This article focuses on the general principles of "software" and "service. From "How to Protect Privacy: How does a browser cause privacy leakage", we have learned several reasons for the browser's privacy leakage. How can we protect privacy? This
Read Cookie string method:
Copy Code code as follows:
A Web site's cookie string contains all the cookies (JavaScript-accessible, not-httponly cookies) under the site's domain name, separated by semicolons
How to read a cookie string:
Copy codeThe Code is as follows:
alert(document.cookie);
The cookie string of a website contains all the cookies under the website domain name (javascript accessible, excluding httponly cookies). Multiple cookies are
First, disable third-party cookies.
Third-party cookies from firefox22 will be disabled by default, which is a major improvement in network privacy protection. Currently, the latest version of the release branch is firefox19.0.2, which is still
Different from JS Cross-domain, IFrame Cross-domain, and other common processing methods, can also use P3P to achieve cross-domain.What's P3P?P3P (Platform for privacy Preferences) is a privacy protection recommendation published by the Consortium
Google Hacking originally refers to the technology and behavior that uses Google search engine search information for intrusion. Currently, it refers to the technology and behavior that uses various search engine search information for intrusion.
Web development often needs to face cross-domain issues, the root cause of cross-domain issues is browser security in the same-origin policy, for example, for http://www.a.com/1.html:
The http://www.a.com/2.html is homologous;
How can we protect personal data faster and more effectively without the preparation of specialized software? Today, based on my experience and usage by others, I will talk about how to protect my privacy and important files with "bare hands"
Web development often requires cross-domain problems, and the root cause of cross-domain problems is the same homology strategy in browser security, for example, for http://www.a.com/1.html:
The 1.http://www.a.com/2.html are
Web development often requires cross-domain problems, and the root cause of cross-domain problems is the same homology strategy in browser security, for example, for http://www.a.com/1.html: The http://www.a.com/2.html are
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.