Tagged articles
336 articles
Page 4 of 4
21CTO
21CTO
Mar 3, 2017 · Fundamentals

Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic

This article explains the concept of communication protocols, defines HTTP and its security shortcomings, introduces HTTPS with its encryption mechanisms, compares their performance and cost implications, and clarifies common misconceptions, helping developers understand why HTTPS is essential for modern web applications.

HTTPHTTPSProtocols
0 likes · 7 min read
Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic
Tencent Cloud Developer
Tencent Cloud Developer
Dec 22, 2016 · Mobile Development

Understanding iOS App Transport Security (ATS) and Deploying HTTPS with SSL Certificates

After Apple’s 2017 ATS enforcement requires all iOS apps to use HTTPS, developers must obtain an SSL certificate—such as a free Let’s Encrypt or Tencent Cloud‑issued GeoTrust certificate—install it on their web server (e.g., Nginx), optionally configure CDN encryption, and verify compliance with Apple’s security checks.

ATSHTTPSMobile Development
0 likes · 12 min read
Understanding iOS App Transport Security (ATS) and Deploying HTTPS with SSL Certificates
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Aug 18, 2016 · Information Security

Why Chrome Flags Your HTTPS Site Red and How to Fix It

This article explains Chrome's green‑yellow‑red HTTPS indicators, the pitfalls of SHA‑1 certificates, mixed‑content warnings, AES key size choices, and provides concrete Nginx configuration snippets to upgrade to SHA‑2 and modern cipher suites.

ChromeHTTPSSHA2
0 likes · 8 min read
Why Chrome Flags Your HTTPS Site Red and How to Fix It
Efficient Ops
Efficient Ops
Aug 15, 2016 · Information Security

Why Upgrading to HTTPS Is Essential and How Baidu Did It

This article explains why migrating to HTTPS is critical for modern web applications, outlines the technical challenges such as compatibility, latency, and attacks, and details Baidu's practical solutions and free options for small sites to adopt full‑site HTTPS securely and efficiently.

BaiduHTTPSTLS
0 likes · 13 min read
Why Upgrading to HTTPS Is Essential and How Baidu Did It
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
21CTO
21CTO
Jun 10, 2016 · Information Security

Secure Your Site with HTTPS in 30 Minutes Using Let’s Encrypt

This guide walks you through obtaining a free Let’s Encrypt certificate, installing it on typical hosting platforms, fixing common private‑key issues, verifying the setup, and enforcing HTTPS for all requests, all in under half an hour.

HTTPSLet’s EncryptSSL
0 likes · 5 min read
Secure Your Site with HTTPS in 30 Minutes Using Let’s Encrypt
Tencent TDS Service
Tencent TDS Service
May 26, 2016 · Information Security

Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained

This article explains the fundamentals of HTTPS by comparing web communication to passing notes in a classroom, covering symmetric and asymmetric encryption, RSA key exchange, the role of Certificate Authorities, and how these mechanisms together protect against man‑in‑the‑middle attacks.

Certificate AuthorityHTTPSSSL
0 likes · 10 min read
Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained
21CTO
21CTO
Apr 21, 2016 · Frontend Development

How Qzone Boosted Mobile HTTPS Performance by Over 1 Second

This article details how Qzone’s front‑end and operations teams tackled the 50% slowdown after switching to HTTPS on mobile, using SPDY, TCP and SSL session reuse, domain consolidation, and TLS tuning to shave more than 1000 ms off page load times.

HTTPSMobile FrontendSPDY
0 likes · 8 min read
How Qzone Boosted Mobile HTTPS Performance by Over 1 Second
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Browser SecurityCertificate AuthorityHTTPS
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue
21CTO
21CTO
Apr 14, 2016 · Information Security

Boost HTTPS Performance: Protocol and Configuration Optimizations

This article explains how to accelerate HTTPS access, reduce computational load, and harden security by applying protocol‑level tweaks such as TCP Fast Open, HSTS, session resumption, OCSP stapling, false start, SPDY/HTTP2, as well as practical deployment strategies like full‑site HTTPS, domain planning, connection reuse, and handling common migration issues.

HTTPSTLSoptimization
0 likes · 24 min read
Boost HTTPS Performance: Protocol and Configuration Optimizations
Architecture Digest
Architecture Digest
Apr 13, 2016 · Information Security

HTTPS Optimization: Protocol and Configuration Best Practices

This article explains how to improve HTTPS performance and security by optimizing protocol features such as TCP Fast Open, HSTS, session resumption, OCSP stapling, False Start, and SPDY/HTTP2, discusses computational enhancements like ECC and OpenSSL upgrades, and provides practical deployment guidance for large‑scale web sites.

HTTPSTLSWeb Optimization
0 likes · 26 min read
HTTPS Optimization: Protocol and Configuration Best Practices
21CTO
21CTO
Apr 13, 2016 · Information Security

Why HTTPS Slows You Down and How It Secures Your Data

The article explains that HTTPS combines HTTP with TLS to provide encryption, authentication, and data integrity, describes TLS versions, key‑exchange algorithms such as RSA and ECDHE, and analyzes the network round‑trip and CPU overhead that HTTPS introduces, while also discussing deployment costs and optimization considerations.

HTTPSTLSencryption
0 likes · 29 min read
Why HTTPS Slows You Down and How It Secures Your Data
Architecture Digest
Architecture Digest
Apr 10, 2016 · Information Security

Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies

This article provides a comprehensive overview of HTTPS, explaining its purpose, advantages, and drawbacks, and delves into the underlying cryptographic concepts such as symmetric and asymmetric encryption, hash algorithms, digital signatures, digital certificates, and the detailed SSL/TLS handshake process.

HTTPSInformation SecuritySSL
0 likes · 19 min read
Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies
21CTO
21CTO
Apr 1, 2016 · Information Security

Understanding HTTPS: How SSL/TLS Secures Web Communication

This article explains HTTPS fundamentals, its encryption mechanisms, differences from HTTP, the roles of symmetric and asymmetric cryptography, hash functions, digital signatures, certificate issuance and validation, as well as SSL/TLS protocols, handshake steps, and session resumption techniques that secure web communications.

HTTPSSSLTLS
0 likes · 18 min read
Understanding HTTPS: How SSL/TLS Secures Web Communication
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2016 · Information Security

Secure Your Site for Free: Let’s Encrypt SSL Setup on CentOS with Docker

This guide explains how Let’s Encrypt provides free SSL certificates, outlines its key features, shows step‑by‑step installation on CentOS (including Docker usage), demonstrates domain validation, certificate issuance, renewal and revocation, and details configuration files and supported plugins.

CentOSHTTPSLet’s Encrypt
0 likes · 11 min read
Secure Your Site for Free: Let’s Encrypt SSL Setup on CentOS with Docker
21CTO
21CTO
Mar 8, 2016 · Frontend Development

Which Wins: HTTPS, SPDY, or HTTP/2? A Real-World Performance Comparison

This article translates and expands a performance study that pits HTTPS, SPDY/3.1, and HTTP/2 against each other using Firefox and HttpWatch on Google UK's homepage, revealing trade‑offs in header compression, response size, connection multiplexing, and page‑load speed.

HTTP/2HTTPSProtocol comparison
0 likes · 8 min read
Which Wins: HTTPS, SPDY, or HTTP/2? A Real-World Performance Comparison
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CAHTTPSInformation Security
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 15, 2016 · Information Security

Alibaba’s Full‑Site HTTPS Deployment for E‑Commerce: Challenges, Architecture, and Performance Optimizations

The article examines Alibaba’s large‑scale rollout of full‑site HTTPS across its e‑commerce platforms, detailing the technical hurdles of performance, compatibility, and operational planning, and describing the architectural solutions and optimizations that enabled secure, high‑performance user experiences.

AlibabaFull‑Site EncryptionHTTPS
0 likes · 7 min read
Alibaba’s Full‑Site HTTPS Deployment for E‑Commerce: Challenges, Architecture, and Performance Optimizations
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudCertificateHTTPS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It
Architect
Architect
Dec 16, 2015 · Information Security

Understanding HTTPS Certificates, Trust Chains, and Security Practices

This article explains how HTTPS certificates are trusted, the role of Certificate Authorities, how browsers verify signatures, common pitfalls such as compromised root certificates, and practical measures like CSP and gradual rollout strategies to ensure secure web deployments across different regions and devices.

CSPHTTPSTLS
0 likes · 8 min read
Understanding HTTPS Certificates, Trust Chains, and Security Practices
ITPUB
ITPUB
Dec 10, 2015 · Information Security

How Browsers and Servers Negotiate TLS Cipher Suites: A Deep Dive

This article explains the step‑by‑step process of TLS cipher suite negotiation between browsers and servers, covering browser‑side cipher listing, server‑side configuration, the meaning of cipher names, and how the final suite is selected, with practical Wireshark and PowerShell examples.

Cipher SuiteHTTPSPowerShell
0 likes · 9 min read
How Browsers and Servers Negotiate TLS Cipher Suites: A Deep Dive
Architect
Architect
Nov 15, 2015 · Fundamentals

How HTTPS Affects Access Speed and User Experience

HTTPS enhances privacy and prevents traffic hijacking but introduces additional network round‑trip times and cryptographic computation, which can increase page load latency by several RTTs and tens of milliseconds, especially on first‑time connections, affecting overall user experience.

HTTPSWebnetwork
0 likes · 7 min read
How HTTPS Affects Access Speed and User Experience
High Availability Architecture
High Availability Architecture
Aug 8, 2015 · Information Security

Managing HTTPS Certificates When Using Third‑Party CDN Services

The article explains how HTTPS works, why traditional CDN architectures based on CNAME aliases can conflict with HTTPS certificate validation, and compares two common approaches—custom certificates and shared certificates—highlighting their security implications and performance considerations for web operators.

CDNHTTPSWeb Performance
0 likes · 6 min read
Managing HTTPS Certificates When Using Third‑Party CDN Services
High Availability Architecture
High Availability Architecture
Jul 30, 2015 · Information Security

Web Application Security Threats and Mitigation Strategies

This article outlines the most common web application security threats—including XSS, SQL injection, CSRF, transmission hijacking, credential leaks, brute‑force attacks, and token theft—and provides practical mitigation techniques such as proper escaping, CSP, parameterized queries, CSRF tokens, HTTPS, HSTS, HPKP, encrypted password storage, two‑factor authentication, and robust token handling.

CSPCSRFHTTPS
0 likes · 26 min read
Web Application Security Threats and Mitigation Strategies
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 21, 2015 · Information Security

Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity

The article explains how malicious JavaScript can turn browsers into participants of DDoS attacks through techniques like server hijacking and man‑in‑the‑middle injection, and describes how HTTPS and the emerging Subresource Integrity feature can help protect websites from such threats.

DDoSHTTPSJavaScript
0 likes · 6 min read
Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity
MaGe Linux Operations
MaGe Linux Operations
Jan 5, 2015 · Information Security

Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase

This article walks through a real‑time TLS 1.0 handshake captured with Wireshark, explaining client and server hello messages, certificate verification, RSA key exchange, pre‑master and master secret derivation, key block generation, RC4 encryption, and how the encrypted HTTP request and response are finally delivered to the application layer.

HTTPSRSATLS
0 likes · 30 min read
Inside a 220 ms TLS Handshake: How Firefox Secures Your Amazon Purchase
Baidu Tech Salon
Baidu Tech Salon
Apr 15, 2014 · Information Security

Web Traffic Hijacking: Risks, Techniques, and Defenses

Web traffic hijacking exploits the plaintext nature of HTTP to inject malicious scripts, steal cookies and saved passwords, poison caches or offline storage, bypass HTTPS redirects, and even compromise downloads, making unauthenticated browsing, auto‑fill features, and public Wi‑Fi especially dangerous without proper defenses.

HTTPSInformation SecurityTraffic Hijacking
0 likes · 27 min read
Web Traffic Hijacking: Risks, Techniques, and Defenses