Master Huawei Interview Questions: Understanding HTTP

Master Huawei Interview Questions: Understanding HTTP

Hello everyone, I am Feiying. The recruitment process at Huawei consists of one written test, three technical interviews, and one HR interview. Compared to other major internet companies, Huawei’s interview difficulty is generally lower. Today, I will share two classic questions encountered by a student during Huawei’s technical interview: Introduce the HTTP protocol and What … Read more

Summary of TCP/IP Network Protocols

Summary of TCP/IP Network Protocols

TCP/IP Model TCP and UDP Why TCP Requires Three-Way Handshake Why TCP Requires Four-Way Teardown The Process of a Web Page Requesting a URL How DNS Works Principle of HTTPS Encryption 1. TCP/IP Model Application Layer: Specifies the data format for application programs and handles specific application details. Transport Layer: Specifies ports for specific applications … Read more

Introduction and Use of Istio Fault Injection

Introduction and Use of Istio Fault Injection

When moving applications to the cloud, how can we do without containers! Click on the Container Cube above to follow me. Fault Injection Testing Fault injection testing, as the name suggests, checks whether the fault tolerance mechanism of an application works correctly when some components or functionalities of the tested application encounter potential failures, ensuring … Read more

Concepts Related to Encryption Algorithms in HTTPS

Concepts Related to Encryption Algorithms in HTTPS

Source: http://foofish.net/https-symmetric.html Author: _zhijun Before fully understanding HTTPS, it is necessary to clarify some concepts related to cryptography, such as: plaintext, ciphertext, cipher, key, symmetric encryption, asymmetric encryption, hash, digital signature, and digital certificate. — _zhijun Article Navigation –Cipher05% –Key11% –Plaintext/Ciphertext18% –Symmetric Key22% –Asymmetric Key36% –Digital Signature47% –Digital Certificate67% –References88% Cryptography is widely used in … Read more

Base64 Is Not An Encryption Algorithm

Base64 Is Not An Encryption Algorithm

What is Base64? Base64, as the name suggests, is a character set that includes lowercase letters a-z, uppercase letters A-Z, digits 0-9, and symbols “+” and “/”, totaling 64 characters (plus one “=”, making it actually 65 characters; the reason for the “=” will be explained later). Any symbol can be converted into a character … Read more

Mainflux IoT: A Lightweight Open Source IoT Platform

Mainflux IoT: A Lightweight Open Source IoT Platform

Follow the IoT Planet to track the dynamics of the Internet of Things! “IoT Planet” aligns with global industry trends, focusing on the integration of IoT and industry, and sharing technologies and applications related to IoT. Mainflux is a modern, scalable, and secure open-source IoT platform written in Go. It connects devices through various network … Read more

Concepts Related to Encryption Algorithms in HTTPS

Concepts Related to Encryption Algorithms in HTTPS

(Click the public account above to follow quickly) Author: Bole Online Column Author – Zhijun Link: http://blog.jobbole.com/107930/ Cryptography is widely used in computer science, and HTTPS is a secure communication protocol based on cryptography. HTTPS was first proposed by Netscape in 1994, and now, with the promotion by many Internet companies, HTTPS has been widely … Read more