Tag

SSL/TLS

0 views collected around this technical thread.

DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPPPTP
0 likes · 4 min read
Common Types of VPN and Their Characteristics
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CADigital CertificateHTTPS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

HTTPSSSL/TLSTLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
vivo Internet Technology
vivo Internet Technology
Mar 13, 2024 · Operations

Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)

By integrating Intel QuickAssist hardware and AVX‑512 software acceleration into the VUA component of Vivo’s load‑balancing platform, the article demonstrates asynchronous OpenSSL offloading that boosts HTTPS forwarding throughput to roughly 44 000 QPS with QAT cards and 51 000 QPS with software, while preserving scalability and security.

HTTPSIntel QATLoad Balancing
0 likes · 12 min read
Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
vivo Internet Technology
vivo Internet Technology
Jun 28, 2023 · Operations

Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale

vivo replaced fragile, engineer‑driven certificate handling with a centralized Vue‑2/Go platform that automates application, secure key storage, renewal alerts, and multi‑environment pushes, eliminating availability incidents and paving the way for future blockchain‑based, immutable certificate distribution.

DevOpsPlatform DevelopmentSSL/TLS
0 likes · 7 min read
Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale
Laravel Tech Community
Laravel Tech Community
Aug 7, 2021 · Information Security

Differences Between HTTP and HTTPS and How HTTPS Ensures Security

The article explains the key differences between HTTP and HTTPS—including transmission security, connection methods, port numbers, and certificate requirements—and describes how HTTPS uses SSL/TLS, public‑key cryptography, and session keys to guarantee secure data exchange.

HTTPSSSL/TLSSecurity
0 likes · 4 min read
Differences Between HTTP and HTTPS and How HTTPS Ensures Security
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
IT Xianyu
IT Xianyu
Dec 4, 2020 · Operations

10 Tips to Achieve 10× Application Performance with NGINX

This article explains why web application performance is critical, presents ten practical optimization techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS tuning, HTTP/2, software upgrades, Linux and web‑server tuning, and real‑time monitoring—to help developers and operators achieve up to tenfold speed improvements.

HTTP/2Linux TuningLoad Balancing
0 likes · 22 min read
10 Tips to Achieve 10× Application Performance with NGINX
JD Tech Talk
JD Tech Talk
Oct 28, 2020 · Backend Development

Performance Optimization of SSL/TLS in JD.com JDDLB Load Balancer Using Freescale Acceleration Cards

This article describes the architecture of JD.com’s JDDLB public‑traffic load balancer and details how offloading CPU‑intensive SSL/TLS cryptographic operations to Freescale C291 acceleration cards—via custom NGINX modules, OpenSSL Engine integration, and synchronous/asynchronous driver interfaces—significantly improves connection‑establishment rates and overall throughput.

Load BalancingNginxOpenSSL
0 likes · 30 min read
Performance Optimization of SSL/TLS in JD.com JDDLB Load Balancer Using Freescale Acceleration Cards
Architect
Architect
Aug 12, 2020 · Backend Development

10 Tips to Achieve 10× Web Application Performance with NGINX

This article explains why web performance is critical, presents ten practical NGINX‑based recommendations—including reverse proxy, load balancing, caching, compression, SSL/TLS optimization, HTTP/2, software upgrades, Linux tuning, and real‑time monitoring—to help developers and operators dramatically improve application speed and reliability.

Load BalancingNginxReverse Proxy
0 likes · 21 min read
10 Tips to Achieve 10× Web Application Performance with NGINX
Architecture Digest
Architecture Digest
Jul 22, 2020 · Backend Development

10 Tips to Achieve 10× Application Performance with NGINX

This article presents ten practical NGINX‑based techniques—including reverse proxy deployment, load balancing, caching, compression, SSL/TLS optimization, HTTP/2 adoption, software upgrades, Linux tuning, web‑server configuration, and real‑time monitoring—that together can boost web‑application throughput and latency by up to an order of magnitude.

Linux TuningLoad BalancingNginx
0 likes · 22 min read
10 Tips to Achieve 10× Application Performance with NGINX
转转QA
转转QA
Oct 10, 2018 · Information Security

Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis

This article introduces Wireshark as a cross‑platform packet capture tool, explains its installation and basic UI, details capture and display filter syntax with examples, and demonstrates how to decrypt and analyze HTTPS traffic by importing SSL key logs.

FiltersHTTPSSSL/TLS
0 likes · 8 min read
Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis
Youzan Coder
Youzan Coder
Mar 9, 2018 · Information Security

Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations

The guide details how a SaaS platform can transition to full‑site HTTPS by explaining the TLS handshake, inventorying static assets, domains and third‑party services, using protocol‑relative URLs, configuring redirects and CSP, testing securely, and addressing common migration challenges such as legacy references and external dependencies.

Content Security PolicyHTTPSMigration
0 likes · 13 min read
Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations
Meitu Technology
Meitu Technology
Dec 1, 2017 · Mobile Development

Meitu DNS Optimization Practice: LocalDNS vs HTTP DNS and Non-Intrusive SDK Implementation

Meitu improves mobile app performance by combining HTTP DNS for critical domains with fallback LocalDNS, employing lazy cache updates and a non‑intrusive SDK that injects custom resolution via Java reflection and native ELF redirection, resulting in roughly 100 ms latency reduction and fewer unknown‑host errors.

AndroidDNS optimizationELF hooking
0 likes · 14 min read
Meitu DNS Optimization Practice: LocalDNS vs HTTP DNS and Non-Intrusive SDK Implementation
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Mar 23, 2017 · Information Security

Secure Elasticsearch with Search Guard: Step‑by‑Step Installation & Configuration Guide

This article provides a comprehensive, step‑by‑step tutorial on installing and configuring Search Guard for Elasticsearch, covering feature overview, version compatibility, downloading required packages, local installation commands, SSL/TLS certificate generation, and detailed security settings to protect both transport and REST layers.

InstallationSSL/TLSSearch Guard
0 likes · 11 min read
Secure Elasticsearch with Search Guard: Step‑by‑Step Installation & Configuration Guide
Qunar Tech Salon
Qunar Tech Salon
Dec 6, 2016 · Information Security

Implementing HTTPS in Android and Tomcat: Principles, Configuration, and Practice

This article explains the fundamentals of the HTTPS protocol, details the SSL/TLS cryptographic components and handshake process, and provides a step‑by‑step guide for generating keystores, configuring Tomcat, modifying an Android client, and troubleshooting common issues during secure communication.

AndroidHTTPSKeytool
0 likes · 10 min read
Implementing HTTPS in Android and Tomcat: Principles, Configuration, and Practice
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudHTTPSSSL/TLS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It