Tagged articles
341 articles
Page 1 of 4
Black & White Path
Black & White Path
Apr 11, 2026 · Information Security

A Beginner’s Struggle: Securing a Compromised ThinkPHP Site Over Several Days

The author recounts a multi‑day incident response to a ThinkPHP website that was compromised via a weak admin password, detailing how repeated data tampering, hidden scheduled‑task scripts, and a ransom message were investigated, mitigated, and finally contained through systematic hardening and monitoring.

PHPServer HardeningThinkPHP
0 likes · 7 min read
A Beginner’s Struggle: Securing a Compromised ThinkPHP Site Over Several Days
Java Architect Handbook
Java Architect Handbook
Mar 27, 2026 · Frontend Development

Mastering CORS: In‑Depth Java Interview Guide for Cross‑Origin Solutions

This comprehensive guide explains the browser same‑origin policy, why cross‑origin restrictions exist, and walks through five major solutions—CORS, proxy servers, JSONP, postMessage, and WebSocket—detailing their principles, advantages, drawbacks, configuration examples, and best‑practice recommendations for interview scenarios.

CORSCross-OriginJava
0 likes · 16 min read
Mastering CORS: In‑Depth Java Interview Guide for Cross‑Origin Solutions
AI Explorer
AI Explorer
Mar 4, 2026 · Information Security

Shannon AI Hacker Achieves 96% Success in Automated Web Vulnerability Detection

Shannon, an autonomous AI-driven penetration testing agent, bridges the speed‑security gap created by rapid AI‑assisted coding by automatically analyzing source code, mapping attack paths, and executing real exploits, achieving a 96.15% success rate on the XBOW benchmark and uncovering over 20 critical flaws in the OWASP Juice Shop demo.

AIAutomationWeb Security
0 likes · 7 min read
Shannon AI Hacker Achieves 96% Success in Automated Web Vulnerability Detection
Black & White Path
Black & White Path
Feb 22, 2026 · Information Security

30 Practical Web Penetration Testing Techniques You Must Know

This guide walks through 30 hands‑on web penetration testing techniques covering the full workflow—from information gathering and vulnerability discovery to privilege escalation, internal network pivoting, and defense evasion—providing concrete commands, tool recommendations, and real‑world tips for security engineers and testers.

Information GatheringWeb Securitydefense evasion
0 likes · 26 min read
30 Practical Web Penetration Testing Techniques You Must Know
Lobster Programming
Lobster Programming
Jan 19, 2026 · Information Security

How CSRF Attacks Exploit Trusted Sessions and How to Defend Them

This article explains the principle and step‑by‑step flow of Cross‑Site Request Forgery attacks, illustrates common exploitation techniques such as forged GET/POST requests and click‑bait links, and outlines practical defenses including POST usage, HttpOnly cookies, CSRF tokens, and double‑submit cookie validation.

CSRFCross-Site Request ForgeryToken
0 likes · 6 min read
How CSRF Attacks Exploit Trusted Sessions and How to Defend Them
JavaScript
JavaScript
Dec 30, 2025 · Frontend Development

Why document.domain Is Being Deprecated and How to Migrate Your Web Apps

This article explains the background and security concerns behind the deprecation of the JavaScript document.domain API, details browser warnings, and provides a step‑by‑step migration guide using postMessage, Channel Messaging, and proper CORS configuration to keep web applications functional.

Cross-OriginWeb Securitydeprecation
0 likes · 5 min read
Why document.domain Is Being Deprecated and How to Migrate Your Web Apps
IT Services Circle
IT Services Circle
Dec 13, 2025 · Information Security

Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data

This article explains how HTTPS upgrades plain HTTP by adding authentication, encryption, and integrity checks, walks through its three security layers, traces the protocol’s evolution from SSL 2.0 to TLS 1.3, and discusses the practical benefits, costs, and adoption challenges of securing web traffic.

HTTPSSSLTLS
0 likes · 16 min read
Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
Top Architect
Top Architect
Nov 11, 2025 · Information Security

Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained

This comprehensive guide explores the fundamentals of authentication and authorization, detailing how credentials, cookies, and sessions work together, and compares traditional session-based approaches with modern token-based solutions such as JWT, covering their mechanisms, advantages, drawbacks, and best practices for secure, scalable web applications.

AuthenticationAuthorizationJWT
0 likes · 38 min read
Mastering Authentication & Authorization: Cookies, Sessions, Tokens, and JWT Explained
JavaScript
JavaScript
Oct 22, 2025 · Frontend Development

Simplify CORS with Fetch API: One‑Line Solutions and Future Web Policies

This article explains the fundamentals of CORS, compares traditional workarounds, and demonstrates how modern Fetch API options, import assertions, and emerging web policies like CORP, COOP, and COEP provide simpler, more secure cross‑origin solutions for frontend developers.

CORSWeb Securityfetch API
0 likes · 4 min read
Simplify CORS with Fetch API: One‑Line Solutions and Future Web Policies
Architect's Guide
Architect's Guide
Oct 14, 2025 · Information Security

How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption

This article explains why HTTPS is considered secure, details the underlying TLS handshake—including certificate verification and symmetric data encryption—and clarifies common misconceptions such as the role of CAs, the possibility of man‑in‑the‑middle attacks, and whether HTTPS traffic can be intercepted.

Certificate AuthorityHTTPSMITM attack
0 likes · 11 min read
How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption
JavaScript
JavaScript
Oct 4, 2025 · Frontend Development

Why is the document.domain API Being Deprecated and What to Use Instead?

The article explains the purpose and historical popularity of the document.domain property for cross‑subdomain communication, details its deprecation across major browsers due to security and maintenance concerns, and provides practical migration strategies using postMessage, Channel Messaging API, and proper CORS configuration.

Cross-OriginWeb Securitydeprecation
0 likes · 6 min read
Why is the document.domain API Being Deprecated and What to Use Instead?
Raymond Ops
Raymond Ops
Sep 20, 2025 · Fundamentals

Understanding HTTP vs HTTPS: From Basics to Secure Web Communication

This article explains the fundamentals of HTTP and HTTPS, compares their features, details how internet messages travel through DNS, routers, IP and MAC addresses, describes request and response structures, ports, encryption methods, cookies versus sessions, and provides a comprehensive summary of their differences.

HTTPHTTPSNetworking
0 likes · 20 min read
Understanding HTTP vs HTTPS: From Basics to Secure Web Communication
Code Mala Tang
Code Mala Tang
Sep 13, 2025 · Information Security

Mastering CORS: How to Fix Cross-Origin Errors in Web Apps

Learn what CORS (Cross-Origin Resource Sharing) is, why browsers block cross-origin requests, and how to configure servers—using Java, Express.js, or Spring Boot—to handle preflight checks, simple requests, and fine-grained security headers, ensuring safe and functional web applications.

CORSCross-OriginHTTP
0 likes · 13 min read
Mastering CORS: How to Fix Cross-Origin Errors in Web Apps
MaGe Linux Operations
MaGe Linux Operations
Sep 13, 2025 · Information Security

How to Build an Enterprise‑Grade WAF with OpenResty from Scratch

This guide walks through constructing a high‑performance, cost‑effective enterprise‑level Web Application Firewall using OpenResty, covering why OpenResty is ideal, core architecture, modules for request lifecycle management, IP control, rate limiting, SQL injection and XSS detection, intelligent CC protection, monitoring, performance tuning, deployment tips, real‑world case study, and future enhancements.

LuaNGINXOpenResty
0 likes · 24 min read
How to Build an Enterprise‑Grade WAF with OpenResty from Scratch
JavaScript
JavaScript
Sep 13, 2025 · Frontend Development

How to Solve CORS Issues Easily with Fetch API and Modern JS Features

This article explains the fundamentals of CORS, reviews traditional workarounds, and demonstrates how the Fetch API, import assertions, and emerging web policies provide simpler, more secure solutions for cross‑origin requests in modern frontend development.

CORSJavaScriptWeb Security
0 likes · 5 min read
How to Solve CORS Issues Easily with Fetch API and Modern JS Features
Top Architect
Top Architect
Sep 3, 2025 · Information Security

Why Same‑Origin Policy Matters: Mastering CORS and Preflight Requests

This article explains the same‑origin policy, why browsers enforce it, how CORS works—including simple requests, preflight OPTIONS checks, required headers, and credential handling—while providing practical examples and a complete request‑flow diagram for secure web development.

CORSPreflight RequestSame-Origin Policy
0 likes · 17 min read
Why Same‑Origin Policy Matters: Mastering CORS and Preflight Requests
Wukong Talks Architecture
Wukong Talks Architecture
Sep 1, 2025 · Information Security

Boost Web Privilege Testing with the XiaYue Burp Suite Plugin

XiaYue, a powerful Burp Suite extension, automates vertical and horizontal privilege escalation detection by comparing responses across multiple permission levels, offering smart deduplication, advanced filtering, parameter replacement, visual data tables, persistent configuration, and performance optimizations, while the author also shares a heartfelt story about their child's school start.

AutomationBurp SuiteWeb Security
0 likes · 9 min read
Boost Web Privilege Testing with the XiaYue Burp Suite Plugin
Ops Community
Ops Community
Aug 27, 2025 · Information Security

Master Apache Security: Complete Guide to Prevent Common Web Attacks

This comprehensive guide walks operations engineers through why Apache security matters, presents core hardening strategies such as hiding server details, blocking directory traversal, enforcing strict security headers, limiting request sizes, and applying IP rate‑limiting, and provides advanced techniques, verification commands, common pitfalls, and an actionable checklist to build a resilient web server.

ApacheConfigurationModSecurity
0 likes · 8 min read
Master Apache Security: Complete Guide to Prevent Common Web Attacks
Su San Talks Tech
Su San Talks Tech
Aug 23, 2025 · Information Security

Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?

This article demystifies the differences between Cookie, Session, Token, JWT, and OAuth2, explains their underlying mechanisms, shows practical Spring code examples, compares their security properties and suitable scenarios, and provides clear guidance on choosing the right authentication strategy for modern web applications.

CookieJWTOAuth2
0 likes · 13 min read
Cookie, Session, Token, JWT, OAuth2: Which One Fits Your Project?
Java Captain
Java Captain
Aug 20, 2025 · Information Security

Build a Secure Spring Boot App in Minutes with Spring Security

This tutorial walks you through adding Spring Security to a Spring Boot project, from adding the starter dependency and creating a simple controller to observing the default login page, understanding the auto‑generated password mechanism, and customizing usernames and passwords for production use.

AuthenticationAuthorizationJava
0 likes · 9 min read
Build a Secure Spring Boot App in Minutes with Spring Security
大转转FE
大转转FE
Aug 19, 2025 · Frontend Development

Essential Frontend Security: Defend Against CSRF, XSS, and Clickjacking

This article explains why frontend security is critical, outlines common attacks such as CSRF, XSS (stored, reflected, DOM), and clickjacking, and provides practical defense strategies including CSRF tokens, SameSite cookies, input validation, CSP, X‑Frame‑Options, and secure coding practices for modern web developers.

CSRFSecure CodingWeb Security
0 likes · 12 min read
Essential Frontend Security: Defend Against CSRF, XSS, and Clickjacking
Ops Development & AI Practice
Ops Development & AI Practice
Jul 26, 2025 · Information Security

Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses

This article explains the fundamentals of Cross‑Site Scripting attacks, illustrates reflected, stored, and DOM‑based variants with concrete code examples, and presents a four‑step defense strategy—including input validation, output encoding, Content Security Policy, and WAF—to protect web applications.

Content Security PolicyWAFWeb Security
0 likes · 9 min read
Mastering XSS: How Attackers Exploit Trust and How to Build Unbreakable Defenses
Java Architect Essentials
Java Architect Essentials
Jul 19, 2025 · Information Security

Why Spring Security’s Full‑Chain Protection Can Eradicate XSS and SQL Injection

This article explains how a comprehensive, full‑stack security approach using Spring Security—covering request sanitization, parameterized queries, and built‑in authentication, authorization, CSRF and session safeguards—can dramatically reduce XSS and SQL injection vulnerabilities to near zero.

Full-Stack ProtectionJavaSQL injection
0 likes · 13 min read
Why Spring Security’s Full‑Chain Protection Can Eradicate XSS and SQL Injection
JavaScript
JavaScript
Jul 7, 2025 · Frontend Development

How to Stop Users from Copying Web Content: CSS, JS, and Clipboard Tricks

This article explores why you might need to block copying on a web page—such as paid content, exams, or sensitive data—and presents three front‑end techniques (CSS user‑select, JavaScript event handling, and clipboard modification) with code examples, pros, cons, and practical considerations.

CSSWeb Securityclipboard
0 likes · 9 min read
How to Stop Users from Copying Web Content: CSS, JS, and Clipboard Tricks
Selected Java Interview Questions
Selected Java Interview Questions
Jul 3, 2025 · Frontend Development

Understanding Same-Origin Policy and CORS: A Complete Guide

This article explains the fundamentals of the browser's same-origin policy, its security implications, how it restricts DOM, web data and network access, and provides a detailed overview of CORS, including simple requests, preflight checks, required headers, and best practices for safe cross-origin communication.

CORSCross-OriginWeb Security
0 likes · 14 min read
Understanding Same-Origin Policy and CORS: A Complete Guide
Java Tech Enthusiast
Java Tech Enthusiast
Jun 20, 2025 · Information Security

Why the Misspelled HTTP Referer Header Matters for Security and Analytics

The HTTP Referer header, a ubiquitous but often overlooked request field, records the source page of a user, aids traffic analysis, enables anti‑hotlinking and CSRF protection, and carries a historic misspelling that led to the Referrer‑Policy standards governing privacy and security.

HTTPReferrer-PolicyWeb Development
0 likes · 8 min read
Why the Misspelled HTTP Referer Header Matters for Security and Analytics
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jun 19, 2025 · Information Security

How to Generate Reliable Browser Fingerprints with Navigator, Canvas, and WebGL

This article explains what browser fingerprinting is, outlines common techniques such as Navigator, Canvas, and WebGL fingerprints, and provides complete JavaScript examples that collect device information and generate stable hashes, helping developers understand and implement device‑unique identifiers for identity verification.

Browser FingerprintingJavaScriptWeb Security
0 likes · 11 min read
How to Generate Reliable Browser Fingerprints with Navigator, Canvas, and WebGL
JavaScript
JavaScript
Jun 15, 2025 · Information Security

Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight

This guide explains how to answer the common interview question “Can you talk about HTTPS?” by covering its fundamental differences from HTTP, the role of SSL/TLS, confidentiality, integrity and authentication, the TLS handshake process, performance considerations, certificate chains, and how to present this knowledge to showcase both depth and breadth of security expertise.

HTTPSSecurity InterviewTLS
0 likes · 9 min read
Mastering HTTPS Interview Questions: Impress Recruiters with Deep Security Insight
php Courses
php Courses
May 28, 2025 · Information Security

Understanding XSS Attacks and Prevention Methods in PHP

Cross‑Site Scripting (XSS) is a common web security vulnerability where malicious scripts are injected into pages, and this article explains typical PHP XSS scenarios, demonstrates code examples, and outlines effective mitigation techniques such as htmlspecialchars(), HTML Purifier, proper headers, secure cookies, CSP, and best practices.

Content Security PolicyPHPWeb Security
0 likes · 5 min read
Understanding XSS Attacks and Prevention Methods in PHP
Top Architect
Top Architect
May 21, 2025 · Frontend Development

Understanding Same‑Origin Policy and CORS in Web Development

This article explains the browser's same‑origin policy, its role in preventing XSS, CSRF and other attacks, details the protocol, host and port rules, illustrates with examples, and then describes CORS, simple and preflight requests, credential handling, and provides a complete request flow diagram.

CORSHTTPWeb Security
0 likes · 17 min read
Understanding Same‑Origin Policy and CORS in Web Development
Liangxu Linux
Liangxu Linux
May 11, 2025 · Information Security

Fixing Cross-Origin Issues with Nginx: A Practical CORS Guide

This tutorial explains the browser same‑origin policy, demonstrates a cross‑origin request failure between two servers, and shows how to configure Nginx with appropriate Access‑Control headers to enable CORS and allow the client to retrieve JSON data safely.

CORSCross-OriginSame-Origin Policy
0 likes · 5 min read
Fixing Cross-Origin Issues with Nginx: A Practical CORS Guide
Architecture Digest
Architecture Digest
Apr 18, 2025 · Information Security

Understanding Same-Origin Policy, CORS, and Preflight Requests

The article explains the fundamentals of the browser's same‑origin policy, the security risks it mitigates, how Cross‑Origin Resource Sharing (CORS) works—including simple and preflight requests—and best practices for handling credentials and header restrictions.

CORSCross-OriginPreflight Request
0 likes · 10 min read
Understanding Same-Origin Policy, CORS, and Preflight Requests
Open Source Linux
Open Source Linux
Apr 18, 2025 · Fundamentals

Understanding HTTP vs HTTPS: Protocol Basics, Security, and Session Management

This article explains the fundamental differences between HTTP and HTTPS, how internet messages travel through DNS and routers, the roles of IP and MAC addresses, port conventions, request/response structures, encryption methods, digital certificates, and compares cookies with server‑side sessions for state management.

HTTPHTTPSNetworking
0 likes · 16 min read
Understanding HTTP vs HTTPS: Protocol Basics, Security, and Session Management
Code Ape Tech Column
Code Ape Tech Column
Mar 23, 2025 · Information Security

Understanding QR Code Login: Principles, Token Authentication, and Process Flow

This article explains the fundamentals of QR code login, covering QR code basics, token‑based authentication, the step‑by‑step process from QR generation to device polling, scanning, confirmation, and token exchange, and discusses security considerations and implementation details for web, PC, and mobile platforms.

MobileQR codeWeb Security
0 likes · 11 min read
Understanding QR Code Login: Principles, Token Authentication, and Process Flow
MaGe Linux Operations
MaGe Linux Operations
Mar 22, 2025 · Fundamentals

Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic

This article explains the fundamental differences between HTTP and HTTPS, how internet messages travel through DNS and routers, the roles of ports, request and response structures, encryption methods, digital certificates, and compares cookies with sessions for state management.

HTTPHTTPSNetworking
0 likes · 18 min read
Why HTTP Is Insecure and How HTTPS Secures Your Web Traffic
JavaScript
JavaScript
Mar 4, 2025 · Frontend Development

Simplify CORS in Frontend: One‑Line Fetch API Fix & New Import Assertions

This article explains the fundamentals of CORS, reviews traditional mitigation methods, and demonstrates how modern Fetch API options, import assertions, and emerging web standards provide concise, secure ways to handle cross‑origin requests in frontend development.

CORSJavaScriptWeb Security
0 likes · 5 min read
Simplify CORS in Frontend: One‑Line Fetch API Fix & New Import Assertions
MaGe Linux Operations
MaGe Linux Operations
Feb 14, 2025 · Information Security

How to Harden Nginx: Essential Security Practices for Safer Web Servers

This guide provides a comprehensive, step‑by‑step hardening roadmap for Nginx, covering version hiding, directory protection, HTTPS enablement, custom error pages, CSP, file permissions, security headers, connection limits, IP whitelisting, SSL optimization, secure file uploads, common attack mitigations, logging best practices, and additional hardening measures to protect web services from a wide range of threats.

CSPHTTPSNGINX
0 likes · 31 min read
How to Harden Nginx: Essential Security Practices for Safer Web Servers
Pan Zhi's Tech Notes
Pan Zhi's Tech Notes
Feb 10, 2025 · Information Security

Is Your Site Vulnerable? Understanding the Common SQL Injection Attack

This article explains the fundamentals of SQL injection attacks, demonstrates step‑by‑step exploitation using the DVWA platform—including data extraction, login bypass, and injection point detection—and outlines practical prevention techniques such as input validation, regex filtering, and prepared statements.

DVWASQL injectionWeb Security
0 likes · 11 min read
Is Your Site Vulnerable? Understanding the Common SQL Injection Attack
php Courses
php Courses
Jan 17, 2025 · Backend Development

Understanding PHP Session Management: Concepts, Functions, and Best Practices

This article explains the fundamentals of PHP session management, covering how sessions store and transmit user data across pages, essential functions like session_start() and $_SESSION, practical code examples, and common pitfalls to avoid for secure and efficient web applications.

Backend DevelopmentPHPSession Management
0 likes · 6 min read
Understanding PHP Session Management: Concepts, Functions, and Best Practices
Ops Development & AI Practice
Ops Development & AI Practice
Jan 15, 2025 · Backend Development

Mastering CORS in Nginx: Common Errors and Precise Fixes

This guide explains the fundamentals of CORS, walks through typical misconfigurations such as HeaderDisallowedByPreflightResponse, Nginx header ordering, and Origin‑Credentials conflicts, and provides complete Nginx examples to reliably enable cross‑origin requests.

BackendCORSHTTP
0 likes · 8 min read
Mastering CORS in Nginx: Common Errors and Precise Fixes
iKang Technology Team
iKang Technology Team
Dec 4, 2024 · Information Security

Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments

Enterprises should follow a six‑phase plan—inventorying domains, securing and installing SSL certificates, configuring servers, redirecting traffic, updating links and sitemaps, testing, and finally enforcing HTTPS‑only access—while monitoring performance impacts such as latency, bandwidth, CPU load, and handshake overhead.

EnterpriseHTTPSSSL
0 likes · 9 min read
Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments
php Courses
php Courses
Nov 15, 2024 · Information Security

Best Practices for Securing PHP Applications

This guide outlines comprehensive, actionable steps for PHP developers to build secure applications by using the latest PHP version, enforcing HTTPS, sanitizing input, managing passwords, preventing XSS and CSRF, handling sessions, logging errors, securing file uploads, and applying the principle of least privilege.

Backend DevelopmentPHPSecure Coding
0 likes · 10 min read
Best Practices for Securing PHP Applications
php Courses
php Courses
Nov 14, 2024 · Information Security

Best Practices for Securing Laravel Web Applications

This article outlines essential Laravel security practices, including built‑in authentication, CSRF protection, input validation, HTTPS enforcement, secure session handling, regular dependency updates, and rate limiting, providing developers with concrete steps to protect web applications from common attacks.

AuthenticationCSRFHTTPS
0 likes · 6 min read
Best Practices for Securing Laravel Web Applications
37 Interactive Technology Team
37 Interactive Technology Team
Nov 11, 2024 · Information Security

Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)

JSON Web Token (JWT) is a compact, self‑contained, stateless token that encodes header, payload, and signature in Base64URL, enabling secure, signature‑verified authentication without server‑side session storage, simplifying scaling, supporting cross‑domain use, while offering advantages like lightweight extensibility and drawbacks such as revocation difficulty and secret‑key reliance.

AuthenticationAuthorizationJSON
0 likes · 16 min read
Background, Definition, Structure, and Authentication Process of JWT (JSON Web Token)
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 5, 2024 · Frontend Development

Comprehensive Guide to Using iframe in Web Frontend: Responsive Sizing, Dynamic Height, Cross‑Domain Communication, and Security

This article provides a detailed tutorial on iframe usage in web front‑end development, covering responsive sizing based on the parent window, dynamic height adjustment via postMessage, handling HTTP/HTTPS mismatches, cross‑origin issues, and security considerations such as X‑Frame‑Options.

Cross-OriginVueWeb Security
0 likes · 13 min read
Comprehensive Guide to Using iframe in Web Frontend: Responsive Sizing, Dynamic Height, Cross‑Domain Communication, and Security
Top Architect
Top Architect
Sep 29, 2024 · Frontend Development

Understanding Same‑Origin Policy and CORS in Frontend Development

This article explains the fundamentals of the same‑origin policy, the security risks it mitigates, and how CORS and preflight requests work in browsers, illustrating the concepts with diagrams, header details, and a complete request flow chart.

HTTPWeb Securityfrontend
0 likes · 16 min read
Understanding Same‑Origin Policy and CORS in Frontend Development
Selected Java Interview Questions
Selected Java Interview Questions
Sep 26, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay, and forgery, and presents practical measures—including HTTPS, encryption, secure storage, short lifetimes, two‑factor authentication, and safe token refresh—to protect token integrity in modern web applications.

AuthenticationJWTWeb Security
0 likes · 14 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
Architect
Architect
Aug 26, 2024 · Information Security

Understanding JWT Token Security: Threats and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token-based authentication with traditional session methods, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, encryption, secure storage, short lifetimes, two‑factor authentication, and safe token refresh strategies.

AuthenticationJWTWeb Security
0 likes · 12 min read
Understanding JWT Token Security: Threats and Mitigation Strategies
Top Architect
Top Architect
Jul 24, 2024 · Information Security

Understanding Session and Token-Based Authentication with JWT in Web Applications

The article explains how HTTP’s stateless nature requires session or token mechanisms for preserving user state, compares session‑based and JWT token authentication, details JWT structure, and provides Java code examples for generating, verifying, and extracting token information, while also promoting related services.

AuthenticationJWTJava
0 likes · 10 min read
Understanding Session and Token-Based Authentication with JWT in Web Applications
macrozheng
macrozheng
Jul 18, 2024 · Information Security

Mastering Same-Origin Policy and CORS: A Complete Guide for Secure Web Development

This article explains the fundamentals of the same‑origin policy, its impact on DOM, web data and network requests, and provides a detailed overview of CORS, simple requests, preflight requests, and the necessary response headers to securely enable cross‑origin communication in modern browsers.

BrowserCORSWeb Security
0 likes · 13 min read
Mastering Same-Origin Policy and CORS: A Complete Guide for Secure Web Development
php Courses
php Courses
Jul 16, 2024 · Backend Development

How to Set Cookies in PHP Using the setcookie Function

This article explains the PHP setcookie function, detailing its syntax, parameter meanings, and provides multiple practical examples for creating cookies with various lifetimes, paths, domains, and security flags, helping developers effectively manage client-side data in web applications.

Web Securitycookiessetcookie
0 likes · 5 min read
How to Set Cookies in PHP Using the setcookie Function
Top Architect
Top Architect
Jul 13, 2024 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the OAuth2.0 authorization protocol, distinguishes it from single sign‑on, describes its core entities and step‑by‑step flow, and outlines how web servers, user agents, and native applications interact to securely obtain access tokens for protected resources.

AuthenticationAuthorizationBackend Development
0 likes · 12 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
Code Mala Tang
Code Mala Tang
Jul 8, 2024 · Information Security

Mastering SameSite Cookies: When to Use Strict, Lax, or None

Understanding the SameSite attribute lets developers control cookie transmission across sites, balancing security and usability by choosing Strict for maximum protection, Lax for a user‑friendly compromise, or None (with Secure) for cross‑site scenarios, with practical code examples and usage guidelines.

HTTPNode.jsSameSite
0 likes · 6 min read
Mastering SameSite Cookies: When to Use Strict, Lax, or None
Top Architect
Top Architect
Jul 5, 2024 · Information Security

Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains

This article explains the core architecture of Spring Security 6.x, detailing how a chain of servlet Filters implements authentication and authorization, the role of DelegatingFilterProxy, SecurityFilterChain, and the extensible components such as AuthenticationManager, UserDetailsService, and PasswordEncoder.

AuthenticationAuthorizationJava
0 likes · 31 min read
Deep Dive into Spring Security Architecture: Authentication, Authorization, and Filter Chains
Top Architect
Top Architect
Jul 1, 2024 · Information Security

Understanding Single Sign-On (SSO) and CAS Authentication Flow

This article explains the concept, definitions, and three deployment types of Single Sign-On (SSO), introduces the Central Authentication Service (CAS) mechanism, and details step‑by‑step login and logout processes across multiple web applications, illustrating each flow with diagrams and examples.

AuthenticationCASSSO
0 likes · 12 min read
Understanding Single Sign-On (SSO) and CAS Authentication Flow
FunTester
FunTester
Jun 26, 2024 · Information Security

Mastering Web Application Penetration Testing: Methods, Types, and Best Practices

Web application penetration testing is a systematic security assessment that identifies vulnerabilities such as SQL injection, XSS, CSRF, insecure authentication, and file‑upload flaws, using methods ranging from black‑box to manual testing, and follows best practices like OWASP guidelines to protect data, privacy, and system integrity.

OWASPWeb Securityinformation security
0 likes · 11 min read
Mastering Web Application Penetration Testing: Methods, Types, and Best Practices
Open Source Tech Hub
Open Source Tech Hub
May 7, 2024 · Information Security

JWT vs Session: Which Authentication Method Fits Your Web App?

This article explains what JWT and Session are, compares their storage, state management, security, performance, cross‑domain support, expiration, use cases, logout mechanisms, and one‑time use scenarios, and helps you decide which authentication approach best suits your application’s needs.

AuthenticationJWTSession
0 likes · 6 min read
JWT vs Session: Which Authentication Method Fits Your Web App?
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Liangxu Linux
Liangxu Linux
Mar 25, 2024 · Information Security

How to Use Gzip Compression to Overload Web Crawlers (Gzip Bomb Tutorial)

This guide shows how to create a tiny gzip‑compressed file, serve it with FastAPI, and exploit automatic decompression in Python's requests library to force a crawler to consume massive memory, effectively turning compression into a denial‑of‑service weapon.

Denial of ServiceFastAPIGzip
0 likes · 7 min read
How to Use Gzip Compression to Overload Web Crawlers (Gzip Bomb Tutorial)
Ops Development & AI Practice
Ops Development & AI Practice
Feb 14, 2024 · Backend Development

When to Use 401 vs 403: Proper HTTP Status Codes for Secure Web Servers

This guide explains how web servers should differentiate between missing authentication information and invalid credentials, detailing when to return 401 Unauthorized or 403 Forbidden, the associated response flows, security best practices, and user‑experience considerations to improve safety and clarity.

401 Unauthorized403 ForbiddenBackend Development
0 likes · 5 min read
When to Use 401 vs 403: Proper HTTP Status Codes for Secure Web Servers
AI Illustrated Series
AI Illustrated Series
Feb 9, 2024 · Information Security

Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight

This article explains why browsers may issue a duplicate POST request by exploring the same‑origin policy, the mechanics of CORS, the criteria for simple requests, the structure of preflight OPTIONS requests, credential handling, and how development tools like Webpack Dev Server bypass these restrictions.

Browser SecurityCORSCross-Origin
0 likes · 13 min read
Why Does a POST Sometimes Send Two Requests? A Deep Dive into CORS Preflight
Bilibili Tech
Bilibili Tech
Feb 6, 2024 · Frontend Development

Advanced Interception Techniques in Front-End Development: API Overriding, Service Workers, and Sandbox Strategies

Advanced interception techniques—such as overriding browser APIs, using ServiceWorkers, employing MutationObservers, creating Proxy‑based sandboxes, and configuring server‑side gateways—provide a flexible middle layer for error reporting, request monitoring, micro‑frontend isolation, and remote debugging, while demanding careful adherence to security policies.

InterceptionJavaScriptProxy
0 likes · 16 min read
Advanced Interception Techniques in Front-End Development: API Overriding, Service Workers, and Sandbox Strategies
php Courses
php Courses
Jan 29, 2024 · Information Security

Guide to Preventing LDAP and SQL Injection Attacks in PHP

This article explains the principles, provides code examples, and outlines preventive measures for LDAP and SQL injection attacks in PHP, helping developers understand how these vulnerabilities work and how to secure their web applications through input validation, parameter binding, and access control.

LDAP injectionSQL injectionWeb Security
0 likes · 6 min read
Guide to Preventing LDAP and SQL Injection Attacks in PHP
Java Tech Enthusiast
Java Tech Enthusiast
Jan 10, 2024 · Information Security

Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained

Cross-Origin Resource Sharing (CORS) extends the Same-Origin Policy by permitting controlled cross‑origin requests through simple and preflight flows, using specific headers and credential rules, thereby balancing web security against threats like XSS, CSRF, and injection attacks while enabling safe resource sharing.

Browser SecurityCORBCORS
0 likes · 10 min read
Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained
MaGe Linux Operations
MaGe Linux Operations
Jan 6, 2024 · Information Security

Understanding XSS: Types, Risks, and Effective Defense Strategies

This article explains what Cross‑Site Scripting (XSS) is, describes its various types and the severe threats it poses, and provides comprehensive defense techniques—including input/output validation, HTML/JavaScript encoding, HttpOnly cookies, and secure handling of URLs, CSS, and rich‑text content—to protect web applications from XSS attacks.

CSRFHTML EncodingWeb Security
0 likes · 31 min read
Understanding XSS: Types, Risks, and Effective Defense Strategies
Architect's Guide
Architect's Guide
Jan 6, 2024 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the same‑origin policy, its role in protecting web applications, how browsers enforce it through DOM, web‑data, and network restrictions, and how Cross‑Origin Resource Sharing (CORS) and preflight requests enable controlled cross‑origin communication while maintaining security.

Browser SecurityCORSCross-Origin
0 likes · 12 min read
Understanding Same-Origin Policy and CORS in Web Development
Sohu Tech Products
Sohu Tech Products
Dec 20, 2023 · Information Security

Understanding Self‑XSS Warnings in Chrome DevTools

Chrome DevTools now shows a Self‑XSS warning when an inexperienced user tries to paste code, using a simple heuristic that checks for at least five console‑history entries, requiring the user to type “allow pasting” before execution, to protect against social‑engineered attacks that could steal data or hijack accounts.

Browser WarningChrome DevToolsSelf-XSS
0 likes · 7 min read
Understanding Self‑XSS Warnings in Chrome DevTools
Code Ape Tech Column
Code Ape Tech Column
Sep 28, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the browser's Same-Origin Policy, its impact on DOM, data, and network access, and how Cross-Origin Resource Sharing (CORS) and preflight requests enable controlled cross-origin communication while preserving security.

Browser SecurityCORSCross-Origin Requests
0 likes · 11 min read
Understanding Same-Origin Policy and CORS in Web Development
MaGe Linux Operations
MaGe Linux Operations
Sep 23, 2023 · Information Security

How to Prevent SQL Injection in Java Projects: From PreparedStatement to Nginx Filters

This article explains what SQL injection is, demonstrates a vulnerable example, and presents four practical defenses for Java applications—including PreparedStatement, MyBatis #{} placeholders, request‑parameter filtering, and Nginx reverse‑proxy rules—complete with code snippets and configuration details.

JavaMyBatisPreparedStatement
0 likes · 8 min read
How to Prevent SQL Injection in Java Projects: From PreparedStatement to Nginx Filters