The case was a month and a half ago. There are two reasons for failing to release the domain name in time. One reason is that my blog domain name has not been filed and I am not in the mood to write anything. Second, the most important thing is to release a website with serious damage to the case in a timely manner. it is not because I waited for the PHP vote that the IT staff should have, so that you will be on the top! This document describes the ticket swiping method and defense strategy.
The case was a month and a half ago. There are two reasons for failing to release the domain name in time. One reason is that my blog domain name has not been filed and I am not in the mood to write anything. Second, the most important thing is to release the website with serious damage to the case in a timely manner, which is not what I should expect from IT personnel.
Ps: There is a risk of ticket swiping. exercise caution when using this service. This article is intended for study and discussion and cannot be used for improper purposes!
This post is a masterpiece of this blog. the subject of this post is recently asked by a friend because her sister participated in a calligraphy competition and asked me if I could vote on my website. As a rookie who just debuted for a year, I am very scared. When I first came into contact with PHP a year ago, I did not know how to do it. now the first response is Curl.
$ Ret = curl_exec ($ ch );
Curl_close ($ ch );
Echo $ ret;
?>
Well, let's analyze it.
1. counterfeit IP addresses. a website has a limited IP address that can only be cast once a day.
2. fill in the source. The website will determine whether the source of the request is a valid path.
Other options are the common Curl options.
How to prevent it?
I am not easy to learn, just as a brick-and-mortar.
1. IP address restriction
This article has been cracked
2. restrict source
This article has been cracked
3. verification code. As one of the most anti-human inventions, we can use a fully automated Turing test with a tall name to distinguish computers from humans.
Opencv is available.
4. record the MAC address.
In theory, each network card has a unique MAC address. if it is changed, it may cause a conflict and cannot access the Internet. Currently, you can also use software to modify
5. registered members
Although the verification code can still be broken through, Curl fills in the parameter and then POST it, but the threshold is a little higher after all, ignore it.
6. mobile phone
Input the mobile phone number and text message verification code during voting. The cost is high and the unit is unwilling. The user sends the xx command to XX, and the user pays for it. the user does not want.
Currently, verification codes are only available on mobile phones, and verification of mobile phone effectiveness is the best prevention and treatment measure.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.