当前位置:网站首页>Homologous strategy, surface longitude
Homologous strategy, surface longitude
2022-07-25 03:57:00 【Big chicken legs are best】
The same origin policy limits how documents or scripts loaded from the same source interact with resources from another source . This is an important security mechanism for browsers to isolate potentially malicious files . Homology means :**protocol( agreement )、domain( domain name )、port( port )** It has to be consistent .
The homologous policy mainly limits three aspects :
- Under the current domain js Scripts cannot access... In other domains cookie、localStorage and indexDB.
- Under the current domain js The script can't access the... In other domains DOM.
- Under the current domain ajax Unable to send cross domain request .
The purpose of homologous policy is to ensure the information security of users , It's just right js A limitation of scripts , It's not a limitation on browsers , For general img、 perhaps script Script requests will not have cross domain restrictions , This is because these operations will not perform operations that may cause security problems through the response results
边栏推荐
- Optimization of MySQL sorting index fields
- Analysis of cascading relation operation examples of cascade
- Implementation of online number or fan query of the scene
- Original | record a loophole excavation in Colleges and Universities
- Day 9 (capture traffic and routing strategy)
- Traditional architecture of enterprise digital transformation to medium platform micro service architecture
- Secondary vocational network security skills competition P100 vulnerability detection
- Many local and municipal supervision departments carried out cold drink sampling inspection, and Zhong Xue's high-quality products were all qualified
- A code takes you to draw multi format sangjimei pictures such as interactive +pdf+png
- Servlet个人实操笔记(一)
猜你喜欢

Imeta | ggclusternet microbial network analysis and visualization nanny level tutorial

The relationship between private domain traffic and fission marketing. What is super app? Can our enterprise own it?

Acwing 870. approximate number

VMware installation

使用 “display: flex;justify-content: center;align-items: center; ” 解决流式栅格布局无法居中的问题

Detailed explanation of three factory modes

Analysis of browser working principle

Pytorch deep learning practice lesson 8 importing data

DNS domain name resolution service

Implementation of logistics repair reporting system based on SSM
随机推荐
SQL comment
01_ Education 4
Table of contents of force deduction questions
.net6 miniapi (V): Options
Leetcode.745. prefix and suffix search____ Double dictionary tree + double pointer
High temperature in Britain: two airport runways were burnt out, and several railways were restricted to ensure safety
Task02 | EDA initial experience
Moveit2 - 8. Motion planning API
Sales system of infant products based on SSH
[understanding of opportunity-47]: Guiguzi - Chapter 11 - decision makers, moderation, and rational distribution of interests
Shell string
Use of CCleaner
基于ABP实现DDD--领域逻辑和应用逻辑
Machine learning exercise 8 - anomaly detection and recommendation system (collaborative filtering)
Chapter 3 business function development (modify the remarks of market activities)
Chapter 18 request matcher serverwebexchangematcher of oauth2loginauthenticationwebfilter
One question per day
Memory leak due to improper handling of custom view
A 20 yuan facial cleanser sold tens of thousands in seven days. How did they do it?
C language_ Defining structures and using variables