS, asymmetric key exchange, and CA certificate validation—prevents these attacks, providing a comprehensive overview of secure web communication.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures
macrozheng
macrozheng
Dec 18, 2020 · Information Security

How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates

This article explains why HTTP is insecure, outlines the four core principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and signatures to establish confidentiality, integrity, authentication, and non-repudiation for safe data transmission.

HTTPSTLScryptography
0 likes · 15 min read
How HTTPS Secures Your Data: From Symmetric Encryption to Digital Certificates
Top Architect
Top Architect
Dec 17, 2020 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, demonstrates how its plaintext transmission enables man‑in‑the‑middle attacks, and then details how HTTPS (TLS/SSL) with certificate authority verification and asymmetric key exchange secures web communication against such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Dec 8, 2020 · Information Security

Understanding HTTPS: How Secure Communication Is Achieved Over HTTP

This article explains why plain HTTP is insecure, outlines the four fundamental principles of secure communication, and details how HTTPS uses symmetric encryption, asymmetric encryption, digital certificates, and digital signatures to establish confidentiality, integrity, authentication, and non-repudiation for web traffic.

HTTPSTLSdigital certificate
0 likes · 13 min read
Understanding HTTPS: How Secure Communication Is Achieved Over HTTP
Top Architect
Top Architect
Dec 5, 2020 · Information Security

How to Upgrade an HTTP Site to HTTPS Using acme.sh

This guide explains why and how to migrate a website from HTTP to HTTPS by obtaining free Let’s Encrypt certificates, installing the acme.sh script, using HTTP or DNS validation, copying the certificates to the web server, and automating renewal and updates.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
How to Upgrade an HTTP Site to HTTPS Using acme.sh
Qunar Tech Salon
Qunar Tech Salon
Dec 1, 2020 · Information Security

Bypassing and Defending HTTPS Certificate Verification in Android Apps

This article explains the mechanisms of HTTPS certificate verification in Android, outlines various implementation methods, demonstrates how to bypass verification using tools like JustTrustMe and SSLkiller, and provides detection and protection strategies for developers to safeguard their apps against such attacks.

AndroidCertificate VerificationHTTPS
0 likes · 9 min read
Bypassing and Defending HTTPS Certificate Verification in Android Apps
Architecture Digest
Architecture Digest
Oct 17, 2020 · Information Security

Understanding HTTPS: Principles, Encryption, and Security

This article explains why HTTPS has become essential for web security, compares it with HTTP, describes the weaknesses of plain HTTP and hashing algorithms, and details how symmetric and asymmetric encryption together with TLS/SSL certificates secure data transmission over the Internet.

HTTPSInformation SecurityTLS
0 likes · 11 min read
Understanding HTTPS: Principles, Encryption, and Security
Aotu Lab
Aotu Lab
Oct 14, 2020 · Frontend Development

Explore Webpack 5, HTTPS Essentials, ARCore, React‑Three‑Fiber, and AI Chatbots

This article surveys recent front‑end breakthroughs—including Webpack 5’s new features and Module Federation—explains HTTPS fundamentals and Nginx setup, introduces ARCore core concepts, demonstrates React‑Three‑Fiber for three.js, reviews AI dialogue system research, and highlights the open‑source ckplayer video player.

HTTPSarcoreckplayer
0 likes · 6 min read
Explore Webpack 5, HTTPS Essentials, ARCore, React‑Three‑Fiber, and AI Chatbots
Efficient Ops
Efficient Ops
Oct 8, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article explains the inherent insecurity of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and shows how HTTPS—through SSL/TLS handshakes, RSA key exchange, and a trusted CA hierarchy—protects communications from such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
Architecture Digest
Architecture Digest
Oct 7, 2020 · Information Security

Upgrading an HTTP Site to HTTPS with acme.sh and Let’s Encrypt

This guide explains why and how to migrate an HTTP website to HTTPS by adding an SSL/TLS certificate, covering the differences between HTTP and HTTPS, options for obtaining free or paid CA certificates, installing the acme.sh script, generating and installing certificates, and handling updates and troubleshooting.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
Upgrading an HTTP Site to HTTPS with acme.sh and Let’s Encrypt
MaGe Linux Operations
MaGe Linux Operations
Sep 10, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and a trusted CA certificate hierarchy—secures communications by encrypting data and preventing interception and tampering.

HTTPHTTPSInformation Security
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks
Efficient Ops
Efficient Ops
Aug 26, 2020 · Operations

Why Does Nginx Reset HTTPS Curl Requests? A Deep Dive and Fix

After adding an HTTPS certificate to a website, browsers load fine but curl requests are reset; this article chronicles the troubleshooting steps—examining network ports, cipher suites, client buffers, SSL session cache settings, and common Nginx error logs—to pinpoint and resolve the underlying cause.

HTTPSSSLcURL
0 likes · 11 min read
Why Does Nginx Reset HTTPS Curl Requests? A Deep Dive and Fix
WeDoctor Frontend Technology
WeDoctor Frontend Technology
Aug 10, 2020 · Frontend Development

Master Web Debugging with Whistle: A Frontend Engineer’s Guide

This guide explains why a flexible proxy tool like Whistle is essential for frontend development, covering its features, installation, configuration, HTTPS handling, matching rules, and common use‑cases such as host binding, request/response replacement, script injection, remote console, and Weinre integration.

HTTPSNodeWhistle
0 likes · 18 min read
Master Web Debugging with Whistle: A Frontend Engineer’s Guide
Open Source Linux
Open Source Linux
Jul 13, 2020 · Information Security

Demystifying HTTPS: How Encryption and Certificates Secure the Web

This article explains in plain language what HTTPS is, how it encrypts data using symmetric and asymmetric techniques, how it verifies server identity with digital signatures and certificates, and why these mechanisms keep web communications safe from eavesdropping and tampering.

HTTPSInformation SecurityTLS
0 likes · 7 min read
Demystifying HTTPS: How Encryption and Certificates Secure the Web
Laravel Tech Community
Laravel Tech Community
Jul 6, 2020 · Operations

A Minimal Nginx Tutorial: Installation, Commands, Reverse Proxy, HTTPS, Load Balancing and Advanced Configurations

This tutorial introduces Nginx as a lightweight web, reverse‑proxy and mail server, explains core concepts such as reverse proxying, provides essential command‑line shortcuts, shows how to create startup scripts, and walks through HTTP/HTTPS proxy setups, load‑balancing strategies, multi‑app routing, static‑site serving, file‑server configuration and CORS handling.

ConfigurationDevOpsHTTPS
0 likes · 16 min read
A Minimal Nginx Tutorial: Installation, Commands, Reverse Proxy, HTTPS, Load Balancing and Advanced Configurations
Programmer DD
Programmer DD
Jul 3, 2020 · Information Security

Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption

This article explains why HTTPS is essential, compares symmetric and asymmetric encryption, illustrates how encryption keys are securely exchanged, and outlines the three core reasons HTTPS reliably protects data from eavesdropping and man‑in‑the‑middle attacks.

HTTPSInformation SecurityTLS
0 likes · 5 min read
Why HTTPS Matters: Understanding Symmetric & Asymmetric Encryption
Sohu Tech Products
Sohu Tech Products
Jun 24, 2020 · Information Security

Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT

This article explains how HTTPS security depends on certificates, outlines the risks of certificate forgery, describes the certificate issuance process, and introduces Certificate Transparency and the Expect-CT header as mechanisms to detect and mitigate forged certificates.

CACertificate ForgeryCertificate Transparency
0 likes · 7 min read
Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT
Programmer DD
Programmer DD
Jun 19, 2020 · Information Security

Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication

This article explains why HTTPS is essential for protecting privacy, ensuring data integrity, and authenticating servers, describes the evolution of SSL/TLS, and walks through the handshake process that combines asymmetric and symmetric encryption to secure web traffic.

Certificate AuthorityHTTPSSSL
0 likes · 14 min read
Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSPublic Key InfrastructureTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Architecture Digest
Architecture Digest
May 23, 2020 · Information Security

Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions

This article explains how HTTPS works by detailing the certificate verification and data transmission phases, the use of asymmetric and symmetric encryption, the role of Certificate Authorities, potential man‑in‑the‑middle attacks, browser validation steps, and why HTTPS does not fully prevent packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions
Laravel Tech Community
Laravel Tech Community
May 20, 2020 · Information Security

How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS

The article explains the fundamental differences between HTTP and HTTPS, outlines how HTTPS adds SSL/TLS encryption to the standard HTTP protocol, describes the step‑by‑step communication process—including certificate verification, key exchange, and encrypted data transfer—and compares ports, security, and connection details.

HTTPHTTPSSSL
0 likes · 6 min read
How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS
Liangxu Linux
Liangxu Linux
Mar 21, 2020 · Information Security

Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained

This article explains why HTTPS was created to address HTTP’s lack of encryption, authentication, and integrity, describes how TLS/SSL adds security, details the roles of symmetric and asymmetric encryption, hash algorithms, digital certificates, and the full handshake process that secures modern web communication.

HTTPSInformation SecuritySSL
0 likes · 19 min read
Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained
Sohu Tech Products
Sohu Tech Products
Mar 11, 2020 · Mobile Development

In‑Depth Analysis of AFNetworking Architecture and Design for iOS

This article provides a comprehensive technical walkthrough of AFNetworking, covering its core classes, request and response serialization, task management, network activity indicator handling, reachability monitoring, and SSL pinning security policies, illustrating how the library abstracts NSURLSession for iOS developers.

AFNetworkingHTTPSMobile Development
0 likes · 29 min read
In‑Depth Analysis of AFNetworking Architecture and Design for iOS
Efficient Ops
Efficient Ops
Feb 19, 2020 · Information Security

How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained

This article explains how HTTPS protects data through encryption and identity authentication, describes symmetric and asymmetric algorithms, outlines PKI and certificate issuance processes, demonstrates Nginx certificate deployment, and shows how trust chains and cross‑certificates ensure reliable secure connections.

CertificateCross CertificateHTTPS
0 likes · 14 min read
How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained
Efficient Ops
Efficient Ops
Jan 6, 2020 · Information Security

Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls

This article thoroughly explains how HTTPS ensures secure communication by detailing its certificate verification, the use of asymmetric encryption for authentication and symmetric encryption for data transfer, the role of Certificate Authorities, common attacks like man‑in‑the‑middle, and why HTTPS alone cannot prevent all forms of packet sniffing.

Certificate AuthorityHTTPSTLS
0 likes · 12 min read
Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls
Architect's Tech Stack
Architect's Tech Stack
Jan 1, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying TLS handshake and data transmission process, clarifies the roles of asymmetric and symmetric encryption, the necessity of CA‑issued certificates, and discusses common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding the Principles and Security Mechanisms of HTTPS
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
360 Quality & Efficiency
360 Quality & Efficiency
Nov 19, 2019 · Operations

Common Fiddler Issues and Their Solutions

This article shares practical troubleshooting steps for frequent Fiddler problems such as HTTPS capture failures, proxy connection refusals caused by host or IPv6 settings, and registration errors after Windows upgrades, helping testers quickly resolve proxy configuration issues.

FiddlerHTTPSProxy
0 likes · 4 min read
Common Fiddler Issues and Their Solutions
Programmer DD
Programmer DD
Nov 16, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security concepts that protect client‑server communication.

HTTPSInformation SecurityPublic Key Infrastructure
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Deep Dive
Senior Brother's Insights
Senior Brother's Insights
Nov 14, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Step‑by‑Step Design Walkthrough

This article reconstructs the design of HTTPS by starting from a simple secure chat, explaining why symmetric encryption alone cannot secure web traffic, introducing asymmetric encryption for key exchange, detailing how digital certificates and certificate authorities solve public‑key distribution, and summarizing the TLS handshake process.

HTTPSInformation SecurityTLS
0 likes · 12 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption: A Step‑by‑Step Design Walkthrough
Efficient Ops
Efficient Ops
Nov 12, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)

This article walks through the design of HTTPS, showing how symmetric encryption secures data while asymmetric encryption safely negotiates keys, and explains the role of digital certificates and certificate authorities in preventing man‑in‑the‑middle attacks.

HTTPSPublic Key InfrastructureTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2019 · Information Security

Demystifying HTTPS: How Secure HTTP Protects Your Data

This article explains what HTTPS is, why it adds encryption to HTTP, how SSL/TLS, symmetric and asymmetric cryptography, certificates, and handshakes work together to ensure confidentiality, integrity, and authenticity, and discusses the performance impact of HTTPS connections.

HTTPSTLScertificates
0 likes · 11 min read
Demystifying HTTPS: How Secure HTTP Protects Your Data
21CTO
21CTO
Aug 26, 2019 · Backend Development

Master Nginx: From Basics to Reverse Proxy, Load Balancing, and CORS

This comprehensive Nginx tutorial walks beginners through core concepts, installation commands, startup scripts, HTTP/HTTPS reverse‑proxy configurations, various load‑balancing strategies, multi‑webapp routing, static site serving, file server setup, and CORS handling with clear examples and code snippets.

CORSHTTPSNginx
0 likes · 19 min read
Master Nginx: From Basics to Reverse Proxy, Load Balancing, and CORS
Efficient Ops
Efficient Ops
Jun 10, 2019 · Operations

Boost Nginx Security: Essential Configurations You Must Apply

This article outlines practical Nginx security settings—including hiding version info, enabling HTTPS, configuring allow/deny lists, basic authentication, request method restrictions, user‑agent blocking, hotlink protection, connection limits, buffer size tweaks, timeout adjustments, and secure response headers—to help harden your web server against common attacks.

ConfigurationHTTPSNginx
0 likes · 11 min read
Boost Nginx Security: Essential Configurations You Must Apply
21CTO
21CTO
May 9, 2019 · Information Security

Why HTTPS Matters: Encryption, Certificates, and Handshake Explained

HTTPS secures web communication by combining symmetric and asymmetric encryption, digital certificates, and signatures, addressing HTTP’s confidentiality, integrity, and authenticity flaws; the article explains these cryptographic concepts, the SSL/TLS handshake steps, and when HTTPS is appropriate despite its performance overhead.

HTTPSTLSWeb Security
0 likes · 12 min read
Why HTTPS Matters: Encryption, Certificates, and Handshake Explained
58 Tech
58 Tech
Apr 25, 2019 · Information Security

Troubleshooting X-Forwarded-For Null Issue with Tomcat Behind Nginx Over HTTPS

When switching from HTTP to HTTPS, Tomcat fails to retrieve the client IP via X-Forwarded-For because of RemoteIpValve configuration and Nginx proxy settings, leading to null values and requiring adjustments in server.xml and Nginx headers to correctly propagate the original client IP.

HTTPSIP SpoofingRemoteIpValve
0 likes · 7 min read
Troubleshooting X-Forwarded-For Null Issue with Tomcat Behind Nginx Over HTTPS
360 Tech Engineering
360 Tech Engineering
Jan 21, 2019 · Frontend Development

How to Quickly Set Up a Local HTTPS Development Environment

This guide explains why HTTPS is required for local web development, demonstrates how to create a self‑signed root CA and a wildcard domain certificate with OpenSSL, shows how to trust the root certificate on macOS, and provides example Webpack devServer and hosts file configurations for a secure local workflow.

Certificate AuthorityHTTPSLocal Development
0 likes · 6 min read
How to Quickly Set Up a Local HTTPS Development Environment
ITPUB
ITPUB
Dec 21, 2018 · Backend Development

Mastering Nginx: Installation, Reverse Proxy, Load Balancing, and CORS Setup

This guide explains what Nginx is, how to install it on Linux and Windows, compile from source, use common control commands, and configure HTTP/HTTPS reverse proxy, load balancing, multiple web‑app routing, static site serving, and CORS handling with practical code examples.

CORSConfigurationHTTPS
0 likes · 16 min read
Mastering Nginx: Installation, Reverse Proxy, Load Balancing, and CORS Setup
MaGe Linux Operations
MaGe Linux Operations
Dec 16, 2018 · Backend Development

Master Nginx: Install, Configure Reverse Proxy, Load Balancing, and HTTPS

This article provides a comprehensive guide to Nginx, covering its purpose as a lightweight web and reverse‑proxy server, step‑by‑step installation on Linux and Windows, essential command‑line controls, and detailed configuration examples for HTTP reverse proxy, load balancing, multiple webapps, HTTPS, static sites, and CORS handling.

HTTPSServer Configurationload balancing
0 likes · 15 min read
Master Nginx: Install, Configure Reverse Proxy, Load Balancing, and HTTPS
Java Captain
Java Captain
Dec 15, 2018 · Information Security

Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates

This article reconstructs the design of HTTPS by explaining why symmetric encryption, asymmetric encryption, random numbers, digital certificates, and certificate authorities are combined to securely negotiate a shared secret between a client and a web server, while addressing man‑in‑the‑middle attacks and certificate validation.

HTTPSPublic Key InfrastructureTLS
0 likes · 14 min read
Understanding HTTPS Design: From Symmetric Encryption to Digital Certificates
21CTO
21CTO
Dec 11, 2018 · Information Security

Boost Site Performance: HTTPS Optimization with Nginx, HTTP/2, TLS 1.3 & Brotli

This guide explains how to improve website security and speed by configuring Nginx for HTTPS, adopting HTTP/2, enabling TLS 1.3, using Brotli compression, and deploying ECC certificates, while also covering version requirements, compilation steps, and verification methods.

BrotliECCHTTP2
0 likes · 12 min read
Boost Site Performance: HTTPS Optimization with Nginx, HTTP/2, TLS 1.3 & Brotli
21CTO
21CTO
Nov 29, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the whimsical story of Alice, Bob, and a meddling pigeon to illustrate how HTTPS works, covering symmetric Caesar‑style ciphers, asymmetric public‑key encryption, certificate authorities, and the trade‑offs between security and performance in modern web communication.

HTTPScryptographypublic key
0 likes · 7 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Efficient Ops
Efficient Ops
Oct 23, 2018 · Information Security

Why HTTPS Matters: Performance, Security, and the Cryptography Behind It

This article explains why HTTPS is essential by comparing HTTP’s performance drawbacks, detailing its security vulnerabilities, and describing the cryptographic mechanisms—including TLS, symmetric and asymmetric encryption, certificates, and HMAC—that HTTPS employs to protect data and enable modern features like HTTP/2.

HTTP/2HTTPSTLS
0 likes · 7 min read
Why HTTPS Matters: Performance, Security, and the Cryptography Behind It
转转QA
转转QA
Oct 10, 2018 · Information Security

Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis

This article introduces Wireshark as a cross‑platform packet capture tool, explains its installation and basic UI, details capture and display filter syntax with examples, and demonstrates how to decrypt and analyze HTTPS traffic by importing SSL key logs.

FiltersHTTPSInformation Security
0 likes · 8 min read
Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Aug 1, 2018 · Information Security

Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More

This article dispels seven widespread HTTPS misconceptions—from caching and certificate costs to speed and IP requirements—explaining how browsers handle secure caching, affordable SSL options, wildcard certificates, migration steps, performance impacts, and why HTTPS is essential beyond login pages.

HTTPSSSLWeb Security
0 likes · 7 min read
Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More
Architects' Tech Alliance
Architects' Tech Alliance
Jun 13, 2018 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms such as HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, the differences between symmetric and asymmetric cryptography, and the core security requirements of confidentiality, integrity, authenticity, and performance.

HTTPHTTPSInformation Security
0 likes · 14 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
Programmer DD
Programmer DD
Jun 10, 2018 · Information Security

How to Secure API Calls with End-to-End Encryption in Spring Boot and JavaScript

This guide explains practical methods to protect API data, covering HTTPS, request signing, SSL pinning, symmetric and asymmetric encryption, a Spring Boot starter for automatic request/response encryption, and JavaScript/Axios interceptors for client‑side encryption and decryption.

AES encryptionAPI SecurityHTTPS
0 likes · 11 min read
How to Secure API Calls with End-to-End Encryption in Spring Boot and JavaScript
Architect's Tech Stack
Architect's Tech Stack
May 11, 2018 · Information Security

Understanding Password Encryption, Transmission, and Secure Storage

This article explains how passwords should be encrypted during transmission using symmetric and asymmetric methods such as RSA, why HTTPS is essential, how services like GitHub and Baidu handle login security, and best practices for securely storing passwords with hashing, salting, and strong algorithms like BCrypt and PBKDF2.

HTTPSHashingPBKDF2
0 likes · 11 min read
Understanding Password Encryption, Transmission, and Secure Storage
21CTO
21CTO
Apr 2, 2018 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained

This article walks through a step‑by‑step reconstruction of HTTPS design, showing why secure communication requires per‑client symmetric keys negotiated via asymmetric encryption, digital certificates from trusted CAs, and how signatures and random numbers protect against man‑in‑the‑middle attacks.

HTTPSInformation SecurityTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption Explained
MaGe Linux Operations
MaGe Linux Operations
Mar 26, 2018 · Information Security

Understanding HTTPS: Why Encryption Matters and How It Works

This article explains what HTTPS is, why encrypting HTTP traffic is essential, how symmetric and asymmetric encryption protect data, the role of certificates and public‑key infrastructure, and the performance impact of the HTTPS handshake, providing a concise Q&A guide for beginners.

HTTPSInformation SecurityTLS
0 likes · 11 min read
Understanding HTTPS: Why Encryption Matters and How It Works
Efficient Ops
Efficient Ops
Mar 20, 2018 · Information Security

Why HTTPS Matters: 9 Key Questions Answered

This article explains the fundamentals of HTTPS, covering why encryption is needed, how symmetric and asymmetric cryptography work together, the role of certificates and public‑key infrastructure, and the performance impact of the TLS handshake, all through a concise Q&A format.

HTTPSSSLTLS
0 likes · 11 min read
Why HTTPS Matters: 9 Key Questions Answered
Youzan Coder
Youzan Coder
Mar 9, 2018 · Information Security

Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations

The guide details how a SaaS platform can transition to full‑site HTTPS by explaining the TLS handshake, inventorying static assets, domains and third‑party services, using protocol‑relative URLs, configuring redirects and CSP, testing securely, and addressing common migration challenges such as legacy references and external dependencies.

CDNContent Security PolicyHTTPS
0 likes · 13 min read
Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations
21CTO
21CTO
Jan 11, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the classic Alice‑Bob‑pigeon analogy to demystify HTTPS, illustrating symmetric Caesar‑cipher encryption, asymmetric public‑key exchange, digital signatures, and why a certificate authority is essential for secure web communication.

HTTPSPublic Key Infrastructureasymmetric encryption
0 likes · 8 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Dec 28, 2017 · Information Security

How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic

This article demystifies HTTPS by explaining its underlying encryption, signing, and certificate mechanisms, illustrating how zero‑knowledge proof concepts secure identity verification, and providing practical guidance on upgrading from HTTP, configuring certificates, capturing traffic with Fiddler, and understanding session recovery and performance considerations.

CertificateFiddlerHTTPS
0 likes · 11 min read
How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic
MaGe Linux Operations
MaGe Linux Operations
Nov 16, 2017 · Information Security

How to Secure Apache Zeppelin with HTTPS and Command Restrictions in 4 Hours

During a weekend project, we configured Apache Zeppelin to use HTTPS with a domain certificate, added optional mutual TLS, and modified its source code to restrict shell and Python execution, enabling the client’s security team to pass penetration testing while preserving Zeppelin’s core functionality.

Apache ZeppelinHTTPSSource Code Modification
0 likes · 5 min read
How to Secure Apache Zeppelin with HTTPS and Command Restrictions in 4 Hours
MaGe Linux Operations
MaGe Linux Operations
Jul 26, 2017 · Backend Development

How to Install and Configure Nginx with HTTPS on CentOS

This guide explains how to use Nginx as an HTTPS reverse proxy for WeChat mini‑programs, covering kernel requirements, downloading the proper version, compiling with necessary modules, starting the server, configuring nginx.conf, and setting up rate limiting, all on a CentOS system.

CompilationConfigurationHTTPS
0 likes · 6 min read
How to Install and Configure Nginx with HTTPS on CentOS
21CTO
21CTO
Jul 23, 2017 · Information Security

How to Deploy Free HTTPS with Go and Let’s Encrypt (Step‑by‑Step Guide)

This article explains why HTTPS is essential, compares third‑party and self‑managed TLS options, and provides a complete Go implementation using Let’s Encrypt’s autocert library, including code for certificate handling, HTTP‑to‑HTTPS redirection, DNS requirements, and caching strategies.

GoHTTPSLet’s Encrypt
0 likes · 11 min read
How to Deploy Free HTTPS with Go and Let’s Encrypt (Step‑by‑Step Guide)
dbaplus Community
dbaplus Community
Jul 19, 2017 · Information Security

How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment

This guide explains why plain HTTP is insecure, introduces SSL/TLS fundamentals, compares certificate types, and provides step‑by‑step instructions for configuring HTTPS on a web server (including Nginx redirects), while highlighting performance impacts and testing considerations.

HTTPSNginxSSL
0 likes · 9 min read
How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment
Node Underground
Node Underground
Jun 22, 2017 · Backend Development

8 Essential Node.js Practices Every Backend Developer Should Follow

This article presents eight practical recommendations for Node.js developers, covering dependency locking, lifecycle scripts, modern JavaScript, promises with async/await, code formatting with Prettier, continuous integration testing, security headers via Helmet, and serving over HTTPS.

HTTPSNode.jsPrettier
0 likes · 4 min read
8 Essential Node.js Practices Every Backend Developer Should Follow
ITPUB
ITPUB
Jun 14, 2017 · Information Security

Top HTTPS & HTTP/2 Errors and Practical Fixes

This guide compiles common HTTPS and HTTP/2 deployment problems—such as Let’s Encrypt validation failures, certificate transparency errors, SNI incompatibility, cipher‑suite misconfigurations, and mixed‑content issues—and provides concise, actionable solutions with reference links for each case.

HTTP/2HTTPSNginx
0 likes · 8 min read
Top HTTPS & HTTP/2 Errors and Practical Fixes
ITPUB
ITPUB
May 25, 2017 · Information Security

How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive

This article explains why HTTPS is considered secure, how it prevents man‑in‑the‑middle attacks through certificate verification, details the TLS handshake captured with Wireshark, and shows the cryptographic primitives behind RSA, ECDHE and AES, including practical code snippets and the cost of using HTTPS.

CertificateHTTPSMan-in-the-Middle
0 likes · 19 min read
How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive
Alibaba Cloud Developer
Alibaba Cloud Developer
Apr 18, 2017 · Information Security

Mastering CDN HTTPS: Architecture, Optimization, and Best Practices

This article explains how modern websites rely on HTTPS and CDN, details SSL/TLS and HTTP/2 fundamentals, describes Alibaba Cloud's CDN HTTPS architecture, dynamic certificate management, key‑server solutions, optimization techniques, and practical guidance for deploying HTTPS end‑to‑end.

CDNHTTP/2HTTPS
0 likes · 13 min read
Mastering CDN HTTPS: Architecture, Optimization, and Best Practices