1,509 Results for:HTTP

  • Sort by: 

Idempotent HTTP methods and REST

By Cameron McKenzie 15 Sep 2023

The Hypertext Transport Protocol requires all HTTP verbs to identify as idempotent or not. But what is an idempotent method, and how does idempotence apply to RESTful API design? Read More

HTTP request methods explained

By Cameron McKenzie 21 Aug 2023

While there are almost 40 registered HTTP request methods, most RESTful web developers only use five of them. Here are the most important HTTP methods and examples of how to use them. Read More

'Rapid Reset' DDoS attacks exploiting HTTP/2 vulnerability

By Alexander Culafi 10 Oct 2023

Cloudflare said the Rapid Reset DDoS attack was three times larger than the attack it had on record. Google similarly called it 'the largest DDoS attack to date.' Read More

The 5 essential HTTP methods in RESTful API development

By Tom Nolle 25 Aug 2023

Review these five common RESTful API HTTP methods that developers need to know. Use this guide to understand the differences and uses for each of the methods. Read More

Apache HTTP Server vulnerability under active attack

By Shaun Nichols 06 Oct 2021

Security experts are urging administrators to update their installations of Apache HTTP Server following the disclosure of a zero-day vulnerability that had been under attack. Read More

Microsoft tackles three zero-days for October Patch Tuesday

By Tom Walat 10 Oct 2023

The company releases fixes for several products affected by the HTTP/2 "Rapid Reset" vulnerability to help curb widespread Distributed Denial-of-Service attacks. Read More

Use cURL and Wget to download network files from CLI

By Damon Garn 13 Oct 2023

Web browsers aren't the only tools that use HTTP to download files. Command-line tools, such as cURL and Wget, can download resources like VM images, configuration files and updates. Read More

How to mitigate an HTTP request smuggling vulnerability

By Mike Chapple 31 Jul 2020

Exploiting an HTTP request smuggling vulnerability can result in the inadvertent execution of unauthorized HTTP requests. Learn how to defend web environments from this attack. Read More

Tomcat vs. Apache HTTP Server: What's the difference?

By Cameron McKenzie 24 Oct 2019

Don't get caught up in the improper phrasing of "What's the difference between Tomcat and Apache?" Let's straighten out the confusion and compare the two server offerings. Read More

Why is preloading HTTP Strict Transport Security risky?

By Judith Myerson 13 Dec 2018

Despite being designed to improve security, infosec experts have warned against preloading the HSTS protocol. Learn about the risks of preloaded HSTS with Judith Myerson. Read More