Solved

change httpreferer on internet explorer

Posted on 2004-09-18
8
155 Views
Last Modified: 2013-11-18
Hello Experts,

I log in into a webpage, it sets session cookie with session id, username and password.
I need to post some data to script with specified httpreferer.

Thanks.

0
Comment
Question by:ccsking
  • 3
  • 2
8 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 250 total points
ID: 12090862
either use a proxy, or perl with LWP, or wget, or lynx, or ..
0
 
LVL 9

Assisted Solution

by:_GeG_
_GeG_ earned 250 total points
ID: 12093019
there are a lot of spoof programs out there, do a google for quickspoof or zspoof or dspoof
0
 

Author Comment

by:ccsking
ID: 12094824
GeG  could you suggest one?
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 
LVL 9

Expert Comment

by:_GeG_
ID: 12096095
sorry, no. I don't use them, and I don't know which of these supports post.
If you have access to a server, some 5 lines PHP might help you :D
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 12096809
hmm, I simply use mozilla, firebird, opera, lynx, ... they all can spoof by default or with using plug-ins
but the title says IE :-(
0
 
LVL 9

Expert Comment

by:_GeG_
ID: 12097137
just out of curiosity, how do you do it with opera?
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Using Outlook for iOS securely 2 43
PCI Compliance Free scan 2 87
How to keep XP in VM over Ubuntu from being Virus'd 22 92
I wonder how people fake their ip address? 3 37
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
The purpose of this video is to demonstrate how to set up the WordPress backend so that each page automatically generates a Mailchimp signup form in the sidebar. This will be demonstrated using a Windows 8 PC. Tools Used are Photoshop, Awesome…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question