Tagged articles
206 articles
Page 2 of 3
Programmer DD
Programmer DD
Sep 22, 2022 · Backend Development

Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL

This guide walks through creating a self‑signed SSL certificate with JDK’s keytool, configuring Spring Boot to use the PKCS12 keystore, redirecting HTTP to HTTPS, and alternatively obtaining a free FreeSSL certificate, covering necessary code, configuration files, and deployment steps for both Windows and Linux environments.

CertificateHTTPSJava
0 likes · 7 min read
Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL
Aikesheng Open Source Community
Aikesheng Open Source Community
Jun 23, 2022 · Information Security

SSL Overview and DBLE SSL Configuration Guide

This article introduces the SSL protocol, explains why encryption is needed for database communication, and provides step‑by‑step instructions for generating self‑signed certificates with OpenSSL, converting them for Java, and configuring both DBLE server and client to use SSL, including experimental verification of encrypted versus unencrypted connections.

DBLEJavaOpenSSL
0 likes · 15 min read
SSL Overview and DBLE SSL Configuration Guide
Java Captain
Java Captain
Apr 23, 2022 · Information Security

How to Obtain and Configure an SSL Certificate for Mini Program Deployment

This guide details the step‑by‑step process of obtaining a free SSL certificate, exporting it, and configuring the server with the appropriate key‑store settings to enable HTTPS for a mini‑program, including tips on common pitfalls and verification methods.

CertificateHTTPSMini Program
0 likes · 3 min read
How to Obtain and Configure an SSL Certificate for Mini Program Deployment
Liangxu Linux
Liangxu Linux
Feb 15, 2022 · Operations

Essential Nginx Configuration Cheat Sheet: Ports, Logs, Domains, and More

This cheat sheet compiles the most common Nginx configuration snippets—including listening ports, access logs, server names, static file serving, redirects, reverse proxy, load balancing, and SSL settings—providing a quick reference for developers and operators to set up high‑performance web servers.

NGINXSSLWeb server
0 likes · 5 min read
Essential Nginx Configuration Cheat Sheet: Ports, Logs, Domains, and More
Laravel Tech Community
Laravel Tech Community
Feb 8, 2022 · Operations

Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, and LVS High‑Availability

This article provides a step‑by‑step tutorial on installing Nginx, setting up reverse‑proxy and various load‑balancing methods, configuring SSL, deploying Keepalived for failover, and building an LVS‑DR high‑availability cluster with detailed command examples and configuration snippets.

LVSNGINXSSL
0 likes · 20 min read
Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, and LVS High‑Availability
Architecture Digest
Architecture Digest
Jan 23, 2022 · Operations

Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, and LVS High‑Availability

This tutorial walks through installing Nginx, setting up upstream reverse‑proxy rules, configuring various load‑balancing algorithms, enabling SSL, deploying Keepalived for failover, and building an LVS‑DR high‑availability cluster with detailed commands and configuration examples.

LVSSSLhigh availability
0 likes · 24 min read
Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, and LVS High‑Availability
IT Xianyu
IT Xianyu
Jan 23, 2022 · Information Security

Upgrading an HTTP Site to HTTPS with acme.sh

This guide explains why and how to migrate an HTTP website to HTTPS, covering the differences between the protocols, options for obtaining SSL certificates, step‑by‑step installation of the acme.sh script, generating, installing, and automatically renewing certificates using both HTTP and DNS validation methods.

AutomationCertificateHTTPS
0 likes · 9 min read
Upgrading an HTTP Site to HTTPS with acme.sh
Open Source Linux
Open Source Linux
Jan 20, 2022 · Backend Development

Essential Nginx Configuration Cheat Sheet for Fast Web Servers

This article presents a concise Nginx cheat sheet covering common configuration blocks such as listening ports, access logs, server names, static file serving, redirects, reverse proxy, load balancing, and SSL settings, providing ready-to-use code snippets to help developers quickly set up and optimize their web servers.

HTTPSSL
0 likes · 4 min read
Essential Nginx Configuration Cheat Sheet for Fast Web Servers
IT Xianyu
IT Xianyu
Jan 9, 2022 · Operations

Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, LVS, and High‑Availability Clusters

This tutorial walks through installing Nginx from source, setting up upstream reverse‑proxy groups, configuring various load‑balancing methods (weight, IP hash, URL hash, least connections), enabling SSL, deploying Keepalived for failover, and building an LVS‑DR high‑availability cluster with detailed command‑line examples.

LVSNGINXSSL
0 likes · 23 min read
Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, Keepalived, LVS, and High‑Availability Clusters
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 13, 2021 · Databases

Why MySQL Performance Benchmark Shows Low TPS on High-End Hardware

This article examines why MySQL benchmark results often show low transactions per second on seemingly powerful servers, exploring hidden factors such as network bottlenecks, SSL overhead, and inappropriate sort_buffer_size settings, and provides practical troubleshooting steps and configuration tweaks to achieve optimal performance.

Database TuningNetwork BottleneckSSL
0 likes · 10 min read
Why MySQL Performance Benchmark Shows Low TPS on High-End Hardware
Top Architect
Top Architect
Nov 6, 2021 · Backend Development

Nginx Cheat Sheet: Common Configuration Snippets

This article provides a concise collection of frequently used Nginx configuration examples—including listening ports, access logs, server names, static assets, redirects, reverse proxy, load balancing, and SSL settings—to help developers quickly set up a high‑performance web server.

Backend DevelopmentNGINXSSL
0 likes · 6 min read
Nginx Cheat Sheet: Common Configuration Snippets
Douyu Streaming
Douyu Streaming
Oct 29, 2021 · Information Security

Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security

This article explains the security risks of early Internet protocols, the evolution of SSL/TLS and DTLS, fundamental cryptographic concepts such as symmetric and asymmetric encryption, hashing, MACs, digital signatures, AES modes and padding, and how these technologies are applied in TLS handshakes, DTLS, and WebRTC.

AESDTLSSSL
0 likes · 27 min read
Understanding SSL/TLS and DTLS: From Cryptographic Basics to WebRTC Security
Selected Java Interview Questions
Selected Java Interview Questions
Oct 28, 2021 · Operations

Common Nginx Configuration Snippets Cheat Sheet

This article provides a concise collection of frequently used Nginx configuration snippets—including listening ports, access logs, server names, static assets, redirects, reverse proxy, load balancing, and SSL settings—along with a brief introduction to an online visual configuration tool.

ConfigurationNGINXSSL
0 likes · 5 min read
Common Nginx Configuration Snippets Cheat Sheet
Selected Java Interview Questions
Selected Java Interview Questions
Oct 13, 2021 · Information Security

Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication

This article explains the fundamentals of the HTTP protocol, illustrates how plain‑text communication enables man‑in‑the‑middle attacks, and describes how symmetric and asymmetric encryption, SSL/TLS handshakes, and CA certificate chains are used in HTTPS to secure web traffic.

HTTPHTTPSMan-in-the-Middle
0 likes · 8 min read
Understanding HTTP and HTTPS: Protocol Basics, Man‑in‑the‑Middle Attacks, and Secure Communication
Architecture Digest
Architecture Digest
Sep 10, 2021 · Backend Development

Nginx Configuration Cheat Sheet: Common Settings and Examples

This article provides a concise Nginx cheat sheet covering essential configuration snippets such as listening ports, access logs, server names, static assets, redirects, reverse proxy, load balancing, and SSL settings, along with links to an online visual configuration tool.

ConfigurationSSLWeb server
0 likes · 5 min read
Nginx Configuration Cheat Sheet: Common Settings and Examples
ITPUB
ITPUB
Sep 2, 2021 · Operations

Turn a Bare Server into a Full‑Stack Development Platform: A Practical Guide

This article shares a developer’s journey from spending on domains and servers to mastering deployment, covering domain registration, DNS configuration, SSL, Linux commands, server panels, and how to monetize the skills while offering a step‑by‑step guide for newcomers to use a server effectively.

DeploymentLinuxSSL
0 likes · 11 min read
Turn a Bare Server into a Full‑Stack Development Platform: A Practical Guide
php Courses
php Courses
Aug 20, 2021 · Information Security

Using FastGithub to Modify Hosts and Fix Git SSL Certificate Errors

This guide explains how to download and run FastGithub, import its local HTTPS certificate, and resolve common Git SSL certificate verification errors by adjusting Git's SSL settings, providing step‑by‑step instructions and relevant code snippets.

CertificateGitSSL
0 likes · 2 min read
Using FastGithub to Modify Hosts and Fix Git SSL Certificate Errors
Selected Java Interview Questions
Selected Java Interview Questions
Aug 13, 2021 · Information Security

Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation

This article explains why HTTP lacks confidentiality, introduces symmetric, asymmetric, and hybrid encryption, describes the HTTPS handshake steps, and shows how Apache HttpClient builds SSL connections with code examples, highlighting key components such as SSLConnectionSocketFactory and HostnameVerifier.

HTTPSHttpClientJava
0 likes · 15 min read
Understanding HTTPS: Encryption Methods, Handshake Process, and HttpClient Implementation
Java Interview Crash Guide
Java Interview Crash Guide
Jul 10, 2021 · Operations

10 Proven Strategies to Boost Your Web App Performance by Up to 10×

This article outlines ten actionable techniques—including reverse proxy deployment, load balancing, caching, compression, SSL/TLS optimization, HTTP/2 adoption, software upgrades, Linux tuning, web‑server tweaks, and real‑time monitoring—that together can boost a web application's speed and reliability by up to ten times.

HTTP2NGINXSSL
0 likes · 22 min read
10 Proven Strategies to Boost Your Web App Performance by Up to 10×
Laravel Tech Community
Laravel Tech Community
May 8, 2021 · Backend Development

Common Nginx Configuration Snippets and Examples

This article presents a collection of frequently used Nginx configuration examples—including listening ports, access logs, server names, static assets, redirects, reverse proxy, load balancing, and SSL settings—to help developers quickly set up and customize their web server deployments.

ConfigurationNGINXSSL
0 likes · 5 min read
Common Nginx Configuration Snippets and Examples
MaGe Linux Operations
MaGe Linux Operations
Mar 8, 2021 · Operations

How to Build a Highly Available etcd Cluster with SSL Security

This guide explains the fundamentals of etcd, its Raft‑based architecture, cluster planning, secure certificate generation, installation steps, service configuration, and verification commands to deploy a reliable, SSL‑protected etcd cluster for service discovery and configuration management.

ClusterConfiguration ManagementRaft
0 likes · 16 min read
How to Build a Highly Available etcd Cluster with SSL Security
Python Programming Learning Circle
Python Programming Learning Circle
Jan 12, 2021 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

The article explains the vulnerabilities of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and describes the evolution of security mechanisms—including symmetric and asymmetric encryption, TLS handshakes, and certificate authority verification—that together make HTTPS a robust solution for protecting web communications.

Certificate AuthorityHTTPHTTPS
0 likes · 8 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
21CTO
21CTO
Jan 5, 2021 · Information Security

Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt

This guide explains why and how to upgrade an HTTP website to HTTPS using free Let’s Encrypt certificates and the acme.sh script, covering installation, certificate generation via HTTP or DNS validation, deployment to Apache/Nginx, and automated renewal.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt
Programmer DD
Programmer DD
Jan 5, 2021 · Operations

How to Cut Nginx HTTPS Latency by 30%: Proven TLS Tuning Tips

This article explains why low‑latency Nginx HTTPS is crucial for instant search, analyzes how TLS handshakes add round‑trip delays, and provides concrete Nginx TLS configuration changes—such as enabling HTTP/2, adjusting cipher suites, enabling OCSP stapling, tweaking buffer sizes and session caches—that together reduced request latency by about 30% in a real‑world deployment.

HTTP2NGINXSSL
0 likes · 13 min read
How to Cut Nginx HTTPS Latency by 30%: Proven TLS Tuning Tips
Liangxu Linux
Liangxu Linux
Dec 30, 2020 · Information Security

Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks

The article explains the vulnerabilities of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and then details how HTTPS—built on SSL/TLS, asymmetric key exchange, and CA certificate validation—prevents these attacks, providing a comprehensive overview of secure web communication.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks
Top Architect
Top Architect
Dec 5, 2020 · Information Security

How to Upgrade an HTTP Site to HTTPS Using acme.sh

This guide explains why and how to migrate a website from HTTP to HTTPS by obtaining free Let’s Encrypt certificates, installing the acme.sh script, using HTTP or DNS validation, copying the certificates to the web server, and automating renewal and updates.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
How to Upgrade an HTTP Site to HTTPS Using acme.sh
Programmer DD
Programmer DD
Oct 17, 2020 · Operations

How to Upgrade Your Site from HTTP to HTTPS with Free acme.sh Certificates

This guide explains why you should switch from HTTP to HTTPS, compares the two protocols, shows how to obtain free or paid SSL certificates, and provides step‑by‑step instructions for installing and automating certificate issuance using the acme.sh script on Apache, Nginx or standalone servers.

AutomationCertificateSSL
0 likes · 9 min read
How to Upgrade Your Site from HTTP to HTTPS with Free acme.sh Certificates
Architecture Digest
Architecture Digest
Oct 7, 2020 · Information Security

Upgrading an HTTP Site to HTTPS with acme.sh and Let’s Encrypt

This guide explains why and how to migrate an HTTP website to HTTPS by adding an SSL/TLS certificate, covering the differences between HTTP and HTTPS, options for obtaining free or paid CA certificates, installing the acme.sh script, generating and installing certificates, and handling updates and troubleshooting.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
Upgrading an HTTP Site to HTTPS with acme.sh and Let’s Encrypt
Programmer DD
Programmer DD
Sep 28, 2020 · Information Security

Why SSL Certificates Matter: Choosing the Right CA for Secure Websites

Understanding SSL certificates, their role in securing web traffic, why trusted CAs are essential, the cost factors, free options like Let’s Encrypt, and the various validation types helps developers select the appropriate certificate and configure it properly, typically via Nginx, for robust HTTPS protection.

CALet’s EncryptSSL
0 likes · 7 min read
Why SSL Certificates Matter: Choosing the Right CA for Secure Websites
MaGe Linux Operations
MaGe Linux Operations
Sep 10, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and a trusted CA certificate hierarchy—secures communications by encrypting data and preventing interception and tampering.

HTTPHTTPSMan-in-the-Middle
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Protects Against Man-in-the-Middle Attacks
Efficient Ops
Efficient Ops
Aug 26, 2020 · Operations

Why Does Nginx Reset HTTPS Curl Requests? A Deep Dive and Fix

After adding an HTTPS certificate to a website, browsers load fine but curl requests are reset; this article chronicles the troubleshooting steps—examining network ports, cipher suites, client buffers, SSL session cache settings, and common Nginx error logs—to pinpoint and resolve the underlying cause.

HTTPSSSLcURL
0 likes · 11 min read
Why Does Nginx Reset HTTPS Curl Requests? A Deep Dive and Fix
Programmer DD
Programmer DD
Jun 19, 2020 · Information Security

Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication

This article explains why HTTPS is essential for protecting privacy, ensuring data integrity, and authenticating servers, describes the evolution of SSL/TLS, and walks through the handshake process that combines asymmetric and symmetric encryption to secure web traffic.

Certificate AuthorityHTTPSSSL
0 likes · 14 min read
Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
DevOps Cloud Academy
DevOps Cloud Academy
Jun 7, 2020 · Operations

Enabling SSL for Jenkins with a Self‑Signed Certificate

This guide walks through generating a self‑signed SSL certificate using OpenSSL, converting it to PKCS12 and JKS formats, placing the keystore on the Jenkins server, updating Jenkins configuration for HTTPS, and testing the secure connection.

DevOpsJenkinsOperations
0 likes · 5 min read
Enabling SSL for Jenkins with a Self‑Signed Certificate
Laravel Tech Community
Laravel Tech Community
May 20, 2020 · Information Security

How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS

The article explains the fundamental differences between HTTP and HTTPS, outlines how HTTPS adds SSL/TLS encryption to the standard HTTP protocol, describes the step‑by‑step communication process—including certificate verification, key exchange, and encrypted data transfer—and compares ports, security, and connection details.

HTTPHTTPSSSL
0 likes · 6 min read
How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS
Aikesheng Open Source Community
Aikesheng Open Source Community
May 14, 2020 · Databases

MySQL 5.7 Upgrade Failure Caused by Default SSL Enablement and JDBC useSSL Parameter Misconfiguration

The article analyzes a MySQL 5.7 upgrade that broke an application due to SSL being enabled by default in version 5.7.28, explains how the JDBC useSSL=true setting triggered handshake errors, and provides several practical solutions such as disabling SSL, adjusting auto‑generation settings, and updating the connection string.

ConfigurationJDBCSSL
0 likes · 12 min read
MySQL 5.7 Upgrade Failure Caused by Default SSL Enablement and JDBC useSSL Parameter Misconfiguration
Liangxu Linux
Liangxu Linux
Mar 21, 2020 · Information Security

Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained

This article explains why HTTPS was created to address HTTP’s lack of encryption, authentication, and integrity, describes how TLS/SSL adds security, details the roles of symmetric and asymmetric encryption, hash algorithms, digital certificates, and the full handshake process that secures modern web communication.

HTTPSSSLTLS
0 likes · 19 min read
Why HTTPS Exists: From HTTP’s Flaws to TLS Encryption Explained
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2019 · Backend Development

Master Nginx: Status Page, Modules, Variables, Logging, SSL, Rewrite, and Advanced Proxy Techniques

This comprehensive guide walks you through configuring Nginx status pages, compiling modules, using built‑in and custom variables, setting up JSON and gzip logs, enabling HTTPS, mastering rewrite rules, preventing hotlinking, implementing reverse proxy with caching, and deploying both HTTP and TCP load‑balancing with Redis and MySQL back‑ends.

NGINXSSLload-balancing
0 likes · 45 min read
Master Nginx: Status Page, Modules, Variables, Logging, SSL, Rewrite, and Advanced Proxy Techniques
Efficient Ops
Efficient Ops
Dec 18, 2019 · Operations

Why Nginx Resets HTTPS Curl Requests and How to Fix It

This article walks through a real‑world Nginx HTTPS troubleshooting case where curl requests are reset, detailing packet captures, configuration tweaks, SSL session cache settings, and a comprehensive list of common Nginx error messages to help engineers quickly locate and resolve similar issues.

SSLServercURL
0 likes · 9 min read
Why Nginx Resets HTTPS Curl Requests and How to Fix It
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
Architects Research Society
Architects Research Society
Sep 28, 2019 · Backend Development

Deploying a Spring Boot Application Behind NGINX with SSL

This guide explains how to prepare a Spring Boot application, set up a Debian server with Java, UFW and NGINX, configure the app as a systemd service, create an NGINX reverse‑proxy, and enable HTTPS using Certbot, providing a lightweight alternative to embedded Tomcat.

BackendSSLspring-boot
0 likes · 8 min read
Deploying a Spring Boot Application Behind NGINX with SSL
Aikesheng Open Source Community
Aikesheng Open Source Community
Aug 19, 2019 · Databases

How Network Bandwidth Affects MySQL Performance

This article examines how network bandwidth, protocol compression, and SSL encryption impact MySQL Group Replication performance by running sysbench benchmarks on 1 Gb and 10 Gb networks, revealing bandwidth limits, CPU overhead, and scalability issues.

BenchmarkingSSLcompression
0 likes · 6 min read
How Network Bandwidth Affects MySQL Performance
360 Tech Engineering
360 Tech Engineering
Mar 11, 2019 · Mobile Development

Using Charles to Capture and Debug iOS Network Requests

This guide explains how to install Charles, configure an iPhone proxy, capture HTTP/HTTPS traffic, set breakpoints, modify requests, repeat calls, and simulate network conditions, providing a comprehensive workflow for iOS network debugging and performance testing.

CharlesMobile DevelopmentProxy
0 likes · 9 min read
Using Charles to Capture and Debug iOS Network Requests
360 Tech Engineering
360 Tech Engineering
Jan 21, 2019 · Frontend Development

How to Quickly Set Up a Local HTTPS Development Environment

This guide explains why HTTPS is required for local web development, demonstrates how to create a self‑signed root CA and a wildcard domain certificate with OpenSSL, shows how to trust the root certificate on macOS, and provides example Webpack devServer and hosts file configurations for a secure local workflow.

Certificate AuthorityHTTPSLocal Development
0 likes · 6 min read
How to Quickly Set Up a Local HTTPS Development Environment
MaGe Linux Operations
MaGe Linux Operations
Sep 26, 2018 · Backend Development

Step-by-Step Guide to Building an LNMP Stack with SSL and Auth

This tutorial walks you through installing and configuring Nginx, MariaDB, PHP‑FPM, setting up a Xiaomi‑style website, securing the server with self‑signed SSL certificates, and adding basic HTTP authentication, complete with command‑line examples and configuration snippets.

LNMPLinuxPHP
0 likes · 7 min read
Step-by-Step Guide to Building an LNMP Stack with SSL and Auth
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Aug 1, 2018 · Information Security

Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More

This article dispels seven widespread HTTPS misconceptions—from caching and certificate costs to speed and IP requirements—explaining how browsers handle secure caching, affordable SSL options, wildcard certificates, migration steps, performance impacts, and why HTTPS is essential beyond login pages.

HTTPSSSLWeb Security
0 likes · 7 min read
Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More
MaGe Linux Operations
MaGe Linux Operations
Jun 27, 2018 · Operations

Master Nginx: Load Balancing, Caching, SSL & Static/Dynamic Separation Guide

This tutorial walks through setting up Nginx on Debian, configuring worker processes, events, and HTTP settings, defining upstream groups for load balancing, separating static and dynamic content with reverse proxy, enabling gzip compression, implementing proxy caching with shared memory, and adding SSL support with self‑signed certificates.

NGINXSSLcaching
0 likes · 18 min read
Master Nginx: Load Balancing, Caching, SSL & Static/Dynamic Separation Guide
Efficient Ops
Efficient Ops
Mar 20, 2018 · Information Security

Why HTTPS Matters: 9 Key Questions Answered

This article explains the fundamentals of HTTPS, covering why encryption is needed, how symmetric and asymmetric cryptography work together, the role of certificates and public‑key infrastructure, and the performance impact of the TLS handshake, all through a concise Q&A format.

HTTPSSSLTLS
0 likes · 11 min read
Why HTTPS Matters: 9 Key Questions Answered
dbaplus Community
dbaplus Community
Jul 24, 2017 · Databases

Securing MySQL 5.7 with SSL: Setup Guide and Performance Impact

This article explains how to enable SSL encryption for MySQL 5.7, details the necessary configuration steps, demonstrates security testing versus unencrypted connections, and measures the resulting performance penalty, helping DBAs decide when to use SSL in production.

ConfigurationSSLmysql
0 likes · 7 min read
Securing MySQL 5.7 with SSL: Setup Guide and Performance Impact
dbaplus Community
dbaplus Community
Jul 19, 2017 · Information Security

How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment

This guide explains why plain HTTP is insecure, introduces SSL/TLS fundamentals, compares certificate types, and provides step‑by‑step instructions for configuring HTTPS on a web server (including Nginx redirects), while highlighting performance impacts and testing considerations.

HTTPSNGINXSSL
0 likes · 9 min read
How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment
ITPUB
ITPUB
Jun 14, 2017 · Information Security

Top HTTPS & HTTP/2 Errors and Practical Fixes

This guide compiles common HTTPS and HTTP/2 deployment problems—such as Let’s Encrypt validation failures, certificate transparency errors, SNI incompatibility, cipher‑suite misconfigurations, and mixed‑content issues—and provides concise, actionable solutions with reference links for each case.

HTTP/2HTTPSNGINX
0 likes · 8 min read
Top HTTPS & HTTP/2 Errors and Practical Fixes
21CTO
21CTO
May 17, 2017 · Operations

Should You Keep the ‘www’ Prefix? Pros, Cons, and Server Config Guide

This article examines whether the ‘www’ subdomain is still necessary in 2023, discusses DNS and cookie implications, and provides practical Apache and Nginx rewrite rules for handling www‑to‑non‑www (and vice versa) redirects while considering SSL and SEO impacts.

DNSSSLapache rewrite
0 likes · 7 min read
Should You Keep the ‘www’ Prefix? Pros, Cons, and Server Config Guide
dbaplus Community
dbaplus Community
Mar 23, 2017 · Databases

Secure MariaDB Connections with SSL: A Complete Step‑by‑Step Guide

This article explains why internet‑financial companies need encrypted MariaDB connections, shows how to verify SSL support, and provides a detailed eight‑step procedure—including OpenSSL upgrade, CA creation, server and client certificates, MySQL configuration, and verification—to enable secure client‑server communication.

MariaDBOpenSSLSSL
0 likes · 11 min read
Secure MariaDB Connections with SSL: A Complete Step‑by‑Step Guide
Tencent Cloud Developer
Tencent Cloud Developer
Dec 22, 2016 · Mobile Development

Understanding iOS App Transport Security (ATS) and Deploying HTTPS with SSL Certificates

After Apple’s 2017 ATS enforcement requires all iOS apps to use HTTPS, developers must obtain an SSL certificate—such as a free Let’s Encrypt or Tencent Cloud‑issued GeoTrust certificate—install it on their web server (e.g., Nginx), optionally configure CDN encryption, and verify compliance with Apple’s security checks.

ATSHTTPSMobile Development
0 likes · 12 min read
Understanding iOS App Transport Security (ATS) and Deploying HTTPS with SSL Certificates
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2016 · Information Security

How to Harden Nginx: Buffer Limits, Timeouts, and Security Best Practices

This guide walks through securing an Nginx web server by configuring buffer size limits, timeouts, concurrent connection controls, host and method restrictions, user‑agent blocking, hot‑link protection, directory access rules, SSL setup, PHP hardening, chroot isolation, and firewall‑level IP connection limits.

NGINXSSLbuffer
0 likes · 14 min read
How to Harden Nginx: Buffer Limits, Timeouts, and Security Best Practices
Aotu Lab
Aotu Lab
Aug 22, 2016 · Backend Development

Mastering Nginx HTTPS: From SSL Certificates to Advanced Security Optimizations

This guide walks you through obtaining a trusted SSL certificate, generating keys and CSR with OpenSSL, configuring HTTPS in Nginx, and applying performance and security enhancements such as keep‑alive, session caching, HSTS, strong cipher suites, and name‑based virtual host solutions.

HSTSNGINXOpenSSL
0 likes · 16 min read
Mastering Nginx HTTPS: From SSL Certificates to Advanced Security Optimizations
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Aug 18, 2016 · Information Security

Why Chrome Flags Your HTTPS Site Red and How to Fix It

This article explains Chrome's green‑yellow‑red HTTPS indicators, the pitfalls of SHA‑1 certificates, mixed‑content warnings, AES key size choices, and provides concrete Nginx configuration snippets to upgrade to SHA‑2 and modern cipher suites.

ChromeHTTPSSHA2
0 likes · 8 min read
Why Chrome Flags Your HTTPS Site Red and How to Fix It
dbaplus Community
dbaplus Community
Jun 26, 2016 · Databases

What’s New in MySQL 5.7? 16 Essential Features Every DBA Should Know

This article reviews the most important MySQL 5.7 enhancements—including stronger authentication, password expiration, account locking, simplified SSL, safer initialization, updated SQL_MODE, online DDL improvements, CJK full‑text support, temporary‑table optimizations, spatial data types, and NVM‑specific tweaks—providing practical guidance and configuration examples for DBAs.

5.7Database SecuritySQL Mode
0 likes · 11 min read
What’s New in MySQL 5.7? 16 Essential Features Every DBA Should Know
21CTO
21CTO
Jun 10, 2016 · Information Security

Secure Your Site with HTTPS in 30 Minutes Using Let’s Encrypt

This guide walks you through obtaining a free Let’s Encrypt certificate, installing it on typical hosting platforms, fixing common private‑key issues, verifying the setup, and enforcing HTTPS for all requests, all in under half an hour.

HTTPSLet’s EncryptSSL
0 likes · 5 min read
Secure Your Site with HTTPS in 30 Minutes Using Let’s Encrypt
Tencent TDS Service
Tencent TDS Service
May 26, 2016 · Information Security

Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained

This article explains the fundamentals of HTTPS by comparing web communication to passing notes in a classroom, covering symmetric and asymmetric encryption, RSA key exchange, the role of Certificate Authorities, and how these mechanisms together protect against man‑in‑the‑middle attacks.

Certificate AuthorityHTTPSSSL
0 likes · 10 min read
Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained
MaGe Linux Operations
MaGe Linux Operations
Apr 21, 2016 · Information Security

Understanding SSL/TLS: From Handshake Basics to Secret Keys Explained

This article provides a comprehensive overview of SSL/TLS, covering its architecture, differences between SSL and TLS, detailed handshake steps, key exchange processes, secret generation, security considerations, proxy handling, and references, aiming to clarify the complex concepts for readers.

HandshakeSSLSecurity
0 likes · 22 min read
Understanding SSL/TLS: From Handshake Basics to Secret Keys Explained
MaGe Linux Operations
MaGe Linux Operations
Apr 20, 2016 · Information Security

Why Your SSL Certificate Is Untrusted and How to Fix It

This guide explains the five most common reasons an SSL certificate appears untrusted—such as using a self‑signed certificate, misconfigured trust chain, missing domain coverage, expiration, or lack of SNI support—and provides practical steps to resolve each issue.

CertificateSNISSL
0 likes · 6 min read
Why Your SSL Certificate Is Untrusted and How to Fix It
Architecture Digest
Architecture Digest
Apr 10, 2016 · Information Security

Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies

This article provides a comprehensive overview of HTTPS, explaining its purpose, advantages, and drawbacks, and delves into the underlying cryptographic concepts such as symmetric and asymmetric encryption, hash algorithms, digital signatures, digital certificates, and the detailed SSL/TLS handshake process.

HTTPSSSLTLS
0 likes · 19 min read
Introduction to HTTPS, SSL/TLS, and Related Encryption Technologies
21CTO
21CTO
Apr 1, 2016 · Information Security

Understanding HTTPS: How SSL/TLS Secures Web Communication

This article explains HTTPS fundamentals, its encryption mechanisms, differences from HTTP, the roles of symmetric and asymmetric cryptography, hash functions, digital signatures, certificate issuance and validation, as well as SSL/TLS protocols, handshake steps, and session resumption techniques that secure web communications.

HTTPSSSLTLS
0 likes · 18 min read
Understanding HTTPS: How SSL/TLS Secures Web Communication