Applications of Asymmetric Encryption Algorithms

Applications of Asymmetric Encryption Algorithms

In previous articles, we briefly discussed asymmetric encryption, which involves splitting a key into two parts: one part is kept private, known as the private key, while the other part can be publicly shared, known as the public key. The encryption algorithm ensures that data encrypted with one key can only be decrypted with the … Read more

Enabling HTTP/HTTPS Management Access and Ping Function on Huawei USG6331E via Command Line

Enabling HTTP/HTTPS Management Access and Ping Function on Huawei USG6331E via Command Line

The following is the method to enable HTTPS management access on the Huawei USG6331E via the command line: 1. Enter system view: In user view, input the command system-view to enter system view. 2. Enter management interface view: Assuming Vlanif1 is used as the management interface, input the command interface Vlanif 1 to enter the … Read more

Essential Knowledge of HTTP

Essential Knowledge of HTTP

This article is sponsored by Yugang Writing Platform with a sponsorship amount of 200 yuan. Original author: Zhu Qiandai. Copyright statement: This article is copyrighted by the WeChat public account Yugang Says. Unauthorized reproduction in any form is prohibited. HTTP is a network application layer protocol that we frequently interact with, and its importance cannot … Read more

Illustration of HTTPS One-Way and Two-Way Authentication

Illustration of HTTPS One-Way and Two-Way Authentication

1. Http HyperText Transfer Protocol, is the most widely used protocol on the Internet, a standard that all WWW files must follow. The data transmitted using the HTTP protocol is unencrypted, which means it is in plaintext, making it very insecure to transmit private information using the HTTP protocol. Uses TCP port: 80 2. Https … Read more

Common Default Port Numbers for HTTP, HTTPS, and More

Common Default Port Numbers for HTTP, HTTPS, and More

“Welcome to connect with Miss Heart Moon to learn about recent class opening” ⑴. Common port numbers for HTTP protocol proxy servers: 80/8080/3128/8081/9080⑵. Common port number for SOCKS protocol proxy servers: 1080⑶. Common port number for FTP (File Transfer) protocol proxy servers: 21⑷. Common port for Telnet (remote login) protocol proxy servers: 23 The default … Read more

Why Do Some Websites Start With ‘www’ While Others Start With ‘http://’

Why Do Some Websites Start With 'www' While Others Start With 'http://'

It is thought that www and http:// (https://) are independent, both existing in all URLs. Some websites start with http:// while others start with https://, but the latter may be hidden; you don’t need to input it, and it will appear automatically. Therefore, currently, most people can just enter www to access a website, but … Read more

Understanding HTTPS Encryption and Decryption

Understanding HTTPS Encryption and Decryption

Variety is the spice of life. Change is the spice of life. 1. Introduction to HTTP and HTTPS HTTPS = HTTP + SSL Similarities In most cases, HTTP and HTTPS are the same because they both use the same underlying protocol. As an HTTP or HTTPS client—browser—establishes a connection to the web server on a … Read more

Mastering HTTPS: Theory and Practice

Mastering HTTPS: Theory and Practice

1. Basic Concepts HTTP: is the most widely used network protocol on the Internet, serving as a standard for requests and responses between clients and servers. It is a protocol used to transfer hypertext from WWW servers to local browsers, making browsing more efficient and reducing network transmission. HTTPS: is a secure version of HTTP, … Read more

4 Solutions for Loading HTTP Resources on HTTPS Pages

4 Solutions for Loading HTTP Resources on HTTPS Pages

Source | https://www.fly63.com Switching to HTTPS may seem like a simple issue of domain pointing, perhaps we just need to redirect HTTP requests to the HTTPS address, and that would complete the switch. However, it’s not that simple. When an HTTPS address loads HTTP resources, the browser considers these resources insecure and will block them … Read more

Comprehensive Detection of HTTP, HTTPS, and Encrypted Webshells

1. Introduction Webshells are malicious scripts used by hackers to attack websites. Identifying webshell files or communication traffic can effectively prevent further attacks by hackers. Currently, the detection methods for webshells are mainly divided into three categories: static detection, dynamic detection, and log detection. Static detection analyzes webshell files and extracts their coding rules to … Read more