Yoav,

Ok, thank you.  I appreciate all your help.

Larry Nobs

----- Original Message ----- 
From: "Shapira, Yoav" <[EMAIL PROTECTED]>
To: "Tomcat Users List" <[EMAIL PROTECTED]>
Sent: Tuesday, May 11, 2004 9:37 AM
Subject: RE: Filter on url example - Filter out hack attempts


>
> Hi,
>
> >I have been looking at the Access Logs daily.
> >
> >Anytime a legitimate user accesses my site everything is preceded with
> a
> >GET
> >or POST and a jsp or gif that I can recognize.  Initially a session
> starts
> >off with a plain GET / HTTP/1.1 or 1.0 so I should allow these, but all
> >other legitimate usage mentions my files.  It sounds like you are
> saying
> >that there are other requests that are not in the access log?
>
> No, that's not what I'm saying.  I'm saying you have a lot to learn with
> regards to the Servlet API.  The information returned from the
> getRequestURI method in HttpServletRequest is not the same information
> that is logged in the access logs.  (And for that matter, the latter is
> highly configurable whereas the former is strictly defined).  So that's
> why I said you should read and understand the HttpServletRequest
> interface and its methods.
>
> Yoav Shapira
>
>
>
> This e-mail, including any attachments, is a confidential business
communication, and may contain information that is confidential, proprietary
and/or privileged.  This e-mail is intended only for the individual(s) to
whom it is addressed, and may not be saved, copied, printed, disclosed or
used by anyone else.  If you are not the(an) intended recipient, please
immediately delete this e-mail from your computer system and notify the
sender.  Thank you.
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>
>
>
>



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to