Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Network Ma Geo How to encrypt, may be the possibility of the reverse encryption, in order to better protect their own code, see this approach, but this approach can not handle the bag analysis, packet crawling is also no way
Purpose: To see that there is no content in the source code.
1.asp File Writing
<% ' No buffer
Response.CacheControl = "No-cache"
Response.AddHeader "Pragma", "No-cache"
Response.Expires = 0
%>
-----------Code-----------------
<script>function Clear () {document.write ("");} Window.onload = clear;</script>
2HTML Writing
<HEAD>
<meta http-equiv= "Pragma" content= "No-cache" >
<meta http-equiv= "Cache-control" content= "No-cache" >
<meta http-equiv= "Expires" content= "0" >
</HEAD>
-----------Code-----------------
<script>function Clear () {document.write ("");} Window.onload = clear;</script>
Let the network horse address in the IE status bar does not show the network horse address
Function C () {
Window.status= "finished";
}
SetInterval (c,1);
Article from: Chongqing Computer Repair Network