Difference between revisions of "What to Protect"
Jump to navigation
Jump to search
BenKoo>Benkoo |
BenKoo>Benkoo |
||
Line 2: | Line 2: | ||
==Login mechanisms== | ==Login mechanisms== | ||
QRCode-based login is popular in the WeChat user community. Open Source QRCode log-in code base can be found here<ref>https://backendless.com/how-to-implement-mobile-to-web-cross-login-using-a-qr-code/</ref>. | QRCode-based login is popular in the WeChat user community. Open Source QRCode log-in code base can be found here<ref>https://backendless.com/how-to-implement-mobile-to-web-cross-login-using-a-qr-code/</ref><ref>https://github.com/mebjas/html5-qrcode</ref>. | ||
=Network Protection= | =Network Protection= |
Revision as of 15:39, 29 April 2021
Data Protection
Login mechanisms
QRCode-based login is popular in the WeChat user community. Open Source QRCode log-in code base can be found here[1][2].
Network Protection
a sdfdasf a
Nginx Reverse Proxy
A common practice to set up website is to use Nginx as a reverse proxy to direct web traffic through an encrypted channel, often called https. The following page on Nginx as Reverse Proxy shows how to do it.