At this time, your statistical system (perhaps Quantum, Baidu, etc.) will of course not be able to count. However, we can use some anti-attack software to achieve this, but the effect is sometimes not obvious. Below I provide a piece of PHP code, which can have a certain anti-CC effect.
Main function: Refreshing the page more than 5 times within 3 seconds will point to the local http://127.0.0.1
Copy code The code is as follows:
$P_S_T = $t_array[0] + $t_array[1];
$timestamp = time();
session_start();
$ll_nowtime = $timestamp ;
if (session_is_registered('ll_lasttime')){
$ll_lasttime = $_SESSION['ll_lasttime'];
$ll_times = $_SESSION['ll_times'] + 1;
$_SESSION['ll_times'] = $ll_times;
}else{
$ll_lasttime = $ll_nowtime;
$ll_times = 1;
$_SESSION['ll_times'] = $ll_times;
$_SESSION['ll_lasttime'] = $ll_lasttime;
}
if (($ll_nowtime - $ll_lasttime)<3){
if ($ll_times>=5){
header(sprintf("Location: %s",'http://127.0.0.1'));
exit;
}
}else{
$ll_times = 0;
$ _SESSION['ll_lasttime'] = $ll_nowtime;
$_SESSION['ll_times'] = $ll_times;
}
The following is the reply from netizens:
SESSION relies on COOKIE Yes, what should I do if I block COOKIE?
TCP/IP -> apache -> php This process has consumed a lot of things. At this point, there are no more calculation operations and MYSQL connections.
Just these few lines of code cannot solve the problem. At most, it is disabled for those operations where you press F5 to refresh the page in the browser.
Therefore, it is recommended that everyone install a firewall to prevent CC attacks on the server to achieve better results. You can go to s.jb51.net to view related software.
http://www.bkjia.com/PHPjc/324829.htmlwww.bkjia.comtruehttp: //www.bkjia.com/PHPjc/324829.htmlTechArticleAt this time, of course your statistical system (maybe Quantum, Baidu, etc.) cannot count. However, we can use some anti-attack software to achieve it, but the effect is sometimes unclear...