Tagged articles
9 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Dec 14, 2025 · Backend Development

What Lenovo Backend Interview Reveals: Salary Insights, Deadlock Basics, DNS, TLS Handshake, and Java ArrayList Deep Dive

This article shares Lenovo's 2026 graduate hiring salary breakdown, explains deadlock conditions and prevention, outlines DNS resolution steps, details the TLS handshake process, and provides an in‑depth guide to Java's ArrayList implementation, performance, and thread‑safety concerns.

ArrayListDNSJava
0 likes · 18 min read
What Lenovo Backend Interview Reveals: Salary Insights, Deadlock Basics, DNS, TLS Handshake, and Java ArrayList Deep Dive
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
Architect's Guide
Architect's Guide
Oct 14, 2025 · Information Security

How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption

This article explains why HTTPS is considered secure, details the underlying TLS handshake—including certificate verification and symmetric data encryption—and clarifies common misconceptions such as the role of CAs, the possibility of man‑in‑the‑middle attacks, and whether HTTPS traffic can be intercepted.

Certificate AuthorityHTTPSMITM attack
0 likes · 11 min read
How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption
IT Services Circle
IT Services Circle
Oct 22, 2024 · Information Security

Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark

This article provides a step‑by‑step analysis of a TLS 1.2 HTTPS handshake captured with Wireshark, explaining the ClientHello, ServerHello, certificate parsing, key‑exchange messages, master secret derivation, and the final encrypted application data exchange.

HTTPSTLSTLS Handshake
0 likes · 14 min read
Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark
MaGe Linux Operations
MaGe Linux Operations
Sep 15, 2024 · Information Security

Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained

This article provides a comprehensive overview of TLS handshakes, detailing the RSA and ECDHE key exchange mechanisms, their step-by-step processes, security properties, and the differences between TLS 1.2 and TLS 1.3, including cipher suite structures and certificate validation.

ECDHERSATLS
0 likes · 21 min read
Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained
DaTaobao Tech
DaTaobao Tech
Sep 27, 2022 · Information Security

Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes

This article examines the inherent security flaws of plain HTTP, proposes four solution approaches, and explains why the fourth—combining digital certificates, asymmetric and symmetric encryption—forms the basis of HTTPS, then details TLS 1.2 handshake steps, cryptographic primitives, and practical implementation considerations.

HTTPSTLSTLS Handshake
0 likes · 21 min read
Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Detailed HTTPS Handshake Analysis Using Wireshark

This article explains the HTTPS protocol, its security advantages over HTTP, and provides a step‑by‑step Wireshark packet capture and analysis of a test website, covering TCP three‑way handshake, TLS ClientHello/ServerHello, certificate verification, key exchange, and encrypted data transmission.

HTTPSTLSTLS Handshake
0 likes · 15 min read
Detailed HTTPS Handshake Analysis Using Wireshark
Snowball Engineer Team
Snowball Engineer Team
Jan 19, 2021 · Backend Development

Troubleshooting TLS Certificate Validation Failures in Java Backend Services: Understanding SNI and the TLS Handshake

This article investigates intermittent HTTPS certificate validation failures in containerized Java services, detailing the TLS handshake process, certificate chain verification, and how a disabled Server Name Indication extension causes clients to receive incorrect certificates during multi-domain server deployments.

Container DeploymentHTTPS TroubleshootingJSSE
0 likes · 10 min read
Troubleshooting TLS Certificate Validation Failures in Java Backend Services: Understanding SNI and the TLS Handshake