Create a XMLHttpRequest ObjectAs with many DOM operations, creating a XHR object also has compatibility issues: IE6 and previous versions use ACTIVEXOBJECT,IE7 and other browsers XMLHttpRequestNot only does IE6 and its previous versions run XHR as a
Create a XMLHttpRequest ObjectAs with many DOM operations, creating a XHR object also has compatibility issues: IE6 and previous versions use ACTIVEXOBJECT,IE7 and other browsers XMLHttpRequestNot only does IE6 and its previous versions run XHR as a
RT. I checked a lot of information and found that the premise for differentiation is that the front end manually adds an x-requested-with field to the requestheader, but the native xhr does not include this header, therefore, if the front-end does
Rt. We've got a lot of information. The premise that can be differentiated is that the front-end manually adds a
x-requested-withfield to the request header, but the native XHR does not carry this head, so I want to ask
If the front end is not mated,
Ajax and Comet
Ajax (short for Asynchronous JavaScript + XML)You can request data from the server without detaching (refresh) the page to bring a better user experience.
The core of Ajax technology is the XMLHttpRequest object (XHR ).I.
I. Basic differences between get () and post ()1. Get is to add the parameter data queue to the URL referred to by the Action attribute of the submission form. The values correspond to each field in the form one by one and can be seen in the URL.
The response body types we receive can be in various forms, including String, ArrayBuffer, binary Blob, JSON, cirpt, and Document objects that represent XML documents. Next we will decode the response for different subject types.
The response body
IE5 is the first browser to introduce XHR objects. In IE5, the XHR object is implemented through an ActiveX object in the MSXML library. Therefore, you may encounter three different versions of XHR objects in IE, namely Msxml2.xmlhttp,
CSRF (Cross-site request forgery, also known as "one click attack" or session riding, usually abbreviated as CSRF or XSRF, is a type of malicious use of websites.
I. CSRF attack principles
The CSRF attack principle is relatively simple, as shown in 1
Basic =================================================== ======
1. the most classic problem is the cache problem in ie.
If get is used, a cache problem occurs in ie. The code is executed only once. The solution is to add a timestamp or random
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.