• Contact Editorial Team
  • Advertise on YNOT
  • Submit PR
Friday, March 27, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home YNOT Features YNOT University

Tips On Preventing Bandwidth Theft, Hotlinking And File Leeching

admin by admin
July 25, 2003
in YNOT University
491
SHARES
Share on FacebookShare on Twitter

Bandwidth theft, hotlinking, file leeching, bandwidth leeching, external linking, remote linking, deep linking and direct linking are all words and phrases used to describe a single problem faced by many Webmasters.Bandwidth theft, hotlinking, file leeching, bandwidth leeching, external linking, remote linking, deep linking and direct linking are all words and phrases used to describe a single problem faced by many Webmasters. They describe the practice of building Web pages that contain unauthorized content links to files hosted by another site.

Notice that I said content links and not navigation links that lead to another site. Content links are file references that the browser fetches to draw the page such as images, style sheets, scripts or even complete Web pages that are rendered within a frame. In other words, these are embedded content or embedded objects within an HTML page.

The result of hotlinking is that the offending site is able to present its pages without paying for the bandwidth needed to serve up the stolen content. The victim’s site ends up paying the bandwidth expense for serving up the files without gaining any page views. Many Webmasters would not mind if an image were copied and hosted by another site, especially if permission was sought in advance. The objection in the case of hotlinking is paying bandwidth bills for someone else’s benefit.

There are two levels at which you can apply controls to prevent hotlinking. One option is to control it at the Web server level. In Apache, this is typically implemented using mod_rewrite, while in iis this would be implemented using an isapi filter. The other possibility is to use a scripting facility such as apache + php or iis + asp to control access to the resources to be protected from hotlinking. Whatever bandwidth protection tool or technique is picked to combat hotlinks, the task remains the same. First, decide if the request is a permitted legitimate link or a hotlink originating from another site and second, send the file or drop the hotlinked request. Studying the solutions will show that the mechanisms that are used are the http-referrer header, browser cookies, dynamic session identifiers and dynamic link manipulation.

Http-referrer is an http request header sent by the browser that tells the server or script what site and page contained the current request. There are certain notable exceptions that must be accommodated. The http-referrer value will be blank if the request was a URL type-in, if an intervening proxy server deleted it, if the request is an http:// reference originating from an https:// originator, if the request is being masked by Internet privacy software or if the request is being modified by browser privacy settings. The http-referrer can also be a nonsensical string if it is being masked by Internet privacy software or browser privacy settings.

The biggest security hole in depending on the http-referrer header is that a blank referrer must almost always be permitted in the server settings. This is necessary to accommodate legitimate users who are reaching the site through normal means but presenting a blank referrer string. In this scenario it is trivial to create a Web page that will always present a blank referrer. One method is to use JavaScript to write the image links at the client browser. A second method is to do a meta-refresh. Either method will cause a blank referrer to be sent to the server.

A browser cookie is just another http request header that returns information which the server has previously requested the client to store and return with every http request. When client cookies are available, they can be a very reliable tracking device.

However, as concerns for privacy grow on the Internet, increasing numbers of users are using inaccurate http-referrer headers and turning off client browser cookies. Of course, this reduces the effectiveness of depending on these features as identifiers for bandwidth protection purposes.

Dynamic session identifiers and dynamic link manipulation refer to the technique of modifying parts of URLs for each unique client. The limiting factor is the requirement that the pages containing such links cannot be static HTML. Each page request will need to have been uniquely created by a scripting engine such as PHP, ASP, ASP.net, ColdFusion or Java. The server works harder, the user cannot cache the page and search engines may have a hard time crawling these pages if query strings are involved.

There is now an isapi filter-based product for iis that overcomes the difficulties normally inherent in dynamic URL manipulation. The company is aptly called coldlink.com, and they have an in-depth bandwidth protection demonstration site where you can see their product prevent hotlinking on an iis server. It protects any kind of file content and works with both static and dynamic HTML pages without depending on cookies or http-referrer headers.

Internet searches on Google, AllTheWeb, Yahoo or MSN that will yield useful updated instructions and source code for implementing bandwidth protection include:

· hotlink .htaccess

· hotlink mod_rewrite

· hotlink php symlink

· hotlink webmasterworld

· leechblocker

As an aside, some Webmasters have also been making use of non-technical means by enforcing their legal rights. This is particularly true if the offending action is within the parameter of the Digital Millennium Copyright Act (DMCA), and is specifically mentioned. Success in following this avenue can be mixed. The first step is a strongly worded cease and desist letter. In some jurisdictions, a formal cease and desist letter is a necessary step to further prosecution. A particularly nice touch is to have your lawyer send the initial email and include your ISP.

Bob can be contacted by email through his Web site at http://coldlink.com/. The original version of this article can be viewed at http://wordworx.com/ and may have additional information added in the future.

Share196Tweet123
admin

admin

YNOT Admin wields his absolute power without mercy. When he's not busy banning spam comments to hell he enjoys petting bunnies and eating peanut butter. He recommends everyone try the YNOT Mail (ynotmail.com) email marketing platform and avoid giving their money to mainstream services that hate adult companies.

Related Posts

Adult Business News

UK Online Safety Act Cuts Pornhub Traffic 36% as Age Verification Takes Effect

December 13, 2025
Adult Business News

The Cambassador: Lindsey Banks, Flirt4Free and Brand Representation

September 5, 2018
Adult Business News

ImLive’s Mere Menezes Siqueira Manages Models, Makes the Machine Work

August 23, 2018
Corey Silverstein of Adult.law
Adult Business News

Silverstein Says: 3 Legal Issues Cam Companies, Models Must Pay Attention To

August 22, 2018
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

Chelsea Poe Continues Re-release Campaign with “The Dinner Party”

March 26, 2026
Tech Savy Crew Expands Adult SEO Services With 'AI-First Strategy'

Tech Savy Crew Expands Adult SEO Services With ‘AI-First Strategy’

March 26, 2026
Honey Play Box Officially Launches the “Vibrosa Mini”

Honey Play Box Officially Launches the “Vibrosa Mini”

March 26, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites
  • AI Girlfriend
  • live porn Vibra Game

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Adult Business News
  • Adult Industry Legal News
  • Adult Novelty News
  • Porn Star & Adult Talent News
  • Tech News for Adult Webmasters
  • Video Game News for Adults
  • Interviews
  • Opinions
  • YNOT Industry Wire
  • Newsletters

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.