1. Conversation concept Session: A series of requests and corresponding processes that occur continuously between a browser client and a web server. A session contains multiple requests and responses. Problems to be solved by sessions: During the session between the browser and the server, each user will inevitably generate some data. The program needs to […]
Tag: session
Achieve multiple solutions for session sharing
Session sharing Why is there session sharing At present, most of the projects of Internet companies are built in a micro-service Huahe distributed environment. This will lead to a project being likely to be distributed and deployed in several or even many server clusters. At this time, a problem will arise. When a user has […]
Front-end authentication: cookie, session, token, jwt, single sign-on
Front-end authentication: cookie, session, token, jwt, single sign-on 1. Stateless HTTP protocol Stateless means that the protocol has no memory ability for transaction processing. The lack of state means that if the previous information is needed later, it must be retransmitted, which may result in a large amount of data transmitted per connection. The stateless […]
djiango ORM operation+COOKIE+SESSION+ORM offline script
Table of Contents 1.ORM 1.1 table structure 2.1 Connection database configuration 1. Connect to the default sqlite3 2. Connect to mysql 3. Connect to oracle 4. Connect to postgresql 5. Database connection pool 6. Connect multiple databases 3. 1 Database advancement (separation of reading and writing, sub-tables and sub-databases) 1. Separation of reading and writing […]
An article explains the difference between Token, Cookie and Session
Last week, we used jwt (Json Web Token) token, a no-session method, for user account verification for the first time within the team. We found that many articles on the Internet introduced token incorrectly, so we made some changes to cookies, sessions, and tokens. Let’s compare it (token in the article refers to jwt token) […]
[Session Technology] The workflow, differences and how to use Cookie and Session
Cookie Technology Web programs are transmitted through the HTTP protocol, and HTTP is a stateless protocol. When a client sends a request to the server, after the server returns a response, the connection is closed, and no connection information is retained on the server side. When the client sends multiple requests and requires the same […]
Cookie, Session, token, JWT, SSO
Start with status “HTTP Stateless” We know that HTTP is stateless. In other words, the HTTP requester and responder cannot maintain state, it is all one-time, and it does not know what happened in the previous and subsequent requests. But in some scenarios, we need to maintain state. The most typical example is that when […]
iOS uses NSURLSession to implement background upload and download
The basic logic of NSURLSession background upload is: first create a background mode NSURLSessionConfiguration, then create an NSURLSession through this configuration, then create the relevant NSURLSessionTask, and finally process the relevant proxy events. 1. Create NSURLSession – (NSURLSession *)backgroundURLSession { static NSURLSession *session = nil; static dispatch_once_t onceToken; dispatch_once( & amp;onceToken, ^{ NSURLSessionConfiguration* sessionConfig = […]
Golang WebSocket creates a separate session
Introduction In Internet applications, real-time communication is a very important feature. WebSocket is a TCP-based protocol that allows bidirectional communication between clients and servers. Golang is a high-performance programming language that provides native support for WebSocket, making it very simple to create WebSocket sessions in Golang. This article will introduce how to use Golang to […]
Web Penetration Testing-Testing Authentication and Session Management
Article directory **1. Burp Suite performs dictionary attack on login page** (1) Overview of Burp Suite (2) Summary of dictionary attack on login page by Burp Suite (3) Practical drills (4) Principle analysis **Second, Hydra forces a violent attack** (1)Hydra overview (2) Summary of Hydra’s forced brute force attack (3) Environmental preparation (4) Practical drills […]