English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I have firefox and the addon NoScript installed. When i'm surfing the internet and click on the NoScript options tab theres http://127.0.0.1;1025 on everysite i go to. What is this? A hacker?

2007-08-17 19:49:41 · 3 answers · asked by Pommy 2 in Computers & Internet Security

3 answers

Hi
This is your internet provider IP, which is Yours,
and since you have Java disabled it will show because it stops the jave and there is nothing to display, it will be empty page
disable this addon, and you will notice that you will not have such problem
it you need protection from spyware, You can download it from
http://bj.b7thy.com
it is free
Good luck

2007-08-17 20:07:45 · answer #1 · answered by S. Sulivan 5 · 0 1

mod_proxy_core got X-Sendfile Support

Posted by jan on Saturday, July 22, 2006

As promissed mod_proxy_core would combine the features from mod_proxy and mod_fastcgi.

mod_proxy gave the balancers, mod_fastcgi gave its fail-over handling and now support for X-Sendfile.

The implementation for the feature is a bit different than it was done in mod_fastcgi.

The old implementation only replaced the content-body with the static-file and sent it out. The new implementation does it slightly different and gains a whole set of benifits.

When the X-Sendfile header is detected (and is allowed in the config) the content-body is ignored and a internal redirect is done. mod_proxy_core takes itself out of the loop and mod_staticfile takes over the request.

mod_staticfile can do all the magic:
setting Last-Modified and ETag
handling ‘304 Not Modified’
handling Range requests
compression
Setup
The setup is as before:

$HTTP["url"] =~ "^/bugme(/|$)" {
proxy-core.balancer = "round-robin"
proxy-core.protocol = "http"
proxy-core.backends = ( "127.0.0.1:2000" )
proxy-core.allow-x-sendfile = "enable"
}
On port 2000 I have a small $ nc -l 2000 running to simulate a super complex, high secure application. $ wget --header='Accept-Encoding: gzip' http://127.0.0.1:1025/bugme/upload.html is my browser replacement:

GET /bugme/upload.html HTTP/1.0
X-Forwarded-For: 127.0.0.1
X-Host: 127.0.0.1:1025
X-Forwarded-Proto: http
User-Agent: Wget/1.10.2 (Red Hat modified)
Accept: */*
Host: 127.0.0.1:1025
Accept-Encoding: gzip
FOO: foo

HTTP/1.0 200 OK
X-Sendfile: /path/to/upload.html
... and there we have the compressed upload.html:

$ ls -l upload.html
-rw-rw-r-- 1 jan jan 661 Sep 26 2005 upload.html
$ ls -l /path/to/upload.html
-rw-rw-r-- 1 jan jan 1193 Sep 26 2005 /path/to/upload.html
All you have to do in your application is setting the X-Sendfile header:

header("X-Sendfile: /path/to/upload.html");
?>
or in Rails: response.headers["X-Sendfile"] = "/path/to/upload.html"
Tags mod_proxy_core, Sendfile, X
Meta 1 trackback, no comments, permalink, rss, atom

look at this web site maybe it will explain things better;
http://blog.lightpd.net/articles
not to worry just read there codes for foxfire

2007-08-18 03:18:10 · answer #2 · answered by Anonymous · 0 0

127.0.0.1 is the localhost, aka your computer. So don't block it.

2007-08-18 04:09:35 · answer #3 · answered by ? 6 · 0 0

fedest.com, questions and answers