I want to summarize the related information .. I accidentally discovered that my eldest brother had already done the work. Haha. You don't need to write it.
Reference: http://hi.baidu.com/langshen/blog/item/8baf778b92360817c8fc7a8e.html
Anti-leeching:
Rewritecond HOST: (. +)
All Hosts
Rewritecond Referer :(?! Http: // 1 .*).*
Source
Rewriterule .*//.(? : GIF | JPG | PNG | exe | RAR | zip)/chain steal display .gif [I, O]
The ACCESS format is GIF, JPG, PNG, EXE, rar, and zip, and is rewritten to the steal link display. gif [fuzzy match, format URL encode]
Reverse Proxy:
Rewritecond HOST: www/. 1/. com
When the host is www.1.com
Rewriteproxy (. *) http //: // www.2.com $1 [I, u]
Rewrite the proxy to www.2.com [fuzzy match, recording]
Second-level domain name:
Rewritecond HOST :(?! /. | WWW | ww) (. *) .yourname.com
The host name is not www
Rewriterule (. *) http //: // www.yourname.com/?1=2 [I, R]
Go to www.yourname.com/* [fuzzy match, force redirect to provide new destination address]