Article on the subject of "http protocol"

  • Web14: Security issues in the HTTP protocol

    Web14: Security issues in the HTTP protocol

    we invite you to join tipsmake.com to learn about security issues in the http protocol.
  • How HTTP works

    How HTTP works

    hypertext transfer protocol (http) provides a network protocol standard that web browsers and servers use to communicate. you see http every day because when you visit a website, the protocol is written right in the url.
  • Websites that use HTTP protocol will have to switch to HTTPS if they do not want to 'leak' and 'blacklist' Google

    Websites that use HTTP protocol will have to switch to HTTPS if they do not want to 'leak' and 'blacklist' Google

    google has announced that websites that are using the http protocol will be listed on the company's non-secure list and have to switch to https.
  • How HTTP works

    How HTTP works

    hypertext transfer protocol (http) provides a network protocol standard that web browsers and servers use to communicate. you see http every day because when you visit a website, the protocol is written right in the url.
  • What is HTTP

    What is HTTP

    http is an application-level protocol for distribution, collaboration, multimedia information systems, which is the foundation for data communication for www (eg internet) since 1990. http is a common protocol and stateless that can be used for other purposes as well as the scaling of request
  • MQTT and HTTP: Which protocol is better in the IoT era?

    MQTT and HTTP: Which protocol is better in the IoT era?

    the hypertext transfer protocol (http) has always been the most popular communication tool between client and web server. but is it still suitable for the internet of things era?
  • 5 ways to improve website speed with HTTP / 2

    5 ways to improve website speed with HTTP / 2

    hypertext transfer protocol version 2 (hypertext transfer protocol version 2) or http / 2 is the latest http standard. updates to this protocol will improve the speed, performance and security of web traffic.
  • Caching in HTTP

    Caching in HTTP

    http is typically used for distributed information systems, where performance can be enhanced by using cached feedback. the http / 1.1 protocol includes several elements that are intended to perform caching tasks.
  • Warning: Vulnerability in Windows' HTTP Protocol Stack attacks remote code execution, no authentication required

    Warning: Vulnerability in Windows' HTTP Protocol Stack attacks remote code execution, no authentication required

    recently, the ncsc cybersecurity monitoring center recorded an exploit code for a critical security vulnerability cve-2022-21907 in windows' http protocol stack.
  • Web14: Security issues in the HTTP protocol

    Web14: Security issues in the HTTP protocol

    we invite you to join tipsmake.com to learn about security issues in the http protocol.
  • Parameters in HTTP

    Parameters in HTTP

    this chapter lists some of the http protocol parameters and their syntax by which they are used in communication.
  • Things you should know about HTTP / 2 protocol

    Things you should know about HTTP / 2 protocol

    the http version we are using today is http / 1.1, which has been around since 1999, and will soon be replaced by a newer standard, http / 2. this update promises to improve the way browsers and servers communicate with each other, thereby providing faster data transfer speeds while minimizing the
  • Message in HTTP

    Message in HTTP

    http is built on the basis of the client-server structure model and stateless request / response protocol, which is governed by the exchange of messages (message) along a tcp / ip connection.
  • Websites that use HTTP protocol will have to switch to HTTPS if they do not want to 'leak' and 'blacklist' Google

    Websites that use HTTP protocol will have to switch to HTTPS if they do not want to 'leak' and 'blacklist' Google

    google has announced that websites that are using the http protocol will be listed on the company's non-secure list and have to switch to https.
  • Popular network protocols today

    Popular network protocols today

    there are many protocols while establishing a connection on the internet. based on the type of connection to be established, the protocols used are also varied. these protocols define the characteristics of the connection.
  • Security in HTTP

    Security in HTTP

    http is used for communication over the internet, so application programmers, information providers, and users should be aware of the protection limitations in http / 1.1.
  • Request (HTTP) in HTTP

    Request (HTTP) in HTTP

    a client sends an http request to a server in the form a request message that includes the following format.
  • What is HTTP Flood?

    What is HTTP Flood?

    http floods are a type of ddos attack in which an attacker exploits seemingly legitimate http get or post requests to attack a web server or application.
  • Response (Response) in HTTP

    Response (Response) in HTTP

    after receiving and interpreting a request message, a server sends a response signal with an http response message.
  • Encrypt status in HTTP

    Encrypt status in HTTP

    the status-code element is a 3-character integer, in which the first character of the status encoding defines the response type and the last two characters do not have any sorting role. there are 5 values ​​of the first character.
  • Full list of HTTP status codes, HTTP Status Code

    Full list of HTTP status codes, HTTP Status Code

    the http status line is the term given to the http status code (real code) when accompanied by the 'http reason phrase' - the term for the reason (short description).
  • Example of Message in HTTP

    Example of Message in HTTP

    some examples of message in http make it easier for users to visualize.
  • What is HTTP Authentication? 5 Stages of HTTP Authentication

    What is HTTP Authentication? 5 Stages of HTTP Authentication

    http authentication is a security mechanism that helps verify the identity of users when they access web resources.