Alibabacloud.com offers a wide variety of articles about how to prevent from ddosing, easily find your how to prevent from ddosing information here online.
A more common way to prevent others from rubbing their nets
Filter Mac: This method may not be more than the third method to use more people, usually or ask the excessive niang after their own can set, then use this.
Specify IP: This method is also not a third method used by many people.
Hide SSID Name: This is the most commonly used, I believe that the most people use, is to trouble to enter the wireless name, but I believe that this trouble than
relationship between the AB two tables so that when you delete the data, you can delete the primary table A and then delete the child table B so that the transaction access order for the two table operations is the same.
2 before deleting a table data, use a transaction to point the related foreign key in table B to another data in table A (for example, to create a single row of data in Table a). The primary key is set to 0 and will never delete the row of data, eliminating the relationship be
Policy object. Microsoft has changed the level of protection in Windows 2000 and Windows xp/2003 environments.
To prevent anonymous logons in Windows 2000 computers, you should configure the GPO with the following:
My Computer-Configure windows-security Settings-Local Security policy settings-additional options-Restrict anonymous logons
Ideally, you would configure it to "Prohibit access except with a clear anonymous license." "However, this affects
different user accounts and group accounts. This enhanced security mechanism, although it brings inconvenience to daily use (especially for single users), still has the necessary setting in place where there is a security hazard.An easy way to set up various accounts and appropriate permissions is to use the Set Security Wizard (see figure IV). Figure IV also shows the screen that requires the user to log on after the security mechanism is started.
Third, the conclusionThe so-called "while outs
Javascript|web
Http://www.cnblogs.com/dahuzizyd/archive/2007/01/04/javascript_Double_click.htmlOn the WebForm, some processing takes a long time, in order to prevent repeated submissions, you should use the combo-proofJavaScript code:function Doublecheck () {if (window.document.readyState!= null Window.document.readyState!= ' complete '){Alert ("Processing, please wait!") ");return false;}Else{return true;}}In the C # code:this.backbutton.attributes["
Program | repeat | This is an ASP adapted version of the CGI subroutine that uses the ReadAll method of the TextStream object in the FileSystemObject object. Therefore, you need to periodically clean up the record file Floodcheck.ini. Lest affect the speed. One advantage of this approach is that it leaves the Post's IP address record and can be applied to different types of systems. (Just use Response.Redirect "Your processing post ASP page" in your processing code).
I adapted the ASP code
'
This code was previously used to prevent the page from using the IFRAME
Copy Code code as follows:
But in Firefox you will find that the page will be constantly in the brush. The page doesn't work at all.
Here is because the Firefox windows.top if not so is empty, under IE windows.top is this window page constantly refresh the running of this section of JS code This creates a dead loop, is why the page has been refreshed.
So
If a button can be clicked more than once in a short period of time, it may be malicious clicks of the user, in order to prevent this situation, you can set a certain time to click only once, other times prohibit the click button.
The code is as follows:
Copy Code code as follows:
Now a lot of permission system is based on the origin of the URL path control (module/action) such as thinkphp, Access pathIt's http://localhost/thinkphp/index.php/index/index, but it can also be accessed from the file path asHttp://localhost/thinkphp/Tpl/Index/index.html, it directly shows the source of index.html! How to Prohibit access?or other protective measures?
It is known that the template folder of an app is called TPL, and it is normally possible to access the text directly via the pa
refreshing
Copy Code code as follows:
Sub Chkreflash ()
Dim scriptname
Scriptname=lcase (Request. ServerVariables ("Path_info"))
Dim posttime,doreflashpage,reflashpage,splitreflashpage
Posttime=1 ' Prevent refresh time
Doreflashpage=false
Reflashpage= "| Article_one.asp "
Splitreflashpage=split (reflashpage, "|")
For i=0 to UBound (splitreflashpage)
If InStr (Scriptname,splitreflashpage (i)) >0 then
Doreflashpage=true
Exit For
Dim refreshintervaltime
Refreshintervaltime = 3 ' Prevents refresh time seconds, 0 means not preventing
If Not IsEmpty (sessions ("visit")) and IsNumeric (session ("visit")) and int (refreshintervaltime) > 0 Then
if (Timer ()-int (Session ("visit")) *1000 Response.Write ("Response.Write ("Refresh too fast, please wait")
Session ("visit") = Timer ()
Response.End
End If
End If
Session ("visit") = Timer ()
%>
How does ASP prevent Web pages from frequentl
The entire form prevents automatic completion
The code is as follows
Copy Code
Prevent text boxes from completing automatically
The code is as follows
Copy Code
Disable automatic completion in script
code is as follows
copy code
function Init () { element.setattribute ("AutoComplete", "off"); }
, and other non-Apple computers also automatically store data.
Third, stop using Apple's photo streaming feature.
Turning off the service will not only prevent photos on a single terminal device from being downloaded, but also remove all photos stored on the photo stream on the equipment.
Apple users can set-icloud through the system, log on to the ICloud account and turn off all options that are not synchronized. At the same t
One-click to close dangerous port (prevent hacker intrusion)Dangerous, port, hackerCopy all of the followingSave the suffix with NotepadBatPress prompt to copy from below @
Copy Code code as follows:
@echo off
Color 1f
Title close a common dangerous port
Echo.
Echo.
echo This batch is used to start the firewall of the XP system and to close common dangerous ports
Echo.
echo Please verify that you are using an XP system and that no o
. htaccess direct access to encrypted web site
When you try to access a directory protected by the. htaccess password, your browser pops up the standard Username/password dialog window. If you don't like this, some scripts can allow you to embed the Username/password input box inside the page for authentication, and you can enter the username and password (unencrypted) in the browser's URL box as follows:
http://username:password@www.w3sky.com/directory/
5. Use. htaccess
, repeated access
When the Cache-control value is "No-cache", accessing this page does not leave a page backup on the Internet temporary article folder.
In addition, caching can also be affected by specifying a "Expires" value. For example, to specify that the Expires value is a long past time, if you repeatedly press ENTER in the Address bar when you visit the network, you will repeat the visit each time: Expires:fri, Dec 1999 16:00:00 GMT
For example:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.