Tagged articles
12 articles
Page 1 of 1
Selected Java Interview Questions
Selected Java Interview Questions
Jul 3, 2025 · Frontend Development

Understanding Same-Origin Policy and CORS: A Complete Guide

This article explains the fundamentals of the browser's same-origin policy, its security implications, how it restricts DOM, web data and network access, and provides a detailed overview of CORS, including simple requests, preflight checks, required headers, and best practices for safe cross-origin communication.

CORSCross-OriginWeb Security
0 likes · 14 min read
Understanding Same-Origin Policy and CORS: A Complete Guide
Top Architect
Top Architect
May 21, 2025 · Frontend Development

Understanding Same‑Origin Policy and CORS in Web Development

This article explains the browser's same‑origin policy, its role in preventing XSS, CSRF and other attacks, details the protocol, host and port rules, illustrates with examples, and then describes CORS, simple and preflight requests, credential handling, and provides a complete request flow diagram.

CORSHTTPWeb Security
0 likes · 17 min read
Understanding Same‑Origin Policy and CORS in Web Development
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Oct 26, 2024 · Frontend Development

Cross-Origin and Same-Origin Strategies: JSONP, CORS, Proxy, Nginx, WebSocket, postMessage, and document.domain

This article explains the concepts of cross‑origin and same‑origin policies, and demonstrates multiple solutions—including JSONP, CORS headers, proxy servers, Nginx configuration, WebSocket communication, postMessage, and document.domain—providing both front‑end and back‑end code examples for each method.

CORSCross-OriginJSONP
0 likes · 13 min read
Cross-Origin and Same-Origin Strategies: JSONP, CORS, Proxy, Nginx, WebSocket, postMessage, and document.domain
Top Architect
Top Architect
Sep 29, 2024 · Frontend Development

Understanding Same‑Origin Policy and CORS in Frontend Development

This article explains the fundamentals of the same‑origin policy, the security risks it mitigates, and how CORS and preflight requests work in browsers, illustrating the concepts with diagrams, header details, and a complete request flow chart.

HTTPWeb Securityfrontend
0 likes · 16 min read
Understanding Same‑Origin Policy and CORS in Frontend Development
macrozheng
macrozheng
Jul 18, 2024 · Information Security

Mastering Same-Origin Policy and CORS: A Complete Guide for Secure Web Development

This article explains the fundamentals of the same‑origin policy, its impact on DOM, web data and network requests, and provides a detailed overview of CORS, simple requests, preflight requests, and the necessary response headers to securely enable cross‑origin communication in modern browsers.

BrowserCORSWeb Security
0 likes · 13 min read
Mastering Same-Origin Policy and CORS: A Complete Guide for Secure Web Development
Architect
Architect
Sep 20, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the fundamentals of the Same‑Origin Policy, its security implications, and how Cross‑Origin Resource Sharing (CORS) works—including simple requests, preflight requests, and handling credentials—to help developers safely perform cross‑domain HTTP operations in browsers.

BrowserCORSCross-Origin
0 likes · 11 min read
Understanding Same-Origin Policy and CORS in Web Development
Selected Java Interview Questions
Selected Java Interview Questions
Sep 8, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the same‑origin policy, its security implications for DOM, web data and network communication, and how Cross‑Origin Resource Sharing (CORS) with simple and preflight requests enables controlled cross‑domain interactions while protecting users from attacks such as XSS, CSRF, and others.

CORSCross-OriginWeb Security
0 likes · 10 min read
Understanding Same-Origin Policy and CORS in Web Development
Meituan Technology Team
Meituan Technology Team
Oct 11, 2018 · Information Security

Understanding CSRF Attacks and Prevention Strategies in Front-End Development

CSRF attacks trick a logged‑in user’s browser into sending authenticated requests to a target site, enabling unauthorized actions, so front‑end developers must mitigate them by enforcing same‑origin checks, using anti‑CSRF tokens or double‑cookie verification, and configuring SameSite cookie attributes to block cross‑site requests.

CSRFCross-Site Request ForgerySameSite Cookie
0 likes · 33 min read
Understanding CSRF Attacks and Prevention Strategies in Front-End Development
Qunar Tech Salon
Qunar Tech Salon
Jun 6, 2017 · Information Security

Same‑Origin Policy and Cross‑Origin Techniques in Web Development

This article explains the fundamentals of the browser same‑origin policy, defines what constitutes an origin, describes the restrictions it imposes, and surveys practical cross‑origin solutions such as dynamic tags, JSONP, CORS, postMessage, document.domain, window.name, fetch, and WebSocket.

CORSCross-OriginWeb Security
0 likes · 15 min read
Same‑Origin Policy and Cross‑Origin Techniques in Web Development
JavaScript
JavaScript
Nov 8, 2016 · Frontend Development

Mastering Cross-Origin Techniques: JSONP, img Ping, window.name, postMessage & CORS

Explore multiple cross-origin communication methods—including same-origin rules, JSONP, img ping, window.name, postMessage, and CORS—by understanding their principles, code examples, and server requirements, enabling developers to safely exchange data across different domains in web applications.

CORSCross-OriginJSONP
0 likes · 8 min read
Mastering Cross-Origin Techniques: JSONP, img Ping, window.name, postMessage & CORS