Mixed Active Content is now blocked by default in Firefox 23!
When a user visits a page served over HTTP, their connection is open for eavesdropping and man-in-the-middle (MITM) attacks. When a user visits a page served over HTTPS, their connection with the web server is authenticated and encrypted with SSL and hence safeguarded from eavesdroppers and MITM attacks.
However, if an HTTPS page includes HTTP content, the HTTP portion can be read or modified by attackers, even though the main page is served over HTTPS. When an HTTPS page has HTTP content, we call that content “mixed”. The webpage that the user is visiting is only partially encrypted, since some of the content is retrieved unencrypted over HTTP. The Mixed Content Blocker blocks certain HTTP requests on HTTPS pages.
#http #https #mixed_active_content #firefox
What is Mixed Content?
When a user visits a page served over HTTP, their connection is open for eavesdropping and man-in-the-middle (MITM) attacks. When a user visits a page served over HTTPS, their connection with the web server is authenticated and encrypted with SSL and hence safeguarded from eavesdroppers and MITM attacks.
However, if an HTTPS page includes HTTP content, the HTTP portion can be read or modified by attackers, even though the main page is served over HTTPS. When an HTTPS page has HTTP content, we call that content “mixed”. The webpage that the user is visiting is only partially encrypted, since some of the content is retrieved unencrypted over HTTP. The Mixed Content Blocker blocks certain HTTP requests on HTTPS pages.
#http #https #mixed_active_content #firefox
ngrok
something that ROCKS and is priceless!As
ngrok
itself says:Public URLs for exposing your local web server
Have you had an experience of when you need to test a tool and the 3rd party needs you to give a public accessible URL? Well, what would you do when you are developing a project on your PC, Laptop? You don't have any URL to give to 3rd party tools. Here
ngrok
truely rocks!Downlaod it from the URL below:
https://ngrok.com/
And extract the download binay for your OS. In order to run the
ngrok
just do like below:./ngrok http 5000
The above command will output some data and a part which is
Forwarding
for http and https:Forwarding http://76eec0f8.ngrok.io -> localhost:5000
Forwarding https://76eec0f8.ngrok.io -> localhost:5000
The URL
76eec0f8.ngrok.io
is the part that you will give to the 3rd party. and all the other part of the URL path will be forwardedto port
5000
on your local server.Yes, I know it's like a magic.
#ngrok #port #http #ngrok_io