On Thu, Dec 22, 2011 at 3:26 PM, Blasko, Margo <[email protected]>
wrote:
> This is an intranet site that I don't manage - not sure what you mean
> about 'What HTTP headers is the web server offering when you HEAD
> the URL'.
HEAD is one of the HTTP commands ("methods"). It gets headers without
retrieving the content.
http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.4
By examining the HTTP headers, we can get an idea of what the server is
doing/thinking.
From a Linux shell:
$ *telnet www.purple.com 80*
Trying 153.104.63.227...
Connected to www.purple.com (153.104.63.227).
Escape character is '^]'.
*HEAD /purple.html HTTP/1.1
Host: purple.purple.com
*HTTP/1.1 200 OK
Date: Thu, 22 Dec 2011 20:40:48 GMT
Server: Unknown
Last-Modified: Sat, 26 Nov 2011 18:14:47 GMT
ETag: "46e94-299-3ea313c0"
Accept-Ranges: bytes
Content-Length: 665
Content-Type: text/html; charset=ISO-8859-1
*^]*
telnet> *quit*
Connection closed.
$
Stuff I sent (typed) is in bold green. ^] represents <CTRL>+<]>. One
has to type the blank line after the "Host:" header to signify the end of
the client request to the server.
I'm using Linux here because the Telnet client works better than
Microsoft's. You can use the one that comes with Windows, but it doesn't
handle raw TCP connections well. In particular, it doesn't echo what you
type, so you have to type blind. You could also use any other terminal
client that supports raw TCP connections. PuTTY does.
-- Ben
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
<BR>
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
<BR>
<BR>
---
<BR>
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
<BR>
or send an email to [email protected]
<BR>
with the body: unsubscribe ntsysadmin