Archive of UserLand's first discussion group, started October 5, 1998.

Re: Piking behind firewalls [In Progress]

Author:David Valentine
Posted:5/10/2000; 4:16:40 PM
Topic:Piking behind firewalls
Msg #:17185 (In response to 17182)
Prev/Next:17184 / 17186

What might be a good thing to include into the hash is the IP address of the computer making the request.

Might break with web caches.

Will most likely break with a NAT, if pike creates the hash.




This page was archived on 6/13/2001; 4:55:09 PM.

© Copyright 1998-2001 UserLand Software, Inc.