일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
- graphQL
- Props
- evm
- error
- nextJS
- solidity
- blockchain
- node.js
- useState
- web
- bitcoin
- typeScript
- 삶
- CSS
- 기준
- hardhat
- CLASS
- Interface
- REACT
- concept
- HTML
- JavaScript
- SSR
- Redux
- built in object
- middleware
- Ethereum
- tailwindcss
- API
- express.js
- Today
- Total
목록Frontend/Network (8)
ReasonJun
SSG and ISR are two different ways of rendering web pages. SSG stands for Static Site Generation, and ISR stands for Incremental Static Regeneration. SSG is a technique where the pages of a website are rendered on the server before the user requests them. This means that the pages are pre-rendered and served to the user as static files. SSG has a number of benefits, including: Faster page load t..
CSR stands for Client-Side Rendering, while SSR stands for Server-Side Rendering. These are two different approaches to rendering web content and have their own benefits and trade-offs. Client-Side Rendering (CSR): Client-Side Rendering is a technique where the web browser, or the client, is responsible for rendering the UI. In CSR, the server primarily sends a minimal HTML document along with J..
REST, which stands for Representational State Transfer, is an architectural style for designing networked applications. It provides a set of principles and constraints for creating web services that can be easily consumed by clients over the internet. A REST API (Application Programming Interface) is an implementation of the REST principles that allows communication between clients and servers u..
CSRF, which stands for Cross-Site Request Forgery, is a type of security vulnerability that exploits the trust a web application has in a user's browser. It occurs when an attacker tricks a victim into performing an unintended action on a web application without their knowledge or consent. In a CSRF attack, the attacker crafts a malicious website or email that contains a specially-crafted reques..
XSS, short for Cross-Site Scripting, is a type of security vulnerability that occurs when untrusted data is injected into a web application and subsequently rendered on a user's browser. It allows attackers to execute malicious scripts in the victim's browser, potentially compromising their data, stealing sensitive information, or performing unauthorized actions on their behalf. The XSS vulnerab..
CORS stands for Cross-Origin Resource Sharing. It is a mechanism that allows web browsers to make cross-origin HTTP requests securely. In the context of web development, an origin is defined as the combination of the protocol (e.g., HTTP or HTTPS), domain, and port from which a resource is being requested. By default, web browsers enforce a security policy called the Same-Origin Policy, which re..