Every website owner is trying to beautify his website and make it look cooler and more attractive. The most common method is to apply images, logos and Flash. However, this will also bring a title, because the more beautiful and attractive the website, each website owner is trying to beautify its own website, making it look cooler and more attractive, the most common method is to apply images, logos, and Flash. However, this will also bring a title. because the more beautiful and attractive the website, the more beautiful the pictures and Flash are easily stolen by other websites. Next we will discuss how to prevent the theft of website images.
Title to be resolved
In short, there are two different theft actions:
1. apply the HTML tag IMG to reference the website image on your website.
2. Upload images from the website and store them on your own website.
For the first type of theft, pictures of a legitimate website are used to beautify and describe other websites. This type of theft is a great infringement on a legitimate website, because visitors who visit an illegal website actually obtain images from a legitimate website, the log files of the website are filled with visiting request records, and bandwidth is illegally visited and consumed, however, legitimate websites do not get any benefits. This type of theft can be completely prevented by technical means.
The second type of theft is relatively Sinister. when a visitor directly visits an illegal image on an illegal website, the website's copyright is infringed, but it cannot be compensated or even invented. Because the Web method of work can not be banned for this type of theft, but it can make the theft more difficult.
It is unrealistic to complete these two types of theft actions, but it can be very difficult to use technical means. In the Apache environment, you can restrict the use of website images by configuration.
Identifies the file to be protected
As a website administrator, the biggest hope is to protect all documents on the website, but this idea is unrealistic from the technical point of view. Therefore, we will only discuss the protection of image files.
As the first step of protection, you must first identify the files to be protected, and then further protect the identified files. Add the following content to the Apache configuration file:
[Add a protection restriction command here]
Set Container commands are included in Or And other containers, or separately listed, are not in any protection container, so that all files on the website will be protected, and can even be stored in. htaccess files. Placing the container in different positions leads to different protection categories.
Referer HTTP header field
When a user visits a Web server and requests a page, the HTTP Request sent by the user's browser contains a message called the HTTP Request Header, this header contains some information requested by the customer, such as the browser version, user language, user control system platform, and user request document name, this information is transmitted using the variable name/variable value method.