Judge whether a Requester can effectively prevent theft. This function can be implemented by using the corresponding HTTP Referer module (HTTP Referer) of nginx. This module can be disabled when the Referer field of a request header contains some incorrect fields. This request accesses the site. This header can be arbitrarily forged. Therefore, the use of this module does not block these requests 100%. The vast majority of rejected requests come from some typical browsers. It can be considered that these typical browsers cannot provide a "Referer" head. Even those that are correct. Here's an example:
location /photos/{ valid_referers none blocked www.mydomain.com mydomain.com; if ($invalid_referer) { return 403; } }
There is only one important directive valid_referers: this directive is in the referer header Based on the value assigned to the $invalid_referer variable, the value is 0 or 1. You can use this command to implement the anti-theft chain function. If there is no value of the Referer header in the valid_referers list, $invalid_referer will be set to 1 (see the previous example). The parameter can be of the form: none means that the Referer header does not exist. Block means to pretend the Referer header according to the firewall, such as: “Referer: XXXXXXX”. Server_names is a list of one or more servers. You can use the “*” wildcard in the name after version 0.5.33.
According to foreign media reports, Linux does not seem to be fully loved by people. Operating syste
under RedHat Enterprise Linux server 5.4 First, system environment operating system: RedHat Enterp
With Windows for a long time, it will inevitably start to lack freshness, so some people will try to
Problem Description Solution Reasons for analysis, maybe because my platform migr
Tomcat memory overflow and temporary solution
Seven reasons to give up Linux
Linux operating system history command is fully controlled
Linux signal signal processing mechanism
Linux ends with a keyword process (batch kill process method)
Linux disk management: df, du, fdisk, mkfs, fsck
N kinds of weapons for finding vulnerabilities under Linux
Ultra-simple Centos vpn build method only needs three, quickly build vpn
Win7 system query disk information skills
Win7 computer wallpaper automatically changed how to be solved by malicious tampering
IE is still there! Microsoft announced its existence in Win10
Solve the incompatibility between Vista and games
Win10 notification box changed to Win7 "balloon" type method
"Start Screen" is very important in Windows 8 Pro
Win7 keyboard can not input text processing method
How to retrieve the lost recycle bin
What does ppap mean, what is the process file?
Microsoft released six security patches in March. Fixed seven vulnerabilities in