当前位置:  编程技术>移动开发
本页文章导读:
    ▪获得目前程序的File和Cache路径        取得目前程序的File和Cache路径     File cacheDir; File fileDir; /* 取得目前Cache目录 */ cacheDir = this.getCacheDir(); /* 取得目前File目录 */ fileDir = this.getFilesDir();     ......
    ▪ 不错的牛人专号        不错的牛人专栏 几个不错的Android专栏地址:   第三极: http://disanji.net/category/android-doc/   moandroid: http://www.moandroid.com/?page_id=1176   maxlen的专栏: http://mobile.csdn.net/a/20110209/291511.html   魏祝林的.........
    ▪ How Secure Are Query Strings Over HTTPS       How Secure Are Query Strings Over HTTPS?   A common question we hear is “Can parameters be safely passed in URLs to secure web sites? ” The question often arises after a customer has looked at an HTTPS request in HttpWatch and wondered who else c.........

[1]获得目前程序的File和Cache路径
    来源: 互联网  发布时间: 2014-02-18
取得目前程序的File和Cache路径

 

 

File cacheDir;
File fileDir;
/* 取得目前Cache目录 */
cacheDir = this.getCacheDir();
/* 取得目前File目录 */
fileDir = this.getFilesDir();
 

 


    
[2] 不错的牛人专号
    来源: 互联网  发布时间: 2014-02-18
不错的牛人专栏

几个不错的Android专栏地址:

 

第三极:

http://disanji.net/category/android-doc/

 

moandroid:

http://www.moandroid.com/?page_id=1176

 

maxlen的专栏:

http://mobile.csdn.net/a/20110209/291511.html

 

魏祝林的专栏:

http://blog.csdn.net/Android_Tutor/

 

duguguiyu的深入Android:

http://www.uml.org.cn/j2ee/201004135.asp

 

我一个哥们的博客,优化Dalvik虚拟机的牛人:

http://blog.csdn.net/tuhuolong/archive/2010/07/26/5766279.aspx

 

AnroidJNI开发入门系列:

http://my.unix-center.net/~Simon_fu/?p=833

 

Android游戏开发:

http://mobile.csdn.net/a/20110216/292016.html

 

Linux下搭建Android开发环境:

http://flysnow.iteye.com/blog/810083

 

Android的source code:

http://source.android.com/index.html

 

如果能把这些牛人的专栏研究透,应该多少也能算半个牛人了吧。

转至:http://lixiangyu.iteye.com/blog/1056295


    
[3] How Secure Are Query Strings Over HTTPS
    来源: 互联网  发布时间: 2014-02-18
How Secure Are Query Strings Over HTTPS?

 

A common question we hear is “Can parameters be safely passed in URLs to secure web sites? ” The question often arises after a customer has looked at an HTTPS request in HttpWatch and wondered who else can see this data.

For example, let’s pretend to pass a password in a query string parameter using the following secure URL:

https://www.httpwatch.com/?password=mypassword

HttpWatch is able to show the contents of a secure request because it is integrated with the browser and can view the data before it is encrypted by the SSL connection used for HTTPS requests:

If you look in a network sniffer, like Network Monitor, at the same request you would just see the encrypted data going backwards and forwards. No URLs, headers or content is visible in the packet trace::

You can rely on an HTTPS request being secure so long as:

  • No SSL certificate warnings were ignored
  • The private key used by the web server to initiate the SSL connection is not available outside of the web server itself.

So at the network level, URL parameters are secure, but there are some other ways in which URL based data can leak:

  • URLs are stored in web server logs - typically the whole URL of each request is stored in a server log. This means that any sensitive data in the URL (e.g. a password) is being saved in clear text on the server. Here’s the entry that was stored in the httpwatch.com server log when a query string was used to send a password over HTTPS:


    2009-02-20 10:18:27 W3SVC4326 WWW 208.101.31.210 GET /Default.htm password=mypassword 443 ...

    It’s generally agreed that storing clear text passwords is never a good idea even on the server.

  • URLs are stored in the browser history – browsers save URL parameters in their history even if the secure pages themselves are not cached. Here’s the IE history displaying the URL
    parameter:

     

    Query string parameters will also be stored if the user creates a bookmark.

  • URLs are passed in Referrer headers – if a secure page uses resources, such as javascript, images or analytics services, the URL is passed in the Referrer request header of each embedded request. Sometimes the query string parameters may be delivered to and stored by third party sites. In HttpWatch you can see that our password query string parameter is being sent across to Google Analytics:
  • Conclusion

    The solution to this problem requires two steps:

    • Only pass around sensitive data if absolutely necessary. Once a user is authenticated it is best to identify them with a session ID that has a limited lifetime.
    • Use non-persistent, session level cookies to hold session IDs and other private data.

    The advantage of using session level cookies to carry this information is that:

    • They are not stored in the browsers history or on the disk
    • They are usually not stored in server logs
    • They are not passed to embedded resources such as images or javascript libraries
    • They only apply to the domain and path for which they were issued

    Here’s an example of the ASP.NET session cookie that is used in our online store to identity a user:

    Notice that the cookie is limited to the domain store.httpwatch.com and it expires at the end of the browser session (i.e. it is not stored to disk).

    You can of course use query string parameters with HTTPS, but don’t use them for anything that could present a security problem. For example, you could safely use them to identity part numbers or types of display like ‘accountview’ or ‘printpage’, but don’t use them for passwords, credit card numbers or other pieces of information that should not be publicly available.


        
    最新技术文章:
    ▪Android开发之登录验证实例教程
    ▪Android开发之注册登录方法示例
    ▪Android获取手机SIM卡运营商信息的方法
    ▪Android实现将已发送的短信写入短信数据库的...
    ▪Android发送短信功能代码
    ▪Android根据电话号码获得联系人头像实例代码
    ▪Android中GPS定位的用法实例
    ▪Android实现退出时关闭所有Activity的方法
    ▪Android实现文件的分割和组装
    ▪Android录音应用实例教程
    ▪Android双击返回键退出程序的实现方法
    ▪Android实现侦听电池状态显示、电量及充电动...
    ▪Android获取当前已连接的wifi信号强度的方法
    ▪Android中GPS定位的用法实例 iis7站长之家
    ▪根据USER-AGENT判断手机类型并跳转到相应的app...
    ▪Android Touch事件分发过程详解
    ▪Android中实现为TextView添加多个可点击的文本
    ▪Android程序设计之AIDL实例详解
    ▪Android显式启动与隐式启动Activity的区别介绍
    ▪Android按钮单击事件的四种常用写法总结
    ▪Android消息处理机制Looper和Handler详解
    ▪Android实现Back功能代码片段总结
    ▪Android实用的代码片段 常用代码总结
    ▪Android实现弹出键盘的方法
    ▪Android中通过view方式获取当前Activity的屏幕截...
    ▪Android提高之自定义Menu(TabMenu)实现方法
    ▪Android提高之多方向抽屉实现方法
    ▪Android提高之MediaPlayer播放网络音频的实现方法...
    ▪Android提高之MediaPlayer播放网络视频的实现方法...
    ▪Android提高之手游转电视游戏的模拟操控
     


    站内导航:


    特别声明:169IT网站部分信息来自互联网,如果侵犯您的权利,请及时告知,本站将立即删除!

    ©2012-2021,,E-mail:www_#163.com(请将#改为@)

    浙ICP备11055608号-3