Home » Technology » HTTPS



  • Along with the increasing use of the Internet, many different users started to have threats. The cyber hijackers found themselves on the Internet to take advantage of them, and HTTP contained a major security weakness in this respect. For this reason, the SSL protocol was introduced to allow users to be made more secure and associated with HTTP.


  • If you use HTTPS in a connection, it means that your connection with the web site you are sending information to will be encrypted and absolutely no third party will be able to access this information. Nevertheless, of course, if your computer contains any malicious software, then your information may be compromised.


  • As a standard internet user, you do not need to make any adjustments for your HTTPS. However, you can visit the HTTPS section of your web browser to customize the HTTPS settings accordingly.






  • HTTPS History – Revealed
  • HTTPS was developed by Netscape in 1994 for the Netscape Navigator web browser.


  • HTTPS Technical Specifications
  • HTTPS uses verified and trusted server certificates for encryption, which is a way to establish a secure path that can work on an unsecured network.
  • When accessing a page encrypted with HTTPS, the certificate to which the page is encrypted must be recognized by the user’s web browser. If the certificate is signed by a recognized certificate authority, the browser evaluates the page as secure. If the certificate authority is not recognized, the user is notified and asked whether the certificate is trusted.
  • Scanners usually display a warning message when they encounter an invalid certificate. Old browsers ask the user if they want to continue with a dialog box. New browsers display a warning spread across the page and put a clear mark on the address bar.


  • Differences from HTTP
  • First, HTTP uses port 80 as the default. The predefined port used by HTTPS is 443.
  • The HTTP man-in-the-middle attack, ie the attack on the man in the middle, is unprotected against listening. An attacker listening to the network can easily read the information, and the passwords that need to be kept secret can capture user accounts. HTTPS is designed to protect against such attacks. For this reason HTTPS is often preferred on form pages where passwords and usernames are sent. There are also websites that broadcast entirely with HTTPS.


  • How to make HTTPS?
  • If you have a website and if you send important forms from this web site that you need to encrypt, then you might consider having an SSL certificate for your website. However, SSL certificates are not required in such a case if your website does not deal with any form processing by users.
  • In order to apply HTTPS to your own web site, you must contact the web company from which you purchased your service and obtain the monthly fee that you requested for the SSL certificate. Thus, you can implement an SSL certificate installation on your site in the easiest and simplest way.
Author: wik Date: 5:28 pm

Wik's Random Content