|
You are here |
vanwilgenburg.wordpress.com | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The article explores edge cases of the Same-Origin Policy (SOP) in browser security, including its implications for cross-origin requests, CORS, and vulnerabilities in WebSocket and local web servers. | |
| | | | |
ionutbalosin.com
|
|
| | | | | [AI summary] The provided text is a comprehensive guide on implementing security measures in Java applications, focusing on authentication, authorization, and various HTTP security headers. It covers topics such as API security, token introspection, JSON Web Key Set (JWKS), Content Security Policy (CSP), Cross-Origin Resource Sharing (CORS), HTTP Strict Transport Security (HSTS), and other security headers like X-XSS-Protection, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy. The guide includes code snippets for configuring these security measures in a Java application and emphasizes the importance of using these headers to mitigate common web vulnerabilities and enhance application security. | |
| | | | |
dzone.com
|
|
| | | | | This post looks at Cross-Origin Resource Sharing (CORS) and the Same-Origin Policy to explore their impacts on app security, making security less restrictive. | |
| | | | |
seanmcp.com
|
|
| | | A brief journey into the dangerous world of user agent sniffing | ||