当前位置:网站首页>Homologous strategy, surface longitude
Homologous strategy, surface longitude
2022-07-25 03:57:00 【Big chicken legs are best】
The same origin policy limits how documents or scripts loaded from the same source interact with resources from another source . This is an important security mechanism for browsers to isolate potentially malicious files . Homology means :**protocol( agreement )、domain( domain name )、port( port )** It has to be consistent .
The homologous policy mainly limits three aspects :
- Under the current domain js Scripts cannot access... In other domains cookie、localStorage and indexDB.
- Under the current domain js The script can't access the... In other domains DOM.
- Under the current domain ajax Unable to send cross domain request .
The purpose of homologous policy is to ensure the information security of users , It's just right js A limitation of scripts , It's not a limitation on browsers , For general img、 perhaps script Script requests will not have cross domain restrictions , This is because these operations will not perform operations that may cause security problems through the response results
边栏推荐
- Lombok detailed introduction
- [understanding of opportunity-47]: Guiguzi - Chapter 11 - decision makers, moderation, and rational distribution of interests
- Sword finger offer II 041. Average value of sliding window_____ Using queue / loop array implementation
- Deep learning Titanic (beginner) kaggle Liu er's homework Lesson 8
- 使用 “display: flex;justify-content: center;align-items: center; ” 解决流式栅格布局无法居中的问题
- Force deduction problem 238. product of arrays other than itself
- EMQ Yingyun technology was successfully selected into the 2022 "cutting edge 100" list of Chinese entrepreneurs
- Why does the legend of superstar (Jay Chou) not constitute pyramid selling? What is the difference between distribution and pyramid selling?
- C language file operation
- [leetcode medium] 34. Find the first and last positions of elements in the sorted array - array double pointer
猜你喜欢

Yuntu says digital asset chain: your God of digital asset property protection

C language file operation

Visio use

Many local and municipal supervision departments carried out cold drink sampling inspection, and Zhong Xue's high-quality products were all qualified

Force the resumption of game 302 of the week

Operations in shell

Solve "nothing added to commit but untracked files present"“

DNS domain name resolution service

Sales system of infant products based on SSH

Moveit2 - 8. Motion planning API
随机推荐
原创|记一次高校漏洞挖掘
Xrrunner, a domestic performance testing tool for palm smart, officially unveiled qecon
Unity word document click button to download
Force deduction brush question 7. Integer inversion
Memory leak due to improper handling of custom view
What should testers do if they encounter a bug that is difficult to reproduce?
Localization distillation for dense object detection cvpr2022
ES (8.1) certification topic
Moveit2 - 8. Motion planning API
Performance test indicators using JMeter
Force deduction problem 238. product of arrays other than itself
[Flink] rich function
SQL comment
226. Flip binary tree DFS method
Analysis of DNS domain name resolution process
Network security - comprehensive penetration test -cve-2018-10933-libssh maintain access
CVPR 2020 | social stgcnn: pedestrian trajectory prediction based on graph convolution
144. Preorder traversal of binary tree
C language file operation
Wechat applet authorized login (including obtaining basic information and binding mobile number)