Tagged articles
35 articles
Page 1 of 1
Java Architect Handbook
Java Architect Handbook
Mar 19, 2026 · Information Security

Why HTTPS Beats HTTP: Deep Dive for Java Interview Success

This article provides a comprehensive technical guide for Java interviewers, detailing HTTP’s security flaws, how HTTPS resolves them through SSL/TLS encryption, certificate verification, and hybrid cryptography, and includes handshake steps, performance comparisons, common follow‑up questions, and concise memory mnemonics.

HTTPHTTPSJava interview
0 likes · 14 min read
Why HTTPS Beats HTTP: Deep Dive for Java Interview Success
Raymond Ops
Raymond Ops
Oct 26, 2025 · Information Security

Top 10 SSL/TLS Questions Every Security Pro Must Master

This comprehensive guide covers the ten most frequently asked SSL/TLS questions, explaining protocol differences, handshake processes, certificate structures, PKI components, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the key improvements introduced in TLS 1.3.

CertificateSSL/TLSTLS 1.3
0 likes · 23 min read
Top 10 SSL/TLS Questions Every Security Pro Must Master
ITPUB
ITPUB
Jan 5, 2025 · Operations

How to Boost Web App Performance 10× with NGINX: 10 Proven Tips

This article explains why web‑application speed is critical, presents ten concrete NGINX‑based techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS tuning, HTTP/2, software updates, Linux and server tuning, and real‑time monitoring—to achieve up to ten‑fold performance gains.

Linux TuningSSL/TLSWeb Performance
0 likes · 25 min read
How to Boost Web App Performance 10× with NGINX: 10 Proven Tips
DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPPPTP
0 likes · 4 min read
Common Types of VPN and Their Characteristics
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
IT Services Circle
IT Services Circle
Apr 4, 2024 · Information Security

Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms

HTTPS secures web communication by adding SSL/TLS encryption to HTTP, providing confidentiality, integrity, authentication, and non-repudiation through a combination of symmetric and asymmetric cryptography, hash functions, digital signatures, and certificate authorities, while addressing migration concerns and performance considerations.

HTTPSSSL/TLSTLS
0 likes · 18 min read
Understanding HTTPS: Security Principles, SSL/TLS, and Encryption Mechanisms
vivo Internet Technology
vivo Internet Technology
Mar 13, 2024 · Operations

Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)

By integrating Intel QuickAssist hardware and AVX‑512 software acceleration into the VUA component of Vivo’s load‑balancing platform, the article demonstrates asynchronous OpenSSL offloading that boosts HTTPS forwarding throughput to roughly 44 000 QPS with QAT cards and 51 000 QPS with software, while preserving scalability and security.

HTTPSHardware accelerationIntel QAT
0 likes · 12 min read
Optimizing VUA HTTPS Forwarding Performance with Intel QuickAssist Technology (QAT)
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
vivo Internet Technology
vivo Internet Technology
Jun 28, 2023 · Operations

Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale

vivo replaced fragile, engineer‑driven certificate handling with a centralized Vue‑2/Go platform that automates application, secure key storage, renewal alerts, and multi‑environment pushes, eliminating availability incidents and paving the way for future blockchain‑based, immutable certificate distribution.

DevOpsInfrastructureOperations Automation
0 likes · 7 min read
Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale
Open Source Linux
Open Source Linux
Mar 3, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamental weaknesses of HTTP, demonstrates how man‑in‑the‑middle attacks exploit clear‑text communication, and shows how HTTPS—through SSL/TLS handshakes, certificate validation, and CA hierarchies—protects web traffic from interception and tampering.

HTTPHTTPSMan-in-the-Middle
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
Code DAO
Code DAO
May 2, 2022 · Information Security

Understanding the Principles Behind HTTPS

This article explains how HTTPS combines HTTP with SSL/TLS, walks through the TLS handshake steps, describes symmetric and asymmetric encryption, the role of X.509 certificates, digital signatures, certificate chains, and provides a hands‑on OpenSSL guide for manually verifying a server certificate.

CertificateHTTPSOpenSSL
0 likes · 25 min read
Understanding the Principles Behind HTTPS
Laravel Tech Community
Laravel Tech Community
Aug 7, 2021 · Information Security

Differences Between HTTP and HTTPS and How HTTPS Ensures Security

The article explains the key differences between HTTP and HTTPS—including transmission security, connection methods, port numbers, and certificate requirements—and describes how HTTPS uses SSL/TLS, public‑key cryptography, and session keys to guarantee secure data exchange.

HTTPHTTPSSSL/TLS
0 likes · 4 min read
Differences Between HTTP and HTTPS and How HTTPS Ensures Security
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 27, 2021 · Operations

10 Proven Ways to Boost Web App Performance Up to 10× with NGINX

This article explains why web performance is critical today, presents ten practical optimization techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS tuning, HTTP/2, software upgrades, Linux and server tuning, and real‑time monitoring—to potentially increase web application speed by up to tenfold.

Linux TuningNginxSSL/TLS
0 likes · 23 min read
10 Proven Ways to Boost Web App Performance Up to 10× with NGINX
37 Mobile Game Tech Team
37 Mobile Game Tech Team
Apr 8, 2021 · Information Security

Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes

HTTPS enhances web security over HTTP by encrypting data, authenticating parties with digital certificates, and employing a combined symmetric‑asymmetric handshake using SSL/TLS, which ensures confidentiality, integrity, and trust through certificate chains, hash functions, and secure key exchange mechanisms.

HTTPSSSL/TLSdigital certificates
0 likes · 18 min read
Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes
Programmer DD
Programmer DD
Apr 7, 2021 · Information Security

Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics

This article explains the fundamentals of HTTPS by clarifying key terms like HTTP, SSL/TLS, and encryption, describing how HTTP works over TCP, comparing short and persistent connections, and outlining the security, compatibility, extensibility, and performance requirements that drive HTTPS design.

HTTPSSSL/TLSencryption
0 likes · 13 min read
Why HTTPS Matters: Understanding HTTP, SSL/TLS, and Encryption Basics
vivo Internet Technology
vivo Internet Technology
Jan 13, 2021 · Information Security

Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios

The article explains RSA key files by detailing the underlying mathematics of prime factorization and modular exponents, introduces a six‑layer abstraction from raw values to application use, demonstrates OpenSSL and keytool commands for generation, conversion, and inspection, and illustrates common deployment scenarios such as HTTPS and MySQL SSL.

ASN.1OpenSSLPKCS
0 likes · 19 min read
Understanding RSA Key Files: Mathematics, Six‑Layer Model, Tools, and Usage Scenarios
IT Xianyu
IT Xianyu
Dec 4, 2020 · Operations

10 Tips to Achieve 10× Application Performance with NGINX

This article explains why web application performance is critical, presents ten practical optimization techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS tuning, HTTP/2, software upgrades, Linux and web‑server tuning, and real‑time monitoring—to help developers and operators achieve up to tenfold speed improvements.

HTTP/2Linux TuningSSL/TLS
0 likes · 22 min read
10 Tips to Achieve 10× Application Performance with NGINX
JD Tech Talk
JD Tech Talk
Oct 28, 2020 · Backend Development

Performance Optimization of SSL/TLS in JD.com JDDLB Load Balancer Using Freescale Acceleration Cards

This article describes the architecture of JD.com’s JDDLB public‑traffic load balancer and details how offloading CPU‑intensive SSL/TLS cryptographic operations to Freescale C291 acceleration cards—via custom NGINX modules, OpenSSL Engine integration, and synchronous/asynchronous driver interfaces—significantly improves connection‑establishment rates and overall throughput.

BackendHardware accelerationOpenSSL
0 likes · 30 min read
Performance Optimization of SSL/TLS in JD.com JDDLB Load Balancer Using Freescale Acceleration Cards
Programmer DD
Programmer DD
Aug 18, 2020 · Backend Development

How to Boost Web App Performance 10× with NGINX: 10 Proven Tips

Web performance is critical in today's online economy; this article explains ten practical NGINX‑based techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS tuning, HTTP/2, software upgrades, Linux tweaks, server tuning, and real‑time monitoring—that together can deliver up to tenfold speed improvements and higher conversion rates.

HTTP/2SSL/TLSWeb Performance
0 likes · 23 min read
How to Boost Web App Performance 10× with NGINX: 10 Proven Tips
Architect
Architect
Aug 12, 2020 · Backend Development

10 Tips to Achieve 10× Web Application Performance with NGINX

This article explains why web performance is critical, presents ten practical NGINX‑based recommendations—including reverse proxy, load balancing, caching, compression, SSL/TLS optimization, HTTP/2, software upgrades, Linux tuning, and real‑time monitoring—to help developers and operators dramatically improve application speed and reliability.

SSL/TLSWeb Performancecompression
0 likes · 21 min read
10 Tips to Achieve 10× Web Application Performance with NGINX
Architecture Digest
Architecture Digest
Jul 22, 2020 · Backend Development

10 Tips to Achieve 10× Application Performance with NGINX

This article presents ten practical NGINX‑based techniques—including reverse proxy deployment, load balancing, caching, compression, SSL/TLS optimization, HTTP/2 adoption, software upgrades, Linux tuning, web‑server configuration, and real‑time monitoring—that together can boost web‑application throughput and latency by up to an order of magnitude.

Linux TuningSSL/TLSWeb Performance
0 likes · 22 min read
10 Tips to Achieve 10× Application Performance with NGINX
Java Backend Technology
Java Backend Technology
Jul 21, 2020 · Operations

10 Proven Strategies to Boost Web Application Performance 10‑Fold with NGINX

This article outlines ten practical techniques—including reverse proxy deployment, load balancing, caching, data compression, SSL/TLS optimization, HTTP/2 adoption, software upgrades, Linux tuning, web server configuration, and real‑time monitoring—that together can dramatically improve web application speed, reliability, and security.

HTTP/2Linux TuningNginx
0 likes · 22 min read
10 Proven Strategies to Boost Web Application Performance 10‑Fold with NGINX
Programmer DD
Programmer DD
Jul 5, 2020 · Backend Development

How to Boost Your Web Application Performance by 10× with NGINX

This article explains why web performance matters, presents ten practical NGINX‑based techniques—including reverse proxy, load balancing, caching, compression, SSL/TLS optimization, HTTP/2, software upgrades, Linux and web‑server tuning, and real‑time monitoring—to help you achieve up to tenfold speed improvements.

HTTP/2NginxSSL/TLS
0 likes · 25 min read
How to Boost Your Web Application Performance by 10× with NGINX
转转QA
转转QA
Oct 10, 2018 · Information Security

Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis

This article introduces Wireshark as a cross‑platform packet capture tool, explains its installation and basic UI, details capture and display filter syntax with examples, and demonstrates how to decrypt and analyze HTTPS traffic by importing SSL key logs.

FiltersHTTPSPacket Capture
0 likes · 8 min read
Using Wireshark for Packet Capture, Filtering, and HTTPS Analysis
Youzan Coder
Youzan Coder
Mar 9, 2018 · Information Security

Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations

The guide details how a SaaS platform can transition to full‑site HTTPS by explaining the TLS handshake, inventorying static assets, domains and third‑party services, using protocol‑relative URLs, configuring redirects and CSP, testing securely, and addressing common migration challenges such as legacy references and external dependencies.

CDNContent Security PolicyHTTPS
0 likes · 13 min read
Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations
Meitu Technology
Meitu Technology
Dec 1, 2017 · Mobile Development

Meitu DNS Optimization Practice: LocalDNS vs HTTP DNS and Non-Intrusive SDK Implementation

Meitu improves mobile app performance by combining HTTP DNS for critical domains with fallback LocalDNS, employing lazy cache updates and a non‑intrusive SDK that injects custom resolution via Java reflection and native ELF redirection, resulting in roughly 100 ms latency reduction and fewer unknown‑host errors.

AndroidDNS OptimizationELF hooking
0 likes · 14 min read
Meitu DNS Optimization Practice: LocalDNS vs HTTP DNS and Non-Intrusive SDK Implementation
Alibaba Cloud Developer
Alibaba Cloud Developer
Apr 18, 2017 · Information Security

Mastering CDN HTTPS: Architecture, Optimization, and Best Practices

This article explains how modern websites rely on HTTPS and CDN, details SSL/TLS and HTTP/2 fundamentals, describes Alibaba Cloud's CDN HTTPS architecture, dynamic certificate management, key‑server solutions, optimization techniques, and practical guidance for deploying HTTPS end‑to‑end.

CDNHTTP/2HTTPS
0 likes · 13 min read
Mastering CDN HTTPS: Architecture, Optimization, and Best Practices
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Mar 23, 2017 · Information Security

Secure Elasticsearch with Search Guard: Step‑by‑Step Installation & Configuration Guide

This article provides a comprehensive, step‑by‑step tutorial on installing and configuring Search Guard for Elasticsearch, covering feature overview, version compatibility, downloading required packages, local installation commands, SSL/TLS certificate generation, and detailed security settings to protect both transport and REST layers.

ElasticsearchInstallationSSL/TLS
0 likes · 11 min read
Secure Elasticsearch with Search Guard: Step‑by‑Step Installation & Configuration Guide
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudCertificateHTTPS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It