Điều này thú vị tiện ích này làm cho máy chủ để báo cáo trình duyệt khác nhau, do đó tạo ra một "sai lầm" ghi: Trong khi đây là một "phải có" cho trình duyệt của tôi, nó không thay đổi dữ liệu các tập tin đăng nhập của bạn hiển thị về các trình duyệt khách. | This material is copyright and is licensed for the sole use by Thomas Rosenblum on 4th December 2008 1010 SW High Ave. Topeka 66604 Chapter 8 This interesting add-on causes the server to report different browsers thus creating a false record filler Agent Default Internet Explorer 6 Windows XPj Netscape. Windows XP Opera Windows XP Options While this is a must have for my browser it does change the data that your log files display about the guest browser. In my opinion this is the end result of Browser Wars . In any event the user agent string is an important field and can tell you a lot about who is visiting and what they wanted or what they were doing. One of my favorite tools is the one found at http . This interesting online tool allows you to cut and paste in a string that you may not recognize and it will break it down. Recently I used this for a client to discover that the string I could not identify was a spybot string. I tracked the IP back through the logs to discover an attempted break in. Tracking that back further I found a compromised site that was being used as a base of attack. It had a back door installed. We notified the site owner and it was removed immediately. You can find an up-to-date list of agents on this site http db. This is an impressive list of browsers site validators robots and more. The following site has a complete list of user agent strings that I encourage you to take a look at and familiarize yourself with all these strings http pages name All Understanding the machines running the agents visiting will give you an idea of the capability of breaking into your site. For instance a link checker agent is not likely to be an attacker. Other items you want to watch for are multiple connections that are quickly made. This might be a slurper or a site sucker whom you can identify using the user agent string tool. The key to analysis is to .