![]() |
Anti Hotlinking Script!
Any guys good with Php around? How did this guy make this?
http://www.pornvideoworld.com/avi/ I found it at this message board thread where he mentions about it being a php script http://www.videosboard.com/cgi-bin/i...um=1&topic=544 any help would be appreciated, having my own little war with hotlinkers right now |
The AVI file is a PHP script which validates the refferer. If there is no refferer, it sends a redirect instead. Look:
vhosts]# telnet www.pornvideoworld.com 80 Trying 216.131.82.98... Connected to pornvideoworld.com. Escape character is '^]'. GET /avi/xxx.avi HTTP/1.1 host:www.pornvideoworld.com HTTP/1.1 302 Found Date: Wed, 13 Feb 2002 04:02:44 GMT Server: Apache/1.3.19 (Unix) (Red-Hat/Linux) mod_ssl/2.8.1 OpenSSL/0.9.6 FrontPage/4.0.4.3 PHP/4.0.4pl1 X-Powered-By: PHP/4.0.4pl1 Location: fuck.html Transfer-Encoding: chunked Content-Type: text/html 0 Connection closed by foreign host. |
All times are GMT -7. The time now is 01:05 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123