473,225 Members | 1,402 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,225 software developers and data experts.

How to check fake requests

Hi All,

How can I check fake requests on my webpage. I am asking for email address
as input and I wounder if anyone write a program to send fake requests and
my system will be busy to respond those requests.
Specifically, I want to check if more than 10 requests from same IP in last
One minute then my Website should not respond to that IP.

Take care

Fakhar
Jul 17 '05 #1
3 3094
"Fakhar" <fa*******@hotmail.com> wrote in message
news:f9**************************@posting.google.c om...
How can I check fake requests on my webpage. I am asking for email address as input and I wounder if anyone write a program to send fake requests and
my system will be busy to respond those requests.
Specifically, I want to check if more than 10 requests from same IP in last One minute then my Website should not respond to that IP.


that will kill people who come through proxy, or firewall. All such users
appear to your script as if they come from the same IP, while in fact they
are different.

rush
--
http://www.templatetamer.com/

Jul 17 '05 #2
Here's a question:
What negative effects do you expect from people hitting your website with
fake requests?

Note that by the time your fake-request-rejection script has run, your web
server has already fielded the request and initialized PHP. Not matter what
output you do or don't send, the server will issue response headers once the
script finishes. So unless their requests automatically invoke some very
CPU-intensive process, just running the rejection script is already taking
about as much load as anything else. A more effective method is:
mod_throttle. See this article:
http://www.linux-mag.com/2003-02/lamp_01.html
for more.

The other poster's point about requests from proxies is also well noted. I
would be careful blocking traffic unless you know it's malicious, or unless
it has some specific negative effect.

Cheers,

Eric
"Fakhar" <fa*******@hotmail.com> wrote in message
news:f9**************************@posting.google.c om...
Hi All,

How can I check fake requests on my webpage. I am asking for email address as input and I wounder if anyone write a program to send fake requests and
my system will be busy to respond those requests.
Specifically, I want to check if more than 10 requests from same IP in last One minute then my Website should not respond to that IP.

Take care

Fakhar

Jul 17 '05 #3
"Eric Ellsworth" <ez@.com.com.com.com> wrote in message news:<J4********************@speakeasy.net>...
Here's a question:
What negative effects do you expect from people hitting your website with
fake requests?

Note that by the time your fake-request-rejection script has run, your web
server has already fielded the request and initialized PHP. Not matter what
output you do or don't send, the server will issue response headers once the
script finishes. So unless their requests automatically invoke some very
CPU-intensive process, just running the rejection script is already taking
about as much load as anything else. A more effective method is:
mod_throttle. See this article:
http://www.linux-mag.com/2003-02/lamp_01.html
for more.
Thanks for response. Well I already have some concepts of throttling but
what I want to know is how to implement the task, I mentioned.
I don't have very good concepts of Web Programming. I want to know where and
what should I code in my website that will perform IP detection and checking
of number of hits as any user visit my website?

Regards

Fakhar


The other poster's point about requests from proxies is also well noted. I
would be careful blocking traffic unless you know it's malicious, or unless
it has some specific negative effect.

Cheers,

Eric

Jul 17 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

11
by: Ohaya | last post by:
Hi, I'm trying to understand a situation where ASP seems to be "blocking" of "queuing" requests. This is on a Win2K Advanced Server, with IIS5. I've seen some posts (e.g.,...
1
by: Bryan Parkoff | last post by:
I work emulator project using 32 Bit emulated processor. The problem is that it attempts to allocate 4GB memory because some people want to use emulated instruction to read data from 4GB memory. ...
22
by: Ricky W. Hunt | last post by:
First, the subject probably doesn't use the correct terms but I'm not sure what it's called in VB. I'm writing a media player app. The subroutine that handles the "open file" button contains an...
5
by: mwebel | last post by:
Hi, is is also a C question but the program im writing is in C++ and it applies as well so: i have a program in the "main(int argc, const char ** argv)" and i want to make a library. for...
10
by: Konstantin Andreev | last post by:
Hello. Some time ago I asked in this conference, - How to use an ONLINE BACKUP to restore database onto another system? - but got no answers. Therefore I can conclude it is not possible. But......
25
by: pamelafluente | last post by:
Hi Guys, I have the following HTML code which is doing a GET to a page, say MyUrl.aspx : <body> <form name="form1" method="get" action="MyUrl.aspx" id="form1"> <input type="hidden"...
2
by: Noel Mosa | last post by:
Hi, i have a file in memory in a char* string(which i read using buffered ifstreams from c++) and want to write a fake read() function for a C program that usually reads from files. What id...
8
by: Alan | last post by:
Hello, I need to write a systemtray program to check every minute if a certain intranet page exists. Would "webBrowser.Navigate" and catching exceptions to it be a good choice in terms of load...
0
by: veera ravala | last post by:
ServiceNow is a powerful cloud-based platform that offers a wide range of services to help organizations manage their workflows, operations, and IT services more efficiently. At its core, ServiceNow...
0
by: VivesProcSPL | last post by:
Obviously, one of the original purposes of SQL is to make data query processing easy. The language uses many English-like terms and syntax in an effort to make it easy to learn, particularly for...
3
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 3 Jan 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). For other local times, please check World Time Buddy In...
0
by: jianzs | last post by:
Introduction Cloud-native applications are conventionally identified as those designed and nurtured on cloud infrastructure. Such applications, rooted in cloud technologies, skillfully benefit from...
0
by: mar23 | last post by:
Here's the situation. I have a form called frmDiceInventory with subform called subfrmDice. The subform's control source is linked to a query called qryDiceInventory. I've been trying to pick up the...
0
by: abbasky | last post by:
### Vandf component communication method one: data sharing ​ Vandf components can achieve data exchange through data sharing, state sharing, events, and other methods. Vandf's data exchange method...
2
by: jimatqsi | last post by:
The boss wants the word "CONFIDENTIAL" overlaying certain reports. He wants it large, slanted across the page, on every page, very light gray, outlined letters, not block letters. I thought Word Art...
0
Git
by: egorbl4 | last post by:
Скачал я git, хотел начать настройку, а там вылезло вот это Что это? Что мне с этим делать? ...
1
by: davi5007 | last post by:
Hi, Basically, I am trying to automate a field named TraceabilityNo into a web page from an access form. I've got the serial held in the variable strSearchString. How can I get this into the...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.