Tag

browser security

1 views collected around this technical thread.

Linux Ops Smart Journey
Linux Ops Smart Journey
May 22, 2025 · Information Security

How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows

This guide explains why browsers show “not secure” warnings, why self‑signed certificates are a cost‑effective solution for small‑to‑medium businesses, and provides step‑by‑step instructions—including MMC configuration and certificate import—to remove those warnings without purchasing commercial SSL certificates.

HTTPSWindows MMCbrowser security
0 likes · 5 min read
How to Eliminate Browser “Not Secure” Warnings with Self‑Signed Certificates on Windows
Top Architect
Top Architect
Nov 26, 2024 · Information Security

Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics

This article explains the same‑origin policy, its role in protecting browsers from XSS, CSRF and other attacks, illustrates how origins are defined with protocol, host and port, and details how CORS, simple requests and preflight requests enable controlled cross‑origin communication.

CORSCross-Origin RequestsPreflight
0 likes · 15 min read
Understanding Same-Origin Policy and CORS: Core Concepts, Simple Requests, and Preflight Mechanics
Cognitive Technology Team
Cognitive Technology Team
Nov 11, 2024 · Frontend Development

Why WebAssembly Will Succeed Where Java Applet Failed

The article explains how WebAssembly’s mature community, stronger security sandbox, superior performance, and open‑source governance differentiate it from the outdated Java Applet, positioning Wasm for rapid growth and broader adoption in modern browsers.

CommunityJava AppletWebAssembly
0 likes · 6 min read
Why WebAssembly Will Succeed Where Java Applet Failed
Java Tech Enthusiast
Java Tech Enthusiast
Jan 10, 2024 · Information Security

Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained

Cross-Origin Resource Sharing (CORS) extends the Same-Origin Policy by permitting controlled cross‑origin requests through simple and preflight flows, using specific headers and credential rules, thereby balancing web security against threats like XSS, CSRF, and injection attacks while enabling safe resource sharing.

CORBCORSCross-Origin Requests
0 likes · 10 min read
Cross-Origin Resource Sharing (CORS) and Same-Origin Policy Explained
Architect's Guide
Architect's Guide
Jan 6, 2024 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the same‑origin policy, its role in protecting web applications, how browsers enforce it through DOM, web‑data, and network restrictions, and how Cross‑Origin Resource Sharing (CORS) and preflight requests enable controlled cross‑origin communication while maintaining security.

CORSCross-OriginSame-Origin Policy
0 likes · 12 min read
Understanding Same-Origin Policy and CORS in Web Development
Top Architect
Top Architect
Oct 16, 2023 · Information Security

Understanding Same‑Origin Policy and CORS: Security Strategies for Web Applications

This article explains the fundamentals of the browser Same‑Origin Policy, the security risks it mitigates, and how Cross‑Origin Resource Sharing (CORS) with simple and preflight requests enables controlled cross‑domain communication while protecting user data.

CORSCross-OriginSame-Origin Policy
0 likes · 15 min read
Understanding Same‑Origin Policy and CORS: Security Strategies for Web Applications
Code Ape Tech Column
Code Ape Tech Column
Sep 28, 2023 · Information Security

Understanding Same-Origin Policy and CORS in Web Development

This article explains the browser's Same-Origin Policy, its impact on DOM, data, and network access, and how Cross-Origin Resource Sharing (CORS) and preflight requests enable controlled cross-origin communication while preserving security.

CORSCross-Origin RequestsSame-Origin Policy
0 likes · 11 min read
Understanding Same-Origin Policy and CORS in Web Development
IT Services Circle
IT Services Circle
Mar 29, 2022 · Information Security

Understanding Third‑Party Cookies, SameParty, and Chrome's CHIPS Partitioned Cookies

The article explains how third‑party cookies enable cross‑site tracking, why browsers are deprecating them, introduces the SameParty attribute as a partial mitigation, and details Chrome's CHIPS proposal with partitioned cookies that isolate cookie storage per top‑level site to protect user privacy.

CHIPSSamePartybrowser security
0 likes · 6 min read
Understanding Third‑Party Cookies, SameParty, and Chrome's CHIPS Partitioned Cookies
Sohu Tech Products
Sohu Tech Products
Mar 2, 2022 · Information Security

Understanding the Spectre Vulnerability and Browser Mitigations

This article explains the Spectre hardware side‑channel vulnerability, its exploitation via speculative execution and cache timing, demonstrates simple JavaScript attacks, and reviews various browser mitigation strategies such as cache‑control headers, disabling high‑resolution timers, COOP, COEP, and CORB to reduce attack surface.

MitigationsSide-channelSpectre
0 likes · 15 min read
Understanding the Spectre Vulnerability and Browser Mitigations
IT Services Circle
IT Services Circle
Mar 2, 2022 · Information Security

Understanding Spectre: Speculative Execution, Side‑Channel Attacks, and Browser Mitigations

This article explains the Spectre hardware vulnerability, how it leverages speculative execution and side‑channel attacks to read arbitrary memory, and reviews the browser‑level defenses such as cache policies, timer reduction, rel="noopener", COOP, COEP and CORB that aim to mitigate its impact.

COEPCOOPSide-Channel Attack
0 likes · 15 min read
Understanding Spectre: Speculative Execution, Side‑Channel Attacks, and Browser Mitigations
Fulu Network R&D Team
Fulu Network R&D Team
Oct 27, 2020 · Information Security

Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications

This article explains the purpose, possible values, and security impact of the Sec-Fetch request headers introduced by the Fetch Metadata specification, showing how browsers automatically add them, how servers can use them to filter illegal requests, and providing practical policy examples and code snippets.

CSRF ProtectionFetch MetadataSec-Fetch
0 likes · 9 min read
Understanding Fetch Metadata Request Headers (Sec-Fetch-*) and Their Security Implications
Efficient Ops
Efficient Ops
Dec 11, 2019 · Information Security

Why HTTPS Certificate Revocation Still Fails: CRL, OCSP, and Modern Browser Challenges

This article explores how HTTPS certificates are validated, why revocation mechanisms like CRL and OCSP often fall short, compares browser implementations, and discusses practical mitigation techniques such as OCSP stapling and Must‑Staple to improve TLS security.

CRLHTTPSOCSP
0 likes · 19 min read
Why HTTPS Certificate Revocation Still Fails: CRL, OCSP, and Modern Browser Challenges
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Certificate AuthorityHTTPSPublic Key Encryption
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue