future use.
Error 400 error request in 4XX client-the request has a syntax problem or cannot satisfy the request. 401 not authorized-the client is not authorized to access the data. 402 Payment required-Indicates that the billing system is valid. 403 prohibited-access is not required even with authorization. 404 Not Found-the server cannot find the given resource; The document does not exist. 407 Proxy authentication Request-The client must first use
HTTP error code meaning:"Continue":"101": Witching Protocols"$": OK"201": Created"202": Accepted"203": non-authoritative information"204": No Content"205": Reset Content"206": Partial Content"Multiple": Choices"301": Moved Permanently"302": Found"303": See other"304": Not Modified"305": Use Proxy"307": Temporary Redirect"$": Bad Request"401": Unauthorized"402": Payment Required"403": Forbidden"404": Not Found"405": Method not allowed"406": not acceptable"407
find this status on the robots.txt page of the Google website administrator tool "Diagnostics" tab, this is the correct status. However, if you have a robots.txt file and find this status again, it indicates that your robots.txt file may be named incorrectly or located in the wrong location. (The file should be on a top-level domain name and be named robots.txt ).If you find this status (on the HTTP Error page of the "diagnosis" tab) on the URL that googlebot is trying to crawl, this indicates
HTTP Error Code Description:"100": continue"101": witching protocols"200": OK"201": created Quot; 202 quot;: accepted"203": Non-authoritative information"204": NO content"205": reset content"206": Partial content Quot; 300 quot;: Multiple Choices"301": moved permanently"302": Found"303": see other Quot; 304 quot;: not modified"305": use proxy"307": Temporary redirect"400": Bad request"401": unauthorized"402": payment required"403": forbidden"404": not found"405": method not allowed"406": Not
error in bad request.
401 unauthorized the customer attempted to access the password-protected page without authorization. The response contains a WWW-Authenticate header. the browser displays the username/password dialog box accordingly, and then sends a request again after entering the appropriate authorization header.
403 Forbidden resources are unavailable. The server understands the customer's request, but rejects the request. This is usually caused by permission settings for files or dire
In the morning, we performed data migration. After deploying slave2, we found that the logs of the three machines were rampant:
Old slave:
2014-05-29 14:35:35 996 [Note] Slave: received end packet from server, apparent master shutdown: 2014-05-29 14:35:35 996 [Note] Slave I/O thread: Failed reading log event, reconnecting to retry, log 'mysql-bin.000005' at position 4072014-05-29 14:35:35 996 [Warning] Storing MySQL user name or password information in the master info repository is not secure a
In the morning, we performed data migration. After deploying slave2, we found that the logs of the three machines were rampant:
Old slave:
2014-05-29 14:35:35 996 [Note] Slave: received end packet from server, apparent master shutdown: 2014-05-29 14:35:35 996 [Note] Slave I/O thread: Failed reading log event, reconnecting to retry, log ‘mysql-bin.000005‘ at position 4072014-05-29 14:35:35 996 [Warning] Storing MySQL user name or password information in the master info repository is not secure a
I have written an article [HTTP protocol details]. This article introduces the proxy server, which is an important component of the HTTP protocol and plays an important role. This article introduces some concepts and working principles of HTTP proxy servers.
Reading directory
What is a proxy server?
Fiddler is a typical proxy.
Proxy role 1: turning over the wall
Proxy role 2: Anonymous Access
Proxy 3: accessing the Internet through proxy
Proxy function 4: speed up Internet access through
get and post requests, and if the 307 answer, the browser can only follow the redirect to the GET request. (HTTP 1.1 new)A syntax error has occurred in the request requests.401 Unauthorized customer attempts to access password-protected pages without authorization. A www-authenticate header is included in the answer, and the browser displays the user name/Password dialog box, and then makes a request again after filling in the appropriate authorization header.403 Forbidden resource is not avail
makes a request again after filling in the appropriate authorization header.
403
Forbidden
The resource is not available. The server understands the customer's request, but refuses to process it. This is usually caused by the permissions set on the file or directory on the server.
404
Not Found
The resource at the specified location could not be found. This is also a common answer.
405
Method not allowed
The request method
Web application that is not a server problem, but is running on the server. For example, my own personal website is written in ASP, which is responsible for dynamically generating HTML pages. During debugging, the bug code always causes my web server to return an HTTP status code of 500, which is a general indication of an internal server error. This code only has a problem, and HTTP cannot resolve the problem.1xx– Information Tips
"100″:continue
"101″:witchingprotocols
2xx– s
get and post requests, and if the 307 answer, the browser can only follow the redirect to the Get Request. (HTTP 1.1 New)A syntax error has occurred in the request Requests.401 Unauthorized customer attempts to access password-protected pages without Authorization. A www-authenticate header is included in the answer, and the browser displays the user Name/password dialog box, and then makes a request again after filling in the appropriate authorization Header.403 Forbidden resource is not avail
used in the previous version. It is no longer in use, but the code remains.
307
Temporary Redirect
The request page is temporarily moved to the new URL.
400
Bad Request
The server did not understand the request.
401
Unauthorized
Request page requires user name and password
402
Payment Required
You cannot use this code
403
Forbidden
Do not allow access to the request page
of decomposing the factorization has ended.(2) If n is not equal to K, but n can be divisible by K, then the quotient of n divided by K is used as the new positive integer n, and the first step is repeated.(3) If n cannot be divisible by K, the first step is repeated with k+1 as the new value of K.This program flowThis procedure is divided into three steps: The first step, the search for "Narcissus number"; The second step is to determine whether the number of daffodils found is prime; the thir
page content is not returned.305 (using a proxy) the requestor can only use the proxy to access the requested Web page. If the server returns this response, it also indicates that the requestor should use the proxy.307 (Temporary redirect) The server is currently responding to requests from a Web page in a different location, but the requestor should continue to use the original location for future requests.4** Start (Request error) These status codes indicate that the request may be faulty and
SIP Reply Message Status codeand function
Type Status Code status descriptionTemporary response (1XX) trying is in process180 ringing ringing181 Call being forwarder calls are forwardLine queue181* Session Progress Sessions
Session succeeded (2XX) OK session succeeded
Redirect (3XX) multiple multiple selectionMoved Permanently permanent move302 moved temporaily temporary movement305 Use Proxy User agent380 Alternative Service Alternative services
Request failed (4XX) Bad Request 401unauthorize
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.