Search Results


9 matches found for 'http'

TCP/IP and HTTP - Part 1

A Very Brief History TCP/IP stands for Transmission Control Protocol / Internet Protocol. During the Cold War, in retaliation of the USSR's Sputnik, the U.S. Department of Defense (DoD) started ARPA, the Advanced Research Projects Agency.


Web Development 101

... How it works Let's imagine the following scenario: User logs in to a website (http://localhost:8080) by clicking on the Login Button Browser sends a POST request using HTML form action Server receives the POST request and generates a "Successful Login" response.


Heroku login on a proxy (Windows 7)

... For these two variables, enter your proxy address. Make sure you add the http:// prefix, or you might get an error when you try to login. Edit - Since Heroku only uses port 22 for SSH, we can use HTTP-Git and add the --http-git flag to our SSH remote commands.


NFT from a Software Developer's perspective

... exchanged with buyers A link to the digital asset metadata Can be untrustworthy and centralized http links, or a link to darknet services / P2P distributed storages (i.e. IPFS). What is it not? There are some misconceptions about NFTs.


Web Backend Security Headers -3. HSTS

Table of Contents Web Backend Security Headers CSP Headers CSRF Headers HSTS X-Frame-Options and X-XSS-Protection DNS records and SPF Background HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.


Design Concepts

In this article, I want to go over some fundamental design concepts that are useful for coming up with system design. Requirements Functional Requirements Describes specific behaviors i.e. If a URL is generated, it is composed of a Base64 encoded alias Non-functional Requirements Describes architectural requirements i.


Working with Production at Amazon Retail Website

... test various endpoints and give you useful metrics and error debugging, such as the count/rate of http response codes (e.g. 400 Bad Request, 401 Unauthorized, 403 Forbidden) Bake-in Step Although these steps should only be run after the deployment to each server in the cluster is successful, you may still want an extra delay or bake-in time before starting other steps (such as integration tests).


Forward Proxy and Reverse Proxy

Proxies have a wide variety of use cases with great benefits. In this article, I go over two variations of proxies. Forward Proxy One day, in a school classroom setting, a teacher wants an anonymous survey filled out by all of the students in the classroom.


Data stores in Software Architectures

... for updating or correcting the article, feel free to leave a comment! References [1]: https://journalofbigdata.springeropen.com/articles/10.1186/s40537-019-0262-8 [2]: https://medium.