Ethical Hacking
What is Hacking? Types of Hackers | Introduction to Cybercrime
What is Hacking? Hacking is the activity of identifying weaknesses in a computer system or a...
GET method is used to appends form data to the URL in name or value pair. If you use GET, the length of URL will remain limited. It helps users to submit the bookmark the result. GET is better for the data which does not require any security or having images or word documents.
In this GET Vs. post tutorial, you will learn:
POST is a method that is supported by HTTP and
depicts that a web server accepts the data included in the body of the message. POST is often used by World Wide Web to send user generated data to the web server or when you upload file.
Here, are the important features of GET:
Here are the important features of POST:
Here is an example of GET method:
GET/RegisterStudent.asp?user=value1&pass=value2
Here is an example of POST method:
POST/RegisterStudent.asp HTTP/1.1 Host: www.gtupapers.com user=value1&pass=value2
A form using the default application/x-www-form-urlencoded content type:
Here are the major differences between GET and POST:
| GET | POST |
| In GET method, values are visible in the URL. | In POST method, values are not visible in the URL. |
| GET has a limitation on the length of the values, generally 255 characters. | POST has no limitation on the length of the values since they are submitted via the body of HTTP. |
| GET performs are better compared to POST because of the simple nature of appending the values in the URL. | It has lower performance as compared to GET method because of time spent in including POST values in the HTTP body. |
| This method supports only string data types. | This method supports different data types, such as string, numeric, binary, etc. |
| GET results can be bookmarked. | POST results cannot be bookmarked. |
| GET request is often cacheable. | The POST request is hardly cacheable. |
| GET Parameters remain in web browser history. | Parameters are not saved in web browser history. |
Here, are benefits/ pros of using GET:
Here, are benefits/ pros of using POST:
Here, are cons/drawback of using GET:
Here, are cons/drawback of using POST:
What is Hacking? Hacking is the activity of identifying weaknesses in a computer system or a...
Computers communicate using networks. These networks could be on a local area network LAN or...
More people have access to the internet than ever before. This has prompted many organizations to...
Following are frequently asked questions in interviews for freshers as well as experienced cyber...
OWASP or Open Web Security Project is a non-profit charitable organization focused on improving...
Wireless networks are accessible to anyone within the router’s transmission radius. This makes...