Develop SSL online tools step by step
- SSL online tools (completed) : www.ssleye.com, including symmetric encryption algorithms, asymmetric encryption algorithms, certificate-related tools, and SSL detection. - SSL vulnerability online detection tool (completed), website: scan.ssleye.com, supports nine kinds of SSL vulnerability online detection, each vulnerability detection item corresponds to CVE, and more detection items will be added later...
What exactly is Https? (Https encryption process full resolution)
S stands for security, HTTPS is not a separate protocol HTTP is not a separate protocol, it's just that HTTP is built on top of SSL. 1. Define HTTP over SSL/TLS/Secure SSL
Show you different HTTPS
HTTPS is not a protocol, and generally speaking, if we say we use HTTPS, we mean we use TLS over HTTP. TLS is not actually a protocol specifically designed to serve HTTP. The reason why I emphasize this kind of hierarchical concept is that the boundary and concept of knowledge need to be clearly demarcated. Only when encountering problems can we know where the breakthrough is. I see most of the information about HTTP...
HTTPS how to ensure the security of data transmission
As we all know, in the process of data transmission between the client and server, HTTP protocol transmission is not secure, that is, HTTP is generally transmitted in plain text. However, HTTPS data transmission is secure, that is, HTTPS data transmission is encrypted. Here, I'll walk you through how HTTPS encrypts data to ensure security. Let's start with the client...
The evolution of HTTP to HTTPS
The transmission is civilized. The content could be eavesdropped. The integrity of the plaintext cannot be proved, so it may be tampered with. All of the above are problems with protocols without encryption. HTTP itself has no encryption mechanism, but we can use SSL. Establish secure communication lines. HTTP packets...
Illustrated HTTP reading Abstract
1. Understand the Web and Networking Basics Common networks, including the Internet, operate on the basis of the TCP/IP protocol family, of which HTTP is a subset. It is divided into the following four layers: application layer, transport layer, network layer, and data link layer. Network layer: Used to process packets of data as they move across the network. This layer defines the path (the so-called transport path...
Some practical tips for GitHub
We've compiled 12 super useful github tips that you can definitely use at work and at school
HTTPS upgrade series (1) popular science work before the upgrade
Plaintext transfer relative to the HTTP protocol, transmission is encrypted HTTPS, can prevent the data during transmission by hackers malicious tampering and theft, effectively prevent the man-in-the-middle attack (this product in November had a man-in-the-middle attack by hackers, the web page is inserted some illegal content, leading to the access speed as the tortoise climb. HTTPS is... HTTPS is...
In-depth HTTPS security issues & connection setup process
HTTP is a plaintext transmission protocol. Data is not encrypted in the process of data interaction between the client and the server, and there is no authentication verification between the communication parties. Therefore, it is easy to be hijacked, monitored and tampered with. When Lao Wang (client) wants to send a letter to Lao Li (server), many couriers handle the letter in the mailing process, which leads to a large number of couriers can view the letter content (content is clear, so it can be viewed), if the letter...
Trust issues with third-party SDKS
Third-party SDKS are often easily modified when you download them! Using a simple man-in-the-middle attack, anyone on the same network can insert the virus code into the code base, which then enters your app and runs on your users' phones. Of the most popular closed source iOS SDKS, 31% of SDKS and 623 in CocoaPods...