Skip to main content

Home/ Computer Science Knowledge Sharing/ Group items tagged url

Rss Feed Group items tagged

Islam TeCNo

Uniform Resource Identifier - Wikipedia, the free encyclopedia - 0 views

shared by Islam TeCNo on 16 Jun 09 - Cached
  • In computing, a Uniform Resource Identifier (URI) consists of a string of characters used to identify or name a resource on the Internet. Such identification enables interaction with representations of the resource over a network (typically the World Wide Web) using specific protocols. Schemes specifying a specific syntax and associated protocols define each URI. Contents [hide]
    • Abdelrahman Ogail
       
      I've confused between URL & URI till reading this article !
    • Islam TeCNo
       
      URL no3 men el URI :D ....ana faker eno kont shoft el 7eta deh fe ketab 3an el HTTP bas nesetha .......Zanks Zikas Again
  • A Uniform Resource Name (URN) functions like a person's name, while a Uniform Resource Locator (URL) resembles that person's street address. The URN defines an item's identity, while the URL provides a method for finding it. The ISBN system for uniquely identifying books provides a typical example of the use of typical URNs. ISBN 0486275574 (urn:isbn:0-486-27557-4) cites unambiguously a specific edition of Shakespeare's play Romeo and Juliet. In order to gain access to this object and read the book, one would need its location: a URL address. A typical URL for this book on a unix-like operating system might look like the file path file:///home/username/RomeoAndJuliet.pdf, identifying the electronic book saved in a local hard disk. So URNs and URLs have complementary purposes.
Janos Haits

Cookieserve - Free online cookie checker for websites - Enter the URL of your website a... - 0 views

  •  
    "Free Cookie Checker Tool for Websites Identifying cookies being used and understanding their purpose is a critical step in your website's privacy compliance. Enter the URL of your website and we'll scan it for cookies."
Islam TeCNo

What's in an HTTP request? - 0 views

shared by Islam TeCNo on 15 Jun 09 - Cached
Ahmed Mansour liked it
  • These headers tell us which web server you were trying to contact.  If that seems odd, bear in mind that many web sites can be "hosted" on a single server, so when the request is received it needs to know which web site you were attempting to access
    • Islam TeCNo
       
      el server momken yekon 3aleh aktar men site ....3ashan keda lama bab3t request ba2olo bardo ana 3ayez site eh !!
  • The request method is usually either "GET" or "POST".  Basically if you fill in and submit a form on a web page it might generate a POST request (or it might be "GET"), whereas if you just click on a link, or activate one of your browser's "bookmarks" or "favourites", then the request method will always be "GET". Therefore, if it's "POST", we can tell that a form was definitely submitted.  The contents of the form would appear here, and there would also be some "Content-" headers describing the data. Web browsers generate two kinds of "POST" data: either "multipart/form-data", which is used when uploading files to a web server, or the more common "application/x-www-form-urlencoded".
    • Islam TeCNo
       
      el 7eta deh mohema ....we fe anwa3 tania bardo 3'er el GET we el POST
  • The "referer" header tells us which document referred you to us - in essence, if you followed a link to get to this page, it is the URL of the page you came from to get here.
    • Islam TeCNo
       
      el Referer by2ol lel server el page eli enta gaii menha ....we a3taked deh el tare2a eli fe sites betsta5dmha 3ashan temna3 maslan en sora aw keda tetshaf ela men el site zat nafso
  • ...2 more annotations...
  • Connection control Connection:keep-alive Keep-Alive:300 These headers are used to fine-tune the network traffic between you and the web server.  They don't tell us much, except a little about the capabilities of your web browser.
    • Islam TeCNo
       
      kan nefsi yekon fe shar7 lel 7eta deh aktar !!
  • Authorisation Username:not present If you have "logged in" to a web site, your username appears here. Note that this only applies to web sites which use proper HTTP authentication - typically, a "login" window pops up and you get three chances to enter your username and password, otherwise you see a page which says "Authentication Required" or similar.  It doesn't apply to web sites where the "login" is a separate page. It's also possible to supply the username and password in the URL you tell your browser to visit - for example, http://user:password@www.example.com/.  In that case, the username would appear here too.
    • Ahmed Mansour
       
      msh fahem el goz2 dah 2wey !! .. 7d yewad7ely please ...
    • Islam TeCNo
       
      ya3ni ya mans a7yanan fe sites bykon feha UserName we password 3an tare2 el HTTP protocol .....ya3ni el mail maslan aw cisclub dol fehom username we password mesh 3an tare2 el HTTP protocol ....el HTTP protocl el username we el pass beto3o bytlbo menak 2abl ma td5ol 3ala el page asasn we bytl3lk keda pop up tekteb feha
  •  
    really very important and useful article ... thanks tecno very match :P
  •  
    Nice Article Tecno..Go On
Janos Haits

VirusTotal - 0 views

  •  
    VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by the antivirus industry.
Janos Haits

AV-ATLAS - The Threat Intelligence Platform by AV-TEST - 0 views

  •  
    "The Threat Intelligence Platform by AV-TEST The threat situation around dangerous URLs, spam mails and software downloads is always in view thanks to up-to-date data in real time. With AV-ATLAS, the AV-TEST Institute presents you the Threat Intelligence Platform, which offers comprehensive Cyber Security Services for the defense against cyber threats."
Janos Haits

AV-ATLAS - The Threat Intelligence Platform by AV-TEST - 0 views

  •  
    "The Threat Intelligence Platform by AV-TEST The threat situation around dangerous URLs, spam mails and software downloads is always in view thanks to up-to-date data in real time. With AV-ATLAS, the AV-TEST Institute presents you the Threat Intelligence Platform, which offers comprehensive Cyber Security Services for the defense against cyber threats."
Janos Haits

OExchange - 0 views

  •  
    OExchange makes it possible to share any URL-based content with any service on the web. It defines: A common way for services to receive content, removing any and all service-specific integration requirements A discovery feature so services can publish themselves and their endpoints, making it possible to integrate with services you didn't even know about at development time A decentralized, user-centric model for saving preferred services, making sharing more personal
Janos Haits

Onion.Ws Tor2Web Gateway - 0 views

  •  
    "Onion.ws is a darknet gateway or Tor2Web proxy. Simply replace .onion with .onion.ws in your browsers url bar, press go and you will be redirected to that darknet site without the need to download or configure any new software such as Tor and I2P."
Janos Haits

Onion.Ws Tor2Web Gateway - 0 views

  •  
    "Onion.ws is a darknet gateway or Tor2Web proxy. Simply replace .onion with .onion.ws in your browsers url bar, press go and you will be redirected to that darknet site without the need to download or configure any new software such as Tor and I2P."
Janos Haits

Best AI Writer, Content Generator & Copywriting Assistant | Easy-Peasy.AI - 0 views

  •  
    "Why choose one AI tool when you can have them all? MARKY: ChatGPT like AI chat with real-time data, vision, and PDF AI Chat Build no-code AI Bots by training on your own data. Embed on any website or share via URL"
Mohamed Abd El Monem

XML Introduction - What is XML? - 0 views

  • Introduction to XML
    • Mohamed Abd El Monem
       
      a3tkd de tutorial kowayesa le el XML we 3amlen quiz kda 20 so2al fe el a5er yoshofk fhmt walla la2 :D
  •  
    nice one hady ..keep it down:P :D
1 - 11 of 11
Showing 20 items per page