• Skip to main content
  • Skip to primary sidebar

Technipages

Tutorials and fixes for smartphone, gadget, and computer problems

  • Topics
    • Android
    • Browsers
    • Gaming
    • Hardware
    • Internet
    • iPhone
    • Linux
    • macOS
    • Office
    • Reviews
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About
What’s the Difference Between Post and Get Requests?

What’s the Difference Between Post and Get Requests?

November 13, 2020 by Mel Hawthorne Leave a Comment

GET and POST are the two most commonly used HTTP request methods. Typically GET requests are used to request webpages while POST is used to send data to the webserver such as through a webform.

Tip: While they are called HTTP methods, both GET and POST are also used in HTTPS.

One of the important distinctions is that any parameters included in GET requests are included in the URL itself, whereas parameters in POST requests are part of the request body.

For example, a GET request URL may look like “GET.php?parameter=value” whereas the URL for a POST request would look like “POST.php” and then have the “parameter=value” set in the request body.

One of the key ramifications of this is that when webservers log requests the requested URL is always logged. So, for GET requests, the parameters are also logged, in the case of POST requests though the values are not logged as the body of the request isn’t logged. This is especially important for forms that contain sensitive data such as passwords or PII (Personally Identifiable Information), as using POST means that this information doesn’t get logged in webservers.

Other differences between GET and POST include the fact that GET requests can be cached by the browser or third-party caches, GET requests are included in the browser history and can be bookmarked. POST requests in comparison are never cached, are not saved to the browser history, and can’t be bookmarked.

It is possible to configure forms to use a GET request to send data to the webserver but doing so is a bad idea as all of these factors come into play. It’s especially important for sensitive forms such as login forms as if this request was logged it would disclose the user’s password, and if the response was cached by a third-party it could let other users sign into the user’s account.

You Might Also Like

  • How to Fix YouTube Error 429 "Too Many Requests"
    How to Fix YouTube Error 429 "Too Many Requests"
  • Fix: Not Receiving Skype Contact Requests
    Fix: Not Receiving Skype Contact Requests
  • Facebook: How to Hide Friend Requests
    Facebook: How to Hide Friend Requests
  • How to View Pending Friend Requests on Facebook
    How to View Pending Friend Requests on Facebook
  • How to Find Message Requests on Facebook Messenger
    How to Find Message Requests on Facebook Messenger
  • What Is the Difference Between USB 2.0 and USB 3.0?
    What Is the Difference Between USB 2.0 and USB 3.0?

Filed Under: Internet

Reader Interactions

Did this help? Let us know!

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Recent Posts

  • How to Fix Explorer.exe: Class Not Registered Error in Windows 11
  • How to Fix Explorer.exe Doesn’t Load at Startup Issue
  • How to Enable/Disable Efficiency Mode in Windows 11
  • How to Create and Edit a Playlist on YouTube Music
  • Microsoft Edge Collections: What It is and How to Use It
  • YouTube Premium: How to Disable/Enable Background Playback
  • How to Update Apps on iPad (iPadOS 16.3.1)
  • How to Fix Outlook Rules Are Not Supported for This Account

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

You May Also Like

  • Power-On Self-Test (Post)

© Copyright 2023 Guiding Tech Media · All Rights Reserved · Privacy