Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
URL Obscuration, Obfuscation and General Trickery
(Page 4 of 4)
Making Matters Worse: Combining Deceptive Tricks
As if these tricks weren't bad enough
taken individually, we can have some real fun by combining
them! For example, start with the regular PC Guide URL:
And convert it to IP:
Then add some bogus authentication
And convert the real URL into a single
number so it looks like a document on the CNN web site:
Alternately, we can use the octal
form, and even include lots of extra leading zeroes just for fun:
Believe it or not, this is just the
tip of the iceberg. In some browsers, even the IP address numbers can
be expressed using percent sign ASCII encoding!
While quite irritating, I must give
these people points for creativity at leastsome of the tricks
are quite ingenious. At the same time, their inventiveness is potentially
hazardous. While these false URLs are usually more a waste of time than
anything harmful, there are sometimes good reasons a person would go
to great lengths to hide the identity of a resource. Deceptive URLs
are just one more danger that network administrators must deal with
Key Concept: The syntax of Internet URLs includes many elements that provide great flexibility in how URLs can be constructed. Unfortunately, these capabilities of expression are now often abused by people who create intentionally obfuscated URLs to trick users into accessing their Web sites and other resources. Some of these can be potentially hazardous, which means that care is required before clicking unknown links or accessing strange URLs.
|If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!|
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.