Solved

How do I authenticate usage from an end user, not a user redirected from another website

Posted on 2004-08-29
5
177 Views
Last Modified: 2010-03-04
I have a couple of websites that use frontpage under an apache web server. I also have a rival who has put links to my sites that puts my pages inside his formatting and he is removing all of the broswer navigattion buttons as well. Is there a way for me to stop him from displaying my pages within his? Asking him to stop didn't work.
0
Comment
Question by:wmt1954
5 Comments
 
LVL 38

Accepted Solution

by:
yuzh earned 63 total points
ID: 11928794
You can use .htaccess file to control access to your web dir.

Have a look at the followings to learn more about .htaccess file:

http://apache-server.com/tutorials/ATusing-htaccess.html
http://sniptools.com/vault/windows-apache-and-htaccess-authentication.htm

also:
http:Q_20768724.html
0
 
LVL 15

Assisted Solution

by:samri
samri earned 62 total points
ID: 11933337
You could check HTTP_REFERER header in the request.  This is taking into consideration that when you visited certain page, you may be following a link on that page to another link.  Which in this case, your "rival" may have a link or some method to "pull" your website and display in a frame, or a different browser window.  This would cause your Apache to get where the request is coming from.  You could examine this header, and act accordingly.

Most browser would provide this, but some may not, and some could be configured no to sent that at all.  And some proxy server may be blocking this too.   Bottom line is - it is possible to use HTTP_REFERER, but not that reliable.

Commonly this kind of blocking would be for images, but should be possible for other types as well.  Another difference with image theft is that, in image-theft prevention, you would be allowing REFERER from your own site, and blocking other, while in this case, you only want to block if the REFERER is coming from your rival site.

I do not have the code in handy (way too sleepy now :), but information on the following link should give you some idea.

http://www.allmyfaqs.com/faq.pl?action=browse&diff=1&id=Prevent_bandwidth_theft
http://www.bloglines.com/citations?siteid=34559&itemid=64

good luck.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As Wikipedia explains 'robots.txt' as -- the robot exclusion standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to prevent cooperating web spiders and other web robots from accessing all or part of a websit…
Hi, in this article I'm going to teach you how to run your own site, and how to let people in (without IP). I'll talk about and explain each step... :) By the way, everything in this Tutorial is completely free and legal. This article is for …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question