| Welcome to WebmasterWorld Guest from 22.214.171.124 |
register, free tools, login, search, pro membership, help, library, announcements, recent posts, open posts,
|Become a Pro Member|
Ouch, here is a thread for you.
Tiny yet featureful HTTP client. With deflate & multipart POST support.
UA - Needle/0.4.8 (Node.js v0.8.22; darwin x64)
Single request from 126.96.36.199x.(TELUS CA). I am starting to see a few of these (JS Based)poking around .
Telus? Oh, ###. That's an utterly legitimate human IP.
Saw the thread title and though Woo Hoo, Pfui's back. Oh well.
I saw one a few days ago but was happy to see it blocked.
Ixquick returned only two real entries for the UA, both site logs (why do people allow that?!). Following an advert only returned a "this is popular, use it here" kind of page for cloud hosting.
I know telus is basically a humnan service but I have several bad groups and singles within their ranges.
:: idly wondering if a generic UA block in the form
("version zero point anything")
would lock out anyone you didn't mean to lock out ::
Not so bothered 'bout the needle, it's that impending haystack that's worrisome!
The point is that more and more AJAX based scarper scripts are out there being released into the wild. At this point HEADERS are very effective against that. Node.js is a serverside JS technology BTW.
|Node.js is a serverside JS technology BTW. |
Thanks for pointing that out. Sometimes I think all things js are browser-side.
2 down, 2 to go.
Have to say you are becoming obscure, Lucy. :)
See nearby post with similar timestamp :) This one was something about "generation of the thoroughly smug".
The snipped post gave a postcount of four, though I only ever saw two.
Fair enough. :)
All trademarks and copyrights held by respective owners. Member comments are owned by the poster.
WebmasterWorld is a Developer Shed Community owned by Jim Boykin.
© Webmaster World 1996-2014 all rights reserved