Question:
What is http://127.0.0.1;1025?
Pommy
2007-08-17 23:49:41 UTC
I have firefox and the addon NoScript installed. When i'm surfing the internet and click on the NoScript options tab theres http://127.0.0.1;1025 on everysite i go to. What is this? A hacker?
Three answers:
S. Sulivan
2007-08-18 00:07:45 UTC
Hi

This is your internet provider IP, which is Yours,

and since you have Java disabled it will show because it stops the jave and there is nothing to display, it will be empty page

disable this addon, and you will notice that you will not have such problem

it you need protection from spyware, You can download it from

http://bj.b7thy.com

it is free

Good luck
2007-08-18 07:18:10 UTC
mod_proxy_core got X-Sendfile Support



Posted by jan on Saturday, July 22, 2006



As promissed mod_proxy_core would combine the features from mod_proxy and mod_fastcgi.



mod_proxy gave the balancers, mod_fastcgi gave its fail-over handling and now support for X-Sendfile.



The implementation for the feature is a bit different than it was done in mod_fastcgi.



The old implementation only replaced the content-body with the static-file and sent it out. The new implementation does it slightly different and gains a whole set of benifits.



When the X-Sendfile header is detected (and is allowed in the config) the content-body is ignored and a internal redirect is done. mod_proxy_core takes itself out of the loop and mod_staticfile takes over the request.



mod_staticfile can do all the magic:

setting Last-Modified and ETag

handling ‘304 Not Modified’

handling Range requests

compression

Setup

The setup is as before:



$HTTP["url"] =~ "^/bugme(/|$)" {

proxy-core.balancer = "round-robin"

proxy-core.protocol = "http"

proxy-core.backends = ( "127.0.0.1:2000" )

proxy-core.allow-x-sendfile = "enable"

}

On port 2000 I have a small $ nc -l 2000 running to simulate a super complex, high secure application. $ wget --header='Accept-Encoding: gzip' http://127.0.0.1:1025/bugme/upload.html is my browser replacement:



GET /bugme/upload.html HTTP/1.0

X-Forwarded-For: 127.0.0.1

X-Host: 127.0.0.1:1025

X-Forwarded-Proto: http

User-Agent: Wget/1.10.2 (Red Hat modified)

Accept: */*

Host: 127.0.0.1:1025

Accept-Encoding: gzip

FOO: foo



HTTP/1.0 200 OK

X-Sendfile: /path/to/upload.html

... and there we have the compressed upload.html:



$ ls -l upload.html

-rw-rw-r-- 1 jan jan 661 Sep 26 2005 upload.html

$ ls -l /path/to/upload.html

-rw-rw-r-- 1 jan jan 1193 Sep 26 2005 /path/to/upload.html

All you have to do in your application is setting the X-Sendfile header:




header("X-Sendfile: /path/to/upload.html");

?>

or in Rails: response.headers["X-Sendfile"] = "/path/to/upload.html"

Tags mod_proxy_core, Sendfile, X

Meta 1 trackback, no comments, permalink, rss, atom



look at this web site maybe it will explain things better;

http://blog.lightpd.net/articles

not to worry just read there codes for foxfire
J
2007-08-18 08:09:35 UTC
127.0.0.1 is the localhost, aka your computer. So don't block it.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...