Skip to main content

⚙ HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IS A THIRD PARTY APP

HTTP Headers for Dummies

Whether you're a programmer or not, you have seen it everywhere on the web. At this moment your browsers address bar shows something that starts with "https://". Even your first Hello World script sent HTTP headers without you realizing it. In this article we are going to learn about the basics of HTTP headers and how we can use them in our web applications.
HTTP stands for "Hypertext Transfer Protocol". The entire World Wide Web uses this protocol. It was established in the early 1990's. Almost everything you see in your browser is transmitted to your computer over HTTP. For example, when you opened this article page, your browser probably have sent over 40 HTTP requests and received HTTP responses for each.
HTTP headers are the core part of these HTTP requests and responses, and they carry information about the client browser, the requested page, the server and more



When you type a url in your address bar, your browser sends an HTTP request and it may look like this:
01
02
03
04
05
06
07
08
09
10
11
12
GET /tutorials/other/top-20-mysql-best-practices/ HTTP/1.1
Host: net.tutsplus.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: PHPSESSID=r2t5uvjq435r4q7ib3vtdjq120
Pragma: no-cache
Cache-Control: no-cache

First line is the "Request Line" which contains some basic info on the request. And the rest are the HTTP headers.
After that request, your browser receives an HTTP response that may look like this:
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
HTTP/1.x 200 OK
Transfer-Encoding: chunked
Date: Sat, 28 Nov 2009 04:36:25 GMT
Server: LiteSpeed
Connection: close
X-Powered-By: W3 Total Cache/0.8
Pragma: public
Expires: Sat, 28 Nov 2009 05:36:25 GMT
Etag: "pub1259380237;gz"
Cache-Control: max-age=3600, public
Content-Type: text/html; charset=UTF-8
Last-Modified: Sat, 28 Nov 2009 03:50:37 GMT
Content-Encoding: gzip
Vary: Accept-Encoding, Cookie, User-Agent
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Top 20+ MySQL Best Practices - Nettuts+</title>
The first line is the "Status Line", followed by "HTTP headers", until the blank line. After that, the "content" starts (in this case, an HTML output).
When you look at the source code of a web page in your browser, you will only see the HTML portion and not the HTTP headers, even though they actually have been transmitted together as you see above.
These HTTP requests are also sent and received for other things, such as images, CSS files, JavaScript files etc. That is why I said earlier that your browser has sent at least 40 or more HTTP requests as you loaded just this article page.
Now, let's start reviewing the structure in more detail.
I use the following Firefox extensions to analyze HTTP headers:
Firebug


In PHP:
Further in the article, we will see some code examples in PHPPH
Please subscribe and share

Comments

Popular posts from this blog

How to send Anonymous Mails

Is there something serious you wish to say to someone without being known? Then, you're in the right place to learn how to send anonymous mail to somebody. Also, the good news is that sending anonymous mail is not one of the illegal things in the world. In my day-to-day activities, I send bulk anonymous mails to people worldwide. Sometimes, I make use of self-destructible email senders which means the mail recipients can  reply to my mail; talk less of knowing my identity. Sending anonymous email is a good way to disclose your mind and hide your identity without being traced. A lot of secret agencies and hackers need it to stay on top of their game. You're human and you deserve bro know how this secret is take place and the need to practice it. Before then, let's highlight some of  the relevant reasons why it's necessary to send anonymous mail to somebody. Whistle Blowing You can't whistle blow in an organization or a country without...

How to become a hacker [Complete tutorial for beginners]

Hackers are amazing! "This is what you read every time you go online. When you see the movies, their activities make you wow. In his article, your dreams on how to become a hacker in 15 minutes will be made a reality. For a start, you can start, you can start by knowing how to hack someone's password. To engage yourself in some illegal hustles l, then you really need to learn the art of hacking. The hacking you know today started in the 1970s when Dennis Ritchie invented the "C" programming language. However, the term originated at Massachusetts institute of Technology, a private research University in Cambridge, Massachusetts, in the 1960s. Note:  By hacker, I'm not referring to script kids who use ready-made software to run minor hacking tasks. I understand that becoming a hacker is tough, but every elite hacker today started somewhere. At some point, you would feel like giving up. The point you feel like giving up my s the point where you're about...

The two main steps in making scale drawing

Scale drawings show an image either reduced or enlarged in size. The change between the original and the scaled drawing is generally represented by two numbers separated by a colon, like 10:1 (read as “ten to one”). The difference between the ratio numbers represents the factor by which the scaled image is enlarged or reduced. So for a 10:1 scale ratio, a 1 inch (2.5 cm) drawing will be 10 inches (25 cm) in real life. Method  1  of 2: Adjusting Image Size by Hand 1 Measure the object you’ll be scaling.  For images that are irregularly shaped, measuring with a ruler or tape measure can be difficult. In these cases, outline the perimeter with a piece of string, then measure the length of the string to find the perimeter. For rough scaling of simple 2-D objects, you can probably get by with only measuring the width and height of the object. [1] It’ll be helpful when you start drawing the scaled image if the perimeter is broken up into segments,...