Tagged articles
341 articles
Page 3 of 4
21CTO
21CTO
Jan 5, 2021 · Information Security

Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt

This guide explains why and how to upgrade an HTTP website to HTTPS using free Let’s Encrypt certificates and the acme.sh script, covering installation, certificate generation via HTTP or DNS validation, deployment to Apache/Nginx, and automated renewal.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
Secure Your Site for Free: HTTPS with acme.sh and Let’s Encrypt
Liangxu Linux
Liangxu Linux
Dec 30, 2020 · Information Security

Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks

The article explains the vulnerabilities of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and then details how HTTPS—built on SSL/TLS, asymmetric key exchange, and CA certificate validation—prevents these attacks, providing a comprehensive overview of secure web communication.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks
21CTO
21CTO
Dec 25, 2020 · Information Security

Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR

GitHub announced the removal of unnecessary cookies, reflecting GDPR-driven privacy shifts and showing how modern web platforms can reduce data collection while still tracking essential performance metrics without third‑party trackers.

Data ProtectionGDPRGitHub
0 likes · 5 min read
Why GitHub Dropped Cookies: Implications for Web Privacy and GDPR
Top Architect
Top Architect
Dec 5, 2020 · Information Security

How to Upgrade an HTTP Site to HTTPS Using acme.sh

This guide explains why and how to migrate a website from HTTP to HTTPS by obtaining free Let’s Encrypt certificates, installing the acme.sh script, using HTTP or DNS validation, copying the certificates to the web server, and automating renewal and updates.

HTTPSLet’s EncryptSSL
0 likes · 8 min read
How to Upgrade an HTTP Site to HTTPS Using acme.sh
Java Architecture Diary
Java Architecture Diary
Dec 2, 2020 · Information Security

How to Prevent XSS Attacks with mica-xss: A Step-by-Step Guide

This article explains what XSS attacks are, demonstrates simple exploitation scenarios, and provides a comprehensive solution using the mica-xss library with Spring MVC, including dependency setup, request filtering, testing methods, and the underlying Jsoup‑based implementation.

Web SecurityXSSinput validation
0 likes · 7 min read
How to Prevent XSS Attacks with mica-xss: A Step-by-Step Guide
Fulu Network R&D Team
Fulu Network R&D Team
Oct 27, 2020 · Information Security

Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications

This article explains the purpose, possible values, and security impact of the Sec-Fetch request headers introduced by the Fetch Metadata specification, showing how browsers automatically add them, how servers can use them to filter illegal requests, and providing practical policy examples and code snippets.

Browser SecurityCSRF ProtectionFetch Metadata
0 likes · 9 min read
Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications
Efficient Ops
Efficient Ops
Oct 14, 2020 · Information Security

Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication

This article traces the evolution from early stateless web browsing to modern token‑based authentication, explaining how session management challenges led to centralized stores, their drawbacks, and how signed tokens using HMAC‑SHA256 provide a scalable, secure, and truly stateless alternative.

AuthenticationHMACSession
0 likes · 15 min read
Why Tokens Are Replacing Sessions: A Deep Dive into Stateless Authentication
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2020 · Information Security

Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses

This article provides a comprehensive overview of Cross‑Site Scripting (XSS), explaining its definition, dangers, underlying mechanisms, classification into stored, reflected, and DOM‑based types, common injection vectors, and practical defense strategies, while also addressing common questions and resources for further learning.

Cross-site scriptingWeb SecurityXSS
0 likes · 11 min read
Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses
Laravel Tech Community
Laravel Tech Community
Sep 30, 2020 · Information Security

Understanding Session Hijacking and Session Fixation in PHP Web Applications

The article explains why web applications must never trust client data, describes how PHP sessions are vulnerable to hijacking and fixation attacks, outlines typical attack vectors such as XSS, cookie theft, and brute‑force, and provides practical defense measures like HttpOnly cookies, token validation, and session regeneration.

Session HijackingWeb SecurityXSS
0 likes · 9 min read
Understanding Session Hijacking and Session Fixation in PHP Web Applications
Programmer DD
Programmer DD
Sep 28, 2020 · Information Security

Why SSL Certificates Matter: Choosing the Right CA for Secure Websites

Understanding SSL certificates, their role in securing web traffic, why trusted CAs are essential, the cost factors, free options like Let’s Encrypt, and the various validation types helps developers select the appropriate certificate and configure it properly, typically via Nginx, for robust HTTPS protection.

CALet’s EncryptSSL
0 likes · 7 min read
Why SSL Certificates Matter: Choosing the Right CA for Secure Websites
Selected Java Interview Questions
Selected Java Interview Questions
Sep 23, 2020 · Backend Development

Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches

This article explains three practical methods for achieving Single Sign‑On in web systems—using a parent‑domain cookie, deploying a dedicated authentication center, and leveraging front‑end LocalStorage with iframe postMessage—to share session or token information across multiple domains.

AuthenticationCookieSSO
0 likes · 11 min read
Implementing Single Sign-On (SSO) in Web Applications: Cookie, Authentication Center, and LocalStorage Approaches
Liangxu Linux
Liangxu Linux
Sep 10, 2020 · Information Security

Why Microsoft Is Finally Dropping Internet Explorer: Timeline, Impact, and Security Risks

Microsoft announced that it will cease support for Internet Explorer 11 in Microsoft 365 applications, detailing a phased shutdown that began with Teams in 2020, ended Office 365 support in August 2021, and signals the browser's eventual disappearance despite its historical dominance and lingering security concerns.

Internet ExplorerLegacy SupportMicrosoft Edge
0 likes · 6 min read
Why Microsoft Is Finally Dropping Internet Explorer: Timeline, Impact, and Security Risks
IT Architects Alliance
IT Architects Alliance
Aug 13, 2020 · Information Security

Top 7 Web Vulnerability Scanners: Features, Pros, and How to Use Them

After gathering reconnaissance data in a penetration test, this article reviews seven popular web vulnerability scanners, outlining their core capabilities, typical usage scenarios, and visual screenshots to help security professionals choose the right tool for detecting SQL injection, XSS, file inclusion, and other common web flaws.

Tool comparisonWeb Securityawvs
0 likes · 7 min read
Top 7 Web Vulnerability Scanners: Features, Pros, and How to Use Them
Laravel Tech Community
Laravel Tech Community
Aug 10, 2020 · Information Security

Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions

This article provides a detailed walkthrough of web penetration testing steps, extensive Q&A on common vulnerabilities such as SQL injection, XSS, CSRF, SSRF, file inclusion, privilege escalation methods, mitigation strategies, and interview preparation tips for security professionals.

ExploitationSecurity InterviewWeb Security
0 likes · 44 min read
Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

Database SecurityPythonSQL injection
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
Java Captain
Java Captain
Jul 26, 2020 · Information Security

Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT

This article explains the fundamentals of authentication and authorization, the roles of credentials, cookies, sessions, various token types including access and refresh tokens, and details the structure, generation, and usage of JWTs, while comparing security considerations and distributed session sharing strategies.

AuthenticationAuthorizationCookie
0 likes · 21 min read
Understanding Authentication, Authorization, Cookies, Sessions, Tokens and JWT
OPPO Amber Lab
OPPO Amber Lab
Jul 22, 2020 · Information Security

Understanding Web Security: Key Vulnerabilities and Penetration Testing Methods

This article explains the fundamentals of web security, outlines typical web architecture, classifies penetration testing approaches, enumerates common vulnerabilities such as SQL injection, XSS, file upload and deserialization, and discusses how attackers combine these flaws to launch advanced exploits.

DeserializationSQL injectionVulnerability Classification
0 likes · 7 min read
Understanding Web Security: Key Vulnerabilities and Penetration Testing Methods
Efficient Ops
Efficient Ops
Jul 20, 2020 · Information Security

Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design

This article examines the rise of web‑application firewalls, outlines common deployment challenges, compares several WAF operating modes—including bypass, layer‑2 transparent, and proxy architectures—and proposes load‑balancing strategies to achieve secure, high‑availability web services.

DeploymentWAFWeb Security
0 likes · 12 min read
Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design
Architect
Architect
Jul 16, 2020 · Information Security

Understanding Single Sign-On (SSO) Mechanism and Java Implementation

This article explains the fundamentals of HTTP session management, the limitations of cookie-based single-system login, and introduces Single Sign-On (SSO) concepts, including global and local sessions, token-based authentication, and provides step-by-step Java code examples for implementing SSO client and server components.

JavaSSOSession Management
0 likes · 16 min read
Understanding Single Sign-On (SSO) Mechanism and Java Implementation
Open Source Linux
Open Source Linux
Jul 13, 2020 · Information Security

Demystifying HTTPS: How Encryption and Certificates Secure the Web

This article explains in plain language what HTTPS is, how it encrypts data using symmetric and asymmetric techniques, how it verifies server identity with digital signatures and certificates, and why these mechanisms keep web communications safe from eavesdropping and tampering.

HTTPSTLSWeb Security
0 likes · 7 min read
Demystifying HTTPS: How Encryption and Certificates Secure the Web
Sohu Tech Products
Sohu Tech Products
Jun 24, 2020 · Information Security

Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT

This article explains how HTTPS security depends on certificates, outlines the risks of certificate forgery, describes the certificate issuance process, and introduces Certificate Transparency and the Expect-CT header as mechanisms to detect and mitigate forged certificates.

CACertificate ForgeryCertificate Transparency
0 likes · 7 min read
Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT
Programmer DD
Programmer DD
Jun 19, 2020 · Information Security

Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication

This article explains why HTTPS is essential for protecting privacy, ensuring data integrity, and authenticating servers, describes the evolution of SSL/TLS, and walks through the handshake process that combines asymmetric and symmetric encryption to secure web traffic.

Certificate AuthorityHTTPSSSL
0 likes · 14 min read
Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication
Top Architect
Top Architect
Jun 12, 2020 · Information Security

Understanding HTTPS: Why It Is Secure and How It Works

This article explains why HTTPS is necessary, describes symmetric and asymmetric encryption, illustrates the key exchange process, and outlines how HTTPS ensures secure communication by preventing eavesdropping, man‑in‑the‑middle attacks, and ensuring certificate trustworthiness.

HTTPSPublic Key InfrastructureTLS
0 likes · 5 min read
Understanding HTTPS: Why It Is Secure and How It Works
Architecture Digest
Architecture Digest
May 23, 2020 · Information Security

Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions

This article explains how HTTPS works by detailing the certificate verification and data transmission phases, the use of asymmetric and symmetric encryption, the role of Certificate Authorities, potential man‑in‑the‑middle attacks, browser validation steps, and why HTTPS does not fully prevent packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions
Laravel Tech Community
Laravel Tech Community
May 20, 2020 · Information Security

How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS

The article explains the fundamental differences between HTTP and HTTPS, outlines how HTTPS adds SSL/TLS encryption to the standard HTTP protocol, describes the step‑by‑step communication process—including certificate verification, key exchange, and encrypted data transfer—and compares ports, security, and connection details.

HTTPHTTPSSSL
0 likes · 6 min read
How Does HTTPS Secure Your Web Traffic? A Deep Dive into HTTP vs HTTPS
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Apr 30, 2020 · Information Security

How to Combine Proxies and Scanners to Cut Web Vulnerability False Positives

This article explores the limitations of traditional web vulnerability scanners and manual testing, proposes a proxy‑based architecture that captures real user requests for centralized analysis, demonstrates a demo implementation using Burp and custom scanners, and reflects on the design's strengths and remaining challenges.

ProxyWeb Securityfalse positives
0 likes · 7 min read
How to Combine Proxies and Scanners to Cut Web Vulnerability False Positives
macrozheng
macrozheng
Apr 10, 2020 · Backend Development

Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication

This article explains how cookies and sessions compensate for HTTP's stateless nature, details their creation, types, and limitations, compares them with JSON Web Tokens, and provides guidance on choosing the appropriate authentication method for different application scales and security requirements.

AuthenticationJWTSession
0 likes · 16 min read
Understanding Cookies, Sessions, and JWT: A Complete Guide to Web Authentication
FunTester
FunTester
Jan 9, 2020 · Information Security

Essential Security Checklist for Web Apps: From Unit Tests to Encryption

This article presents a practical checklist for securing web applications, covering unit testing, access control, change tracking, admin privilege management, least‑privilege principles, remote redundancy, monitoring, encryption, automated security scanning, and SQL injection prevention, offering actionable guidance for developers.

Web Securityaccess controlencryption
0 likes · 7 min read
Essential Security Checklist for Web Apps: From Unit Tests to Encryption
Architecture Digest
Architecture Digest
Dec 29, 2019 · Information Security

Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains

This guide introduces Spring Security fundamentals, explaining authentication and authorization concepts, the core interfaces such as AuthenticationManager and AccessDecisionManager, how to configure them with Spring Boot, customize filter chains, apply method‑level security, and handle thread‑bound security contexts for asynchronous processing.

AuthenticationAuthorizationJava
0 likes · 18 min read
Spring Security Guide: Authentication, Authorization, and Customizing Filter Chains
21CTO
21CTO
Dec 16, 2019 · Information Security

How SSO Works: From CAS Architecture to Real‑World Implementation

This article explains the background, architecture, and step‑by‑step authentication flow of Single Sign‑On systems, covering the classic CAS framework, Java implementation details, and Taobao's extended SSO design with code examples.

AuthenticationCASJava
0 likes · 8 min read
How SSO Works: From CAS Architecture to Real‑World Implementation
Programmer DD
Programmer DD
Nov 26, 2019 · Information Security

Understanding Cookies, Sessions, and Tokens: When and How to Use Each

This article explains the fundamental differences between cookies, sessions, and tokens, outlines how each works in web authentication, compares their security and performance trade‑offs, and offers practical guidance on storage, encryption, and best practices for implementing token‑based authentication.

AuthenticationCookieSession
0 likes · 13 min read
Understanding Cookies, Sessions, and Tokens: When and How to Use Each
Programmer DD
Programmer DD
Nov 3, 2019 · Information Security

Spring Security vs Apache Shiro: Which Java Security Framework Wins?

This article compares Spring Security and Apache Shiro, explaining their authentication and authorization features, filter‑chain mechanisms, RBAC model, and related security concepts to help Java developers choose the right framework for production‑grade web applications.

Apache ShiroAuthenticationRBAC
0 likes · 6 min read
Spring Security vs Apache Shiro: Which Java Security Framework Wins?
Efficient Ops
Efficient Ops
Sep 19, 2019 · Information Security

How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso

This guide explains why web log analysis is essential for security, demonstrates how to parse Apache logs, distinguishes normal from malicious requests, and provides practical Secsoso commands for business behavior statistics, traffic monitoring, and detecting attacks such as CC, SQL injection, file inclusion, and XSS.

Threat DetectionWeb Securitylog analysis
0 likes · 19 min read
How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso
58 Tech
58 Tech
Sep 18, 2019 · Information Security

Cross-Domain Solutions and Same-Origin Policy Practices in the Cloud Account Platform

The article explains how the 58 Group’s cloud account platform consolidates multiple account systems and provides a unified SDK, detailing cross‑domain challenges, same‑origin policy, and practical solutions such as JSONP, iframe proxies, independent domains, 302 redirects, and CORS to ensure secure, efficient login integration across web, app, and PC clients.

CORSSame-Origin PolicyWeb Security
0 likes · 8 min read
Cross-Domain Solutions and Same-Origin Policy Practices in the Cloud Account Platform
360 Tech Engineering
360 Tech Engineering
Sep 9, 2019 · Frontend Development

Understanding Simple and Preflight Requests in CORS

The article explains why CORS distinguishes between simple requests—limited to GET, HEAD, POST with specific headers and content types—and preflighted requests, describing the server‑side rationale, the mechanics of preflight, and why avoiding preflight for simple requests simplifies cross‑origin interactions.

CORSHTTPSimple Request
0 likes · 6 min read
Understanding Simple and Preflight Requests in CORS
Architect's Tech Stack
Architect's Tech Stack
Aug 19, 2019 · Information Security

Understanding Single Sign‑On (SSO) Mechanism and Its Java Implementation

This article explains the stateless nature of HTTP, the session mechanism used for single‑system login, the challenges of multi‑system applications, and how Single Sign‑On (SSO) solves them by introducing a central authentication server, token‑based authorization, and coordinated logout, with concrete Java code examples.

SSOSession ManagementWeb Security
0 likes · 15 min read
Understanding Single Sign‑On (SSO) Mechanism and Its Java Implementation
Programmer DD
Programmer DD
Jul 10, 2019 · Information Security

Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps

This article explains how traditional session‑cookie authentication creates scalability, security, and deployment challenges in front‑end/back‑end separated web applications, and how JSON Web Tokens (JWT) provide a compact, self‑contained, stateless solution while also outlining their advantages and limitations.

JWTSessionToken
0 likes · 7 min read
Why JWT Is the Modern Alternative to Session Cookies for Secure Web Apps
21CTO
21CTO
Jul 6, 2019 · Information Security

How to Secure Mobile Web Campaign Pages Against Bot Attacks

This article examines the security challenges of mobile web marketing pages, explains how bot-driven API abuse harms users and businesses, and presents a comprehensive solution involving front‑end behavior tracking, risk‑control services, token‑based HTTPS communication, data encryption, and JavaScript obfuscation to protect against automated attacks.

Web Securitydata encryptionhuman verification
0 likes · 16 min read
How to Secure Mobile Web Campaign Pages Against Bot Attacks
21CTO
21CTO
Jul 3, 2019 · Information Security

How HTTPS Secures Your Connection: From TCP Handshake to TLS Encryption

HTTPS combines HTTP with SSL/TLS encryption to protect data transmission, involving DNS lookup, TCP three‑way handshake, TLS negotiation with certificates and symmetric keys, and finally encrypted HTTP communication, while the article also explains TCP’s four‑way termination and the overall request‑response flow.

TCP handshakeTLSWeb Security
0 likes · 7 min read
How HTTPS Secures Your Connection: From TCP Handshake to TLS Encryption
21CTO
21CTO
Jun 5, 2019 · Information Security

How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation

This article explains the security challenges of mobile web activity pages in e‑commerce, outlines a risk‑control workflow that includes human‑verification algorithms, token‑based communication protection, data encryption, and front‑end code obfuscation, and provides a step‑by‑step technical solution to mitigate abuse and improve user experience.

BackendWeb Securityhuman verification
0 likes · 16 min read
How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation
21CTO
21CTO
May 9, 2019 · Information Security

Why HTTPS Matters: Encryption, Certificates, and Handshake Explained

HTTPS secures web communication by combining symmetric and asymmetric encryption, digital certificates, and signatures, addressing HTTP’s confidentiality, integrity, and authenticity flaws; the article explains these cryptographic concepts, the SSL/TLS handshake steps, and when HTTPS is appropriate despite its performance overhead.

HTTPSTLSWeb Security
0 likes · 12 min read
Why HTTPS Matters: Encryption, Certificates, and Handshake Explained
Meituan Technology Team
Meituan Technology Team
Mar 7, 2019 · Information Security

Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies

To protect mobile web activity pages such as coupons and lotteries, the article proposes a layered security approach that combines professional risk‑control services, custom human‑verification logs, token‑based HTTPS signing, data encryption, and aggressive front‑end JavaScript obfuscation to block automated abuse while preserving user experience.

TokenWeb Securityencryption
0 likes · 16 min read
Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies
Zhongtong Tech
Zhongtong Tech
Jan 11, 2019 · Information Security

How Hunter Automates Web Security Scanning in CI/CD Pipelines

This article explains how the Hunter system integrates automated web vulnerability scanning—including black‑box testing, browser‑extension traffic capture, and distributed analysis engines—into CI/CD workflows to detect security risks early, improve efficiency, and reduce manual effort.

Web Securitybrowser extensionci/cd
0 likes · 13 min read
How Hunter Automates Web Security Scanning in CI/CD Pipelines
Node Underground
Node Underground
Dec 23, 2018 · Information Security

Stop Phishing via target=_blank: Secure Links with rel=noopener & noreferrer

This article explains how using target="_blank" on links can expose pages to phishing attacks via the opener object, compares same‑origin and cross‑origin behaviors, and provides practical mitigation techniques such as Referrer‑Policy, rel="noreferrer" and rel="noopener" with fallback JavaScript.

Cross-OriginWeb Securityopener
0 likes · 9 min read
Stop Phishing via target=_blank: Secure Links with rel=noopener & noreferrer
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 14, 2018 · Information Security

Database Injection Attacks: Principles, Exploits, and Defense Strategies

This article explains why database injection remains a critical security threat, illustrates how attackers exploit vulnerable web applications using manual techniques and automated tools such as sqlmap, and provides comprehensive defensive measures spanning secure coding, database hardening, web‑server configuration, WAF deployment, and log‑analysis to protect sensitive data.

Database SecuritySQL injectionSQLMap
0 likes · 17 min read
Database Injection Attacks: Principles, Exploits, and Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Dec 9, 2018 · Information Security

How to Identify a Django-Powered Site During Penetration Testing

This guide outlines practical techniques—ranging from analyzing debug‑mode error pages and hidden CSRF tokens to inspecting admin static files and third‑party module footprints—to reliably fingerprint Django‑based web applications during black‑box security assessments.

Backend detectionDjangoFramework fingerprinting
0 likes · 6 min read
How to Identify a Django-Powered Site During Penetration Testing
Efficient Ops
Efficient Ops
Oct 23, 2018 · Information Security

Why HTTPS Matters: Performance, Security, and the Cryptography Behind It

This article explains why HTTPS is essential by comparing HTTP’s performance drawbacks, detailing its security vulnerabilities, and describing the cryptographic mechanisms—including TLS, symmetric and asymmetric encryption, certificates, and HMAC—that HTTPS employs to protect data and enable modern features like HTTP/2.

HTTP/2HTTPSTLS
0 likes · 7 min read
Why HTTPS Matters: Performance, Security, and the Cryptography Behind It
Qunar Tech Salon
Qunar Tech Salon
Oct 19, 2018 · Information Security

CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies

This article explains the background and risks of Cross‑Site Request Forgery (CSRF) attacks, illustrates real‑world exploitation scenarios, and provides comprehensive defense techniques such as origin/referrer checks, CSRF tokens, double‑cookie verification, SameSite cookies, and best practices for developers and security teams.

CSRFCSRF tokenCross-Site Request Forgery
0 likes · 31 min read
CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies
Qunar Tech Salon
Qunar Tech Salon
Oct 18, 2018 · Information Security

XSS Attacks: Introduction, Classification, Prevention, and Detection

This article explains the fundamentals of Cross‑Site Scripting (XSS) attacks, presents real‑world examples, classifies stored, reflected, and DOM‑based XSS, and provides comprehensive prevention, detection, and mitigation techniques for frontend developers, including proper escaping, whitelist schemes, CSP, and secure coding practices.

CSPWeb SecurityXSS
0 likes · 27 min read
XSS Attacks: Introduction, Classification, Prevention, and Detection
Meituan Technology Team
Meituan Technology Team
Oct 11, 2018 · Information Security

Understanding CSRF Attacks and Prevention Strategies in Front-End Development

CSRF attacks trick a logged‑in user’s browser into sending authenticated requests to a target site, enabling unauthorized actions, so front‑end developers must mitigate them by enforcing same‑origin checks, using anti‑CSRF tokens or double‑cookie verification, and configuring SameSite cookie attributes to block cross‑site requests.

CSRFCross-Site Request ForgerySameSite Cookie
0 likes · 33 min read
Understanding CSRF Attacks and Prevention Strategies in Front-End Development
21CTO
21CTO
Sep 8, 2018 · Information Security

Why Google Wants to Ditch Traditional URLs – The Security and Usability Battle

Google is exploring a radical overhaul of URLs to improve readability, mobile usability, and security, citing issues with long, obfuscated links that hinder user trust and enable phishing, while Chrome engineers discuss potential UI changes and the challenges of transforming this decades‑old web standard.

ChromeGoogleURL redesign
0 likes · 7 min read
Why Google Wants to Ditch Traditional URLs – The Security and Usability Battle
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Aug 1, 2018 · Information Security

Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More

This article dispels seven widespread HTTPS misconceptions—from caching and certificate costs to speed and IP requirements—explaining how browsers handle secure caching, affordable SSL options, wildcard certificates, migration steps, performance impacts, and why HTTPS is essential beyond login pages.

HTTPSSSLWeb Security
0 likes · 7 min read
Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More
MaGe Linux Operations
MaGe Linux Operations
Jul 31, 2018 · Information Security

How to Detect and Bypass Web Application Firewalls with Python

This article explains how penetration testers can identify and bypass signature‑based Web Application Firewalls using Python, covering WAF fundamentals, payload creation, detection of common firewalls like Mod_Security, and techniques such as brute‑force payload testing and HTML entity encoding to evade filters.

WAF detectionWeb Securitypenetration testing
0 likes · 10 min read
How to Detect and Bypass Web Application Firewalls with Python
Qunar Tech Salon
Qunar Tech Salon
Jul 26, 2018 · Information Security

Understanding Anti‑Crawling: Definitions, Current Landscape, Classifications, and Strategic Insights

The article explains anti‑crawling concepts, current challenges, classification of techniques (client‑side, middle‑layer, server‑side, real‑time vs. non‑real‑time), and argues for a systematic, platform‑driven approach to continuously adapt strategies against evolving web scrapers.

Web Securityanti‑crawlingplatform
0 likes · 8 min read
Understanding Anti‑Crawling: Definitions, Current Landscape, Classifications, and Strategic Insights
Java Backend Technology
Java Backend Technology
May 13, 2018 · Information Security

Why HTTP Is Insecure and How to Defend Against Common Web Attacks

This article explains why plain‑HTTP traffic is vulnerable, outlines encryption tricks, describes file‑path traversal, DNS spoofing, proxy risks, HTTP error codes, POST data formats, cookie security, CSRF, XSS, JSONP, and CORS, and provides practical mitigation techniques for each threat.

CORSCSRFCookie
0 likes · 17 min read
Why HTTP Is Insecure and How to Defend Against Common Web Attacks
JD Tech
JD Tech
Apr 25, 2018 · Information Security

Security Risks of Third‑Party CSS and JavaScript in Web Development

The article explains how importing third‑party images, scripts, and especially CSS can be abused to steal data, manipulate page content, hide elements, perform keylogging, trigger unwanted requests, and ultimately compromise user security, urging developers to trust only verified resources.

CSS securityWeb Securityfrontend
0 likes · 8 min read
Security Risks of Third‑Party CSS and JavaScript in Web Development
Programmer DD
Programmer DD
Apr 18, 2018 · Information Security

Mastering JWT-Based User Authentication: An 8‑Step Guide

This article walks through an eight‑step JWT authentication flow, explaining how to securely transmit user IDs via cookies, verify tokens on each request, compare JWT with traditional session storage, and configure domain‑wide cookies for single sign‑on across subdomains.

AuthenticationCookieJWT
0 likes · 7 min read
Mastering JWT-Based User Authentication: An 8‑Step Guide
360 Quality & Efficiency
360 Quality & Efficiency
Apr 13, 2018 · Information Security

Common Web Application Vulnerabilities and Their Attack Methods

This article introduces the most common web application vulnerabilities—including SQL injection, XSS, CSRF, file upload, file inclusion, clickjacking, and URL redirect—explaining how attackers exploit them and the potential impacts on websites and their users.

CSRFSQL injectionWeb Security
0 likes · 8 min read
Common Web Application Vulnerabilities and Their Attack Methods
Efficient Ops
Efficient Ops
Mar 20, 2018 · Information Security

Why HTTPS Matters: 9 Key Questions Answered

This article explains the fundamentals of HTTPS, covering why encryption is needed, how symmetric and asymmetric cryptography work together, the role of certificates and public‑key infrastructure, and the performance impact of the TLS handshake, all through a concise Q&A format.

HTTPSSSLTLS
0 likes · 11 min read
Why HTTPS Matters: 9 Key Questions Answered
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Mar 11, 2018 · Information Security

Understanding CSRF Attacks: Risks, Detection, and Defense Strategies

This article explains what CSRF (Cross‑Site Request Forgery) is, illustrates its attack model, details the potential damages, walks through the attack process with examples, and outlines practical detection methods and multiple defense techniques including token‑based protection and referer checks.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 13 min read
Understanding CSRF Attacks: Risks, Detection, and Defense Strategies
Youzan Coder
Youzan Coder
Mar 9, 2018 · Information Security

Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations

The guide details how a SaaS platform can transition to full‑site HTTPS by explaining the TLS handshake, inventorying static assets, domains and third‑party services, using protocol‑relative URLs, configuring redirects and CSP, testing securely, and addressing common migration challenges such as legacy references and external dependencies.

CDNContent Security PolicyHTTPS
0 likes · 13 min read
Migrating a SaaS Platform to Full‑Site HTTPS: Principles, Resources, and Practical Considerations
ITPUB
ITPUB
Feb 25, 2018 · Information Security

How CSRF Attacks Exploit Cookies and How to Defend Against Them

This article explains the mechanics of Cross‑Site Request Forgery (CSRF) attacks—including a step‑by‑step example of password‑change exploitation—lists the four essential conditions for a successful CSRF, introduces the related Server‑Side Request Forgery (SSRF) threat, and provides practical mitigation strategies for both vulnerabilities.

Attack MitigationCSRFCross-Site Request Forgery
0 likes · 9 min read
How CSRF Attacks Exploit Cookies and How to Defend Against Them
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Feb 10, 2018 · Frontend Development

Mastering CORS: How to Fix Cross‑Origin Errors in Your Web Apps

This article explains what CORS is, why browsers enforce same‑origin policies, details the essential HTTP headers involved, and offers practical solutions—including server‑side configuration, temporary browser work‑arounds, and proxy setups—to resolve cross‑origin request errors.

CORSCross-OriginWeb Security
0 likes · 7 min read
Mastering CORS: How to Fix Cross‑Origin Errors in Your Web Apps
Programmer DD
Programmer DD
Jan 2, 2018 · Information Security

Understanding Spring Security Architecture: Authentication, Authorization, and Filter Chains

This guide provides a deep dive into Spring Security's architecture, explaining how authentication and authorization are separated, how the AuthenticationManager and AccessDecisionManager work, how web filter chains are organized, and how to apply method‑level security and thread‑local context handling in Java applications.

AuthenticationAuthorizationFilter Chain
0 likes · 17 min read
Understanding Spring Security Architecture: Authentication, Authorization, and Filter Chains
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Dec 28, 2017 · Information Security

How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic

This article demystifies HTTPS by explaining its underlying encryption, signing, and certificate mechanisms, illustrating how zero‑knowledge proof concepts secure identity verification, and providing practical guidance on upgrading from HTTP, configuring certificates, capturing traffic with Fiddler, and understanding session recovery and performance considerations.

CertificateFiddlerHTTPS
0 likes · 11 min read
How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic
Qunar Tech Salon
Qunar Tech Salon
Dec 5, 2017 · Information Security

Machine Learning Practices for Web Attack Detection at Ctrip

This article describes Ctrip’s evolution from rule‑based web attack detection to a Spark‑powered machine‑learning system, detailing the Nile architecture, data collection, feature engineering with TF‑IDF, model training, evaluation metrics, online deployment, and future enhancements for information security.

Web Securityattack detectionbinary classification
0 likes · 17 min read
Machine Learning Practices for Web Attack Detection at Ctrip
Ctrip Technology
Ctrip Technology
Nov 30, 2017 · Information Security

Machine Learning Practices for Web Attack Detection in Ctrip's Nile System

This article describes how Ctrip's security team replaced rule‑based web attack detection with a Spark‑powered machine‑learning pipeline, detailing the system architecture, feature engineering using TF‑IDF, model training, evaluation, online deployment, and future enhancements to improve detection accuracy and performance.

PythonWeb Securityanomaly detection
0 likes · 17 min read
Machine Learning Practices for Web Attack Detection in Ctrip's Nile System
JavaScript
JavaScript
Oct 31, 2017 · Information Security

Understanding OWASP Top 10: Key Web Security Risks and Mitigation Strategies

The OWASP Top 10 project ranks the ten most critical web application security risks by analyzing threats, vulnerabilities, technical impact, and business consequences, offering developers, testers, and security teams actionable guidance to improve risk awareness and implement focused protection measures.

Application SecurityOWASPTop 10
0 likes · 2 min read
Understanding OWASP Top 10: Key Web Security Risks and Mitigation Strategies
ITPUB
ITPUB
Sep 4, 2017 · Information Security

How I Exploited Oracle Advanced Support to Run Remote SQL via Hidden JavaScript

During an external penetration test I discovered an Oracle Advanced Support service, reverse‑engineered its JavaScript endpoints, crafted GET and POST requests to create and execute named SQL statements, and ultimately extracted database version, user information, and password hashes, highlighting a critical web‑application flaw.

API abuseJavaScript analysisOracle
0 likes · 14 min read
How I Exploited Oracle Advanced Support to Run Remote SQL via Hidden JavaScript
Architecture Digest
Architecture Digest
Aug 11, 2017 · Information Security

Common Web Attacks and Their Mitigation Techniques

The article introduces major web security threats such as XSS, injection, CSRF, explains their mechanisms with examples, and presents defensive measures including input sanitization, HttpOnly cookies, web application firewalls, and encryption methods like hashing, symmetric and asymmetric cryptography.

CSRFSQL injectionWAF
0 likes · 10 min read
Common Web Attacks and Their Mitigation Techniques
21CTO
21CTO
Jul 23, 2017 · Information Security

How to Deploy Free HTTPS with Go and Let’s Encrypt (Step‑by‑Step Guide)

This article explains why HTTPS is essential, compares third‑party and self‑managed TLS options, and provides a complete Go implementation using Let’s Encrypt’s autocert library, including code for certificate handling, HTTP‑to‑HTTPS redirection, DNS requirements, and caching strategies.

GoHTTPSLet’s Encrypt
0 likes · 11 min read
How to Deploy Free HTTPS with Go and Let’s Encrypt (Step‑by‑Step Guide)
dbaplus Community
dbaplus Community
Jul 19, 2017 · Information Security

How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment

This guide explains why plain HTTP is insecure, introduces SSL/TLS fundamentals, compares certificate types, and provides step‑by‑step instructions for configuring HTTPS on a web server (including Nginx redirects), while highlighting performance impacts and testing considerations.

HTTPSNginxSSL
0 likes · 9 min read
How HTTPS Secures Web Traffic: From SSL Basics to Nginx Deployment
Ctrip Technology
Ctrip Technology
Jul 6, 2017 · Information Security

Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project

This article describes Ctrip's automated web vulnerability detection system, detailing the shift from active to passive scanning, the distributed architecture using traffic mirroring, message queues, Redis, and MySQL, and the processes for data collection, de‑duplication, scanning, and vulnerability management.

CtripWeb Securitydistributed architecture
0 likes · 8 min read
Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project
Qunar Tech Salon
Qunar Tech Salon
Jun 6, 2017 · Information Security

Same‑Origin Policy and Cross‑Origin Techniques in Web Development

This article explains the fundamentals of the browser same‑origin policy, defines what constitutes an origin, describes the restrictions it imposes, and surveys practical cross‑origin solutions such as dynamic tags, JSONP, CORS, postMessage, document.domain, window.name, fetch, and WebSocket.

CORSCross-OriginWeb Security
0 likes · 15 min read
Same‑Origin Policy and Cross‑Origin Techniques in Web Development
Ctrip Technology
Ctrip Technology
Jun 5, 2017 · Information Security

Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0

This article recounts the development of Ctrip's graphical captcha system, describing its early .NET‑based implementation, the challenges encountered such as uniform difficulty, limited data collection, and poor user experience, and how successive redesigns—including multilingual support, adaptive difficulty, and slider‑plus‑character selection—balanced security and usability.

AuthenticationCaptchaUser experience
0 likes · 14 min read
Evolution of Ctrip's Graphical Captcha Service: From 1.0 to 2.0
JD Retail Technology
JD Retail Technology
May 11, 2017 · Information Security

Unmanned Customer Service System Architecture and Security Testing Overview

This article explains the concept and architecture of an unmanned customer service system, outlines its security testing strategy—including interface, vulnerability scanning, privilege and data protection tests—describes database and web security methods, and provides practical command examples and tool recommendations.

SQLMapWeb Securityinformation security
0 likes · 14 min read
Unmanned Customer Service System Architecture and Security Testing Overview
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Apr 9, 2017 · Information Security

Why Front‑End and Back‑End Security Must Work Together

The article reexamines web security as a holistic system, explaining attack goals, targets, and methods across browsers, transport channels, and servers, and shows how coordinated front‑end and back‑end defenses such as encryption, signing, and input validation are essential to protect the whole web stack.

BackendWeb Securityattack vectors
0 likes · 13 min read
Why Front‑End and Back‑End Security Must Work Together