Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Understanding CS(Referer)

Posted on 2004-03-25
2
Medium Priority
?
925 Views
Last Modified: 2008-03-06
I'm digging thru my server logs and am puzzled by inconsisant entries in the CS(Referer) field. I have an asp page that is being called from one page on my site (actully, it's being called from a Flash movie sitting in a page on my site...let's wait to see if that's relavent).

When i sort out the log and look at only those calls to this particular ASP I find the CS(Referer) is sometimes blank and sometimes contains the full url & queryString of itself. IOW, if the page in question is called (along with the query string:
http://www.juststeve.com/compliance/auditAnswer.asp?loginID=7975&uQzID=140722&AnswerID=&hasClicked=false&thisDate=Wed+Mar+24+18:44:38+GMT-0600+2004

Some of the browsers hitting my site (c-ip) will show a blank and some will spit that full url string back into the log. It seems obvious there's some client-side caching stuff going on in the user's network...i'm looking for more details on that.

thankx
--steve...
0
Comment
Question by:juststeve
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 2

Accepted Solution

by:
dmenard earned 1000 total points
ID: 10685984
The referer is not completely reliable : some browsers have settings to let the user choose if she wants to send the referrer or not.
There are also some webs/utilities which will allow a user to do the same thing.
Last, one can always paste the full url in the location bar of the browser and hit your page without any referrer.
0
 
LVL 2

Expert Comment

by:dmenard
ID: 10686241
Thank you for accepting my answer : you gave me my first expert points (I'm new to EE)
Glad to help !
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

First of all, clustering IIS is something you should rarely consider doing. In almost all cases, Microsoft Network Load Balancing (NLB) (http://technet.microsoft.com/en-us/library/cc758834(WS.10).aspx) is a much better solution when you need to p…
Debug Tools to analyse IIS process: This article focus on taking memory dumps from IIS to determine which code is taking more time and to analyse which calls hangs/causes more CPU usage. To take dumps,download the following. Install1: To st…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Director of Solution Engineering Jon Tobin discusses the function and features of Percona Server for MongoDB. How Percona can help Percona can help you determine if Percona Server for MongoDB is the right solution for …
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question