It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 10 years ago.
http:// vs http:
Either there is some historical reason or I'm missing something.
According to RFC 1738,
While the syntax for the rest of the URL may vary depending on the
particular scheme selected, URL schemes that involve the direct use
of an IP-based protocol to a specified host on the Internet use a
common syntax for the scheme-specific data:
//user:password#host:port/url-path
Some or all of the parts "user:password#", ":password",
":port", and "/url-path" may be excluded. The scheme specific
data start with a double slash "//" to indicate that it complies with
the common Internet scheme syntax.
// Indicates that a contact to a server is to be achieved. (For example, when sending email the notation 'mailto:<email address>...', without slashes, could be used). Note that this doesn't mean a connection between a browser and server. When a browser has sent a request, there is no connection between the browser and the server.
Related
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 10 years ago.
I want to implement honey pot in our lab.
Actually it is a part of my work in our institution.
So I need some help and suggestion for the same.
"A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server doing work, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine vulnerabilities in the real system"
In practice, honeypots are computers which masquerade as unprotected. The honeypot records all actions and interactions with users. Since honeypots don't provide any legitimate services, all activity is unauthorized (and possibly malicious). Talabis presents honeypots as being analogous to the use of wet cement for detecting human intruders
http://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/index.html
This pdf white paper gives detail how it can be implemented..
http://www.tracking-hackers.com/conf/slides/implementing.pdf
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 10 years ago.
As this answer suggests, it isn't a good idea to have sensitive information in a URL string. Even though it will be encrypted if you use SSL, it will be stored in a server log in clear text.
How then should GET arguments be passed to a web server securely?
You are confusing GET with POST data. That answer talks about the query string, that is the arguments in the url, which are passed by GET, you shouldn't pass sensitive data on them, instead pass it in POST fields and Http-Headers.
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 10 years ago.
The official Chrome extensions documentation seems terribly out of date. For example, this page references chrome.tabs.getSelected() method, which has been deprecated long ago (one should use chrome.tabs.query() now).
The samples page is also outdated. Almost none of the samples I checked worked.
So, naturally, I wonder, when can one get relevant documentation on Google Chrome extensions?
The API documentation should be current. If you want something more tutorial-like the other pages are useful but you should cross-check with the API reference since you are correct that the APIs still change relatively often.
http://tutorialzine.com/2010/06/making-first-chrome-extension/ might be a good place to start.
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 11 years ago.
In some kind of applications that I used to "change" something in the executable files requires a proper addresses with the 0x in the beginning. For example: 0x2FF0C4.
The question is, what are those addresse and how can I get them?
I've searched a lot before creating this question, but the address phrase in the search engines provides large amount of records, because I don't know the way, how can I 'name' it.
I guess it's some kind of memory address ?
Can't beat Rouhani's simple answer but here's a little more information on memory addresses:
"Addresses" on computers are usually assumed to be "memory addresses" that identify locations on RAM. By convention, locations on RAM are denoted by hexadecimal because they are commonly encountered in powers of two i.e. pages; thus, it's arithmetic is easier with hexadecimal.
Edit: I realized that you answered your own question.
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 9 years ago.
If a user on my site wants to add a book, can I do the following:
Send the text typed by the user to Amazon/Google Books API
If the users thinks thats the right book, Can I store the title as part of my own local Database?
Not sure about Amazon, but according to Google APIs Terms of Service, Section 5 - Prohibitions on Content:
Unless expressly permitted by the content owner or by applicable law, you agree that you will not, and will not permit your end users to, do the following with content returned from the APIs:
Scrape, build databases or otherwise create permanent copies of such content, or keep cached copies longer than permitted by the cache header;