温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.eb.com/topic/query-string
点击访问原文链接

Query string | Definition, Examples, & Facts | Britannica

SUBSCRIBESUBSCRIBESUBSCRIBEHomeHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyGames & QuizzesVideosOn This DayOne Good FactDictionaryNew ArticlesHistory & SocietyLifestyles & Social IssuesPhilosophy & ReligionPolitics, Law & GovernmentWorld HistoryScience & TechHealth & MedicineScienceTechnologyBiographiesBrowse BiographiesAnimals & NatureBirds, Reptiles & Other VertebratesEnvironmentFossils & Geologic TimeInsects & Other InvertebratesMammalsPlantsGeography & TravelGeography & TravelArts & CultureEntertainment & Pop CultureLiteratureSports & RecreationVisual ArtsImage GalleriesPodcastsSummariesTop QuestionsLists and StoriesBritannica KidsAsk the ChatbotGames & QuizzesHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyVideosquery stringIntroductionReferences & Edit HistoryRelated TopicsTechnologyComputersFacebookXhttps://www.britannica.com/topic/query-stringIEEE - Technical Community on Security and Privacy - On the Privacy Concerns of URL Query Strings (PDF)IBM - QueryString details and samplesAdam Volle Adam Volle is a freelance writer and editor based in Atlanta, Georgia. Britannica Editors Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree....Historyextensionwebsiteuniform resource locatordatabaseparameterssearch enginevalueampersandnumber signWorld Wide WebConsortiumbrowserFacebookappendsearch engineURLquery languagesearchingSee all related contentSUBSCRIBE Query strings present security issues in that key-value pairs sometimes include sensitive information, such as usernames and passwords. One common solution to this vulnerability is the use of unusual or randomly generated sets of characters for key-value pairs. This method does not seal off the data, but it does makes it virtually impossible to guess parameters’ valid values. Another option is to place all the data in a JSON Web token (JWT), which is a base-64 representation of the data protected by a signature. When thus encoded, tampering with the query string’s data is impossible; the parametersAdam Volle

智能索引记录