HTTP$94536$ - definition. What is HTTP$94536$
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف

APPLICATION PROTOCOL FOR DISTRIBUTED, COLLABORATIVE, HYPERMEDIA INFORMATION SYSTEMS
Http; Http protocol; Hyper Text Transfer Protocol; HTTP request; Http://; Hypertext Transfer Protocol; HyperText Transfer Protocol; Http request; HTTP/1.1; Htttp; Http;; Http.; Request method; HTTP://; HTTP HEAD; HTTP GET; HTTP PUT; HTTP TRACE; HTTP OPTIONS; HTTP CONNECT; GET request; HEAD request; PUT request; DELETE request; TRACE request; OPTIONS request; CONNECT request; HTTP HEAD request; HTTP GET request; HTTP PUT request; HTTP DELETE request; HTTP TRACE request; HTTP OPTIONS request; HTTP CONNECT request; Hypertext transfer protocall; HTTP DELETE; HTTP Verbs; Hypertext Protocol; HTTP Requests; Http post/get requests; Http upload; HTTP/0.9; HTTP/1.0; HTTP 0.9; HTTP 1.0; HTTP 1.1; GET (HTTP); Http session; HTTP method; HTTP Protocol; HTTP protocol; Http:\\; PUT (HTTP); DELETE (HTTP); HEAD (HTTP); OPTIONS (HTTP); TRACE (HTTP); CONNECT (HTTP); HTTP response; Hypertext Transport Protocol; HTTP-NG; GET requests; HTTPA; RFC 2616; RFC2616; HTTP verbs; Http:; Hypertext transfer protocol; HTTP requests; Hyper-text transfer protocol
  • response]] header section, and response body are highlighted.
  • WWW]] domain name label
  • [[Tim Berners-Lee]]

HTTP message body         
HTTP body data; HTTP response message body; Http message body
HTTP Message Body is the data bytes transmitted in an HTTP transaction message immediately following the headers if there are any (in the case of HTTP/0.9 no headers are transmitted).
HTTP header injection         
WEB APPLICATION VULNERABILITY THAT OCCURS WHEN HTTP HEADERS ARE DYNAMICALLY GENERATED FROM USER INPUT; CAN ALLOW FOR HTTP RESPONSE SPLITTING, SESSION FIXATION (VIA SET-COOKIE), CROSS-SITE SCRIPTING, AND MALICIOUS REDIRECT ATTACKS
HTTP Header Injection
HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting, Session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirect attacks via the location header.
HTTP/3         
THIRD MAJOR VERSION OF THE HTTP NETWORK PROTOCOL
Http3; HTTP 3; HTTP3
(HTTP/3 also uses the completed QUIC protocol described in RFC 9000 and related RFCs such as RFC 9001)

ويكيبيديا

HTTP

The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen in a web browser.

Development of HTTP was initiated by Tim Berners-Lee at CERN in 1989 and summarized in a simple document describing the behavior of a client and a server using the first HTTP protocol version that was named 0.9.

That first version of HTTP protocol soon evolved into a more elaborated version that was the first draft toward a far future version 1.0.

Development of early HTTP Requests for Comments (RFCs) started a few years later and it was a coordinated effort by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), with work later moving to the IETF.

HTTP/1 was finalized and fully documented (as version 1.0) in 1996. It evolved (as version 1.1) in 1997 and then its specifications were updated in 1999, 2014, and 2022.

Its secure variant named HTTPS is used by more than 80% of websites.

HTTP/2, published in 2015, provides a more efficient expression of HTTP's semantics "on the wire". It is now used by 41% of websites and supported by almost all web browsers (over 97% of users). It is also supported by major web servers over Transport Layer Security (TLS) using an Application-Layer Protocol Negotiation (ALPN) extension where TLS 1.2 or newer is required.

HTTP/3, the successor to HTTP/2, was published in 2022. It is now used by over 25% of websites and is supported by many web browsers (over 75% of users). HTTP/3 uses QUIC instead of TCP for the underlying transport protocol. Like HTTP/2, it does not obsolesce previous major versions of the protocol. Support for HTTP/3 was added to Cloudflare and Google Chrome first, and is also enabled in Firefox. HTTP/3 has lower latency for real-world web pages, if enabled on the server, load faster than with HTTP/2, and even faster than HTTP/1.1, in some cases over 3× faster than HTTP/1.1 (which is still commonly only enabled).