Skip to main content

⚙ HOW TO CRACK ANY ANDROID APP,GAME OR ANYTHING BEEN IS A THIRD PARTY APP

HTTP Headers for Dummies

Whether you're a programmer or not, you have seen it everywhere on the web. At this moment your browsers address bar shows something that starts with "https://". Even your first Hello World script sent HTTP headers without you realizing it. In this article we are going to learn about the basics of HTTP headers and how we can use them in our web applications.
HTTP stands for "Hypertext Transfer Protocol". The entire World Wide Web uses this protocol. It was established in the early 1990's. Almost everything you see in your browser is transmitted to your computer over HTTP. For example, when you opened this article page, your browser probably have sent over 40 HTTP requests and received HTTP responses for each.
HTTP headers are the core part of these HTTP requests and responses, and they carry information about the client browser, the requested page, the server and more



When you type a url in your address bar, your browser sends an HTTP request and it may look like this:
01
02
03
04
05
06
07
08
09
10
11
12
GET /tutorials/other/top-20-mysql-best-practices/ HTTP/1.1
Host: net.tutsplus.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5 (.NET CLR 3.5.30729)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Cookie: PHPSESSID=r2t5uvjq435r4q7ib3vtdjq120
Pragma: no-cache
Cache-Control: no-cache

First line is the "Request Line" which contains some basic info on the request. And the rest are the HTTP headers.
After that request, your browser receives an HTTP response that may look like this:
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
HTTP/1.x 200 OK
Transfer-Encoding: chunked
Date: Sat, 28 Nov 2009 04:36:25 GMT
Server: LiteSpeed
Connection: close
X-Powered-By: W3 Total Cache/0.8
Pragma: public
Expires: Sat, 28 Nov 2009 05:36:25 GMT
Etag: "pub1259380237;gz"
Cache-Control: max-age=3600, public
Content-Type: text/html; charset=UTF-8
Last-Modified: Sat, 28 Nov 2009 03:50:37 GMT
Content-Encoding: gzip
Vary: Accept-Encoding, Cookie, User-Agent
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Top 20+ MySQL Best Practices - Nettuts+</title>
The first line is the "Status Line", followed by "HTTP headers", until the blank line. After that, the "content" starts (in this case, an HTML output).
When you look at the source code of a web page in your browser, you will only see the HTML portion and not the HTTP headers, even though they actually have been transmitted together as you see above.
These HTTP requests are also sent and received for other things, such as images, CSS files, JavaScript files etc. That is why I said earlier that your browser has sent at least 40 or more HTTP requests as you loaded just this article page.
Now, let's start reviewing the structure in more detail.
I use the following Firefox extensions to analyze HTTP headers:
Firebug


In PHP:
Further in the article, we will see some code examples in PHPPH
Please subscribe and share

Comments

Popular posts from this blog

How to send Anonymous Mails

Is there something serious you wish to say to someone without being known? Then, you're in the right place to learn how to send anonymous mail to somebody. Also, the good news is that sending anonymous mail is not one of the illegal things in the world. In my day-to-day activities, I send bulk anonymous mails to people worldwide. Sometimes, I make use of self-destructible email senders which means the mail recipients can  reply to my mail; talk less of knowing my identity. Sending anonymous email is a good way to disclose your mind and hide your identity without being traced. A lot of secret agencies and hackers need it to stay on top of their game. You're human and you deserve bro know how this secret is take place and the need to practice it. Before then, let's highlight some of  the relevant reasons why it's necessary to send anonymous mail to somebody. Whistle Blowing You can't whistle blow in an organization or a country without...

How to Become a Computer Geek

Little known to most, there are many benefits to being a computer geek. In our high-tech society, being a computer guru can be one of the most high paying jobs available and computer geeks are in high demand, especially for network administrator jobs. By tapping into your inner geek, you can develop a most useful skill that will be sure to pay off later in life. 1 Learn what hardware is. Hardware is the physical stuff that makes up the computer and the media that is used to connect computers to other computers. 2 Learn what software is.  Software is the stuff that makes the computer work and it includes the applications, protocols, and the operating system. 3 Learn the spec (technical specifications) of your computer. There are some programs one can use in order to learn the specific specs a computer has, if you do not know off-hand. E.g. CPU-Z. 4.   Learn to use your computer commands, but use it when you need to.  Le...

How to Hack a Computer

 what this will accomplish.  While Windows 10 doesn't allow you to abuse the Administrator account like you could in past renditions of Windows, you can use a Windows 10 installation drive and Command Prompt to add a new administrator-enabled user that can see the main account's files and folders. Tips: you won't be able to change the password that the main account uses, but you should be able to access, edit, copy virtually anything from main account. Create a Windows 10 installation tool.  Make sure that you have a blank flash drive that is at least 8 gigabytes in size, then do the following: [1] Attach the flash drive to your computer. Open the  Windows 10 download page . Click  Download tool now Double-click the downloaded tool. Follow the on-screen prompts, making sure to use your flash drive as the installation location. Leave the flash drive plugged in after the creation process completes. Change your computer's boot order.  This is necessary in ord...