Knowledge

URL redirection

Source đź“ť

318:. The goal of misleading redirects is to drive search traffic to landing pages, which do not have enough ranking power on their own or which are only remotely or not at all related to the search target. The approach requires a rank for a range of search terms with a number of URLs that would utilize sneaky redirects to forward the searcher to the target page. This method had a revival with the uprise of mobile devices and device targeting. URL hijacking is an off-domain redirect technique that exploited the nature of the search engine's handling for temporary redirects. If a temporary redirect is encountered, search engines have to decide whether they assign the ranking value to the URL that initializes the redirect or to the redirect target URL. The URL that initiates the redirect may be kept to show up in search results, as the redirect indicates a temporary nature. Under certain circumstances it was possible to exploit this behavior by applying temporary redirects to well-ranking URLs, leading to a replacement of the original URL in search results by the URL that initialized the redirect, therefore "stealing" the ranking. This method was usually combined with sneaky redirects to re-target the user stream from the search results to a target page. Search engines have developed efficient technologies to detect these kinds of manipulative approaches. Major search engines usually apply harsh ranking penalties on sites that get caught applying techniques like these. 214:
clicks on an outgoing link. This information can be captured in several ways. One way involves URL redirection. Instead of sending the visitor straight to the other site, links on the site can direct to a URL on the original website's domain that automatically redirects to the real target. This technique bears the downside of the delay caused by the additional request to the original website's server. As this added request will leave a trace in the server log, revealing exactly which link was followed, it can also be a privacy issue. The same technique is also used by some corporate websites to implement a statement that the subsequent content is at another site, and therefore not necessarily affiliated with the corporation. In such scenarios, displaying the warning causes an additional delay.
1836:" (Iceland). Their goal was to make memorable URLs. The first mainstream redirect service was V3.com that boasted 4 million users at its peak in 2000. V3.com success was attributed to having a wide variety of short memorable domains including "r.im", "go.to", "i.am", "come.to" and "start.at". V3.com was acquired by FortuneCity.com, a large free web hosting company, in early 1999. As the sales price of top level domains started falling from 1808:. Hyperlinks involving URL redirection services are frequently used in spam messages directed at blogs and wikis. Thus, one way to reduce spam is to reject all edits and comments containing hyperlinks to known URL redirection services; however, this will also remove legitimate edits and comments and may not be an effective method to reduce spam. Recently, URL redirection services have taken to using 306:
offer localized content and automatically forward the user to a localized version of the requested URL. This is helpful for websites that target audience in more than one location and/or language. Usually server-side redirects are used for Geotargeting but client-side redirects might be an option as well, depending on requirements.
205:. They often have the older/outdated domain names and links in their database and will send search users to these old URLs. By using a "moved permanently" redirect to the new URL, visitors will still end up at the correct page. Also, in the next search engine pass, the search engine should detect and use the newer URL. 2156:
attacks. By timing how long a website took to return a particular page or by differentiating one destination page from another, an attacker can gain significant information about another website's state. In 2021, Knittel et al. discovered a vulnerability in the Chrome's Performance API implementation
1868:
by placing an intermediate page between the page the link is on and its destination. Although these are conceptually similar to other URL redirection services, they serve a different purpose, and they rarely attempt to shorten or obfuscate the destination URL (as their only intended side-effect is to
882:
More headers may be required to prevent caching. The programmer must ensure that the headers are output before the body. This may not fit easily with the natural flow of control through the code. To help with this, some frameworks for server-side content generation can buffer the body data. In the
228:
Web applications often include lengthy descriptive attributes in their URLs which represent data hierarchies, command structures, transaction paths and session information. This practice results in a URL that is aesthetically unpleasant and difficult to remember, and which may not fit within the size
1803:
is an information management system, which provides an internet link that redirects users to the desired content. The typical benefit to the user is the use of a memorable domain name, and a reduction in the length of the URL or web address. A redirecting link can also be used as a permanent address
1125:
feature which refreshes a page after a certain amount of time. This can specify a new URL to replace one page with another. This is supported by most web browsers. A timeout of zero seconds effects an immediate redirect. This is treated like a 301 permanent redirect by Google, allowing transfer of
480:
that causes a browser to display a different page. If a client encounters a redirect, it needs to make a number of decisions how to handle the redirect. Different status codes are used by clients to understand the purpose of the redirect, how to handle caching and which request method to use for the
305:
or redirect to a mobile website version. If a mobile website version is offered, users with mobile clients will be automatically forwarded to the corresponding mobile content. For device targeting, client-side redirects or non-cacheable server-side redirects are used. Geotargeting is the approach to
1269:
because the meta tag is contained inside the document itself. The meta tag must be placed in the "head" section of the HTML file. The number "0" in this example may be replaced by another number to achieve a delay of that many seconds. The anchor in the "body" section is for users whose browsers
840:
Web authors producing HTML content can't usually create redirects using HTTP headers as these are generated automatically by the web server program when serving an HTML file. The same is usually true even for programmers writing CGI scripts, though some servers allow scripts to add custom headers
330:
attacks that confuse visitors about which web site they are visiting. Because modern browsers always show the real URL in the address bar, the threat is lessened. However, redirects can also take you to sites that will otherwise attempt to attack in other ways. For example, a redirect might take a
213:
The access logs of most web servers keep detailed information about where visitors came from and how they browsed the hosted site. They do not, however, log which links visitors left by. This is because the visitor's browser has no need to communicate with the original server when the visitor
2118:
The above example does not check who called it (e.g. by referrer, although that could be spoofed). Also, it does not check the URL provided. This means that a malicious person could link to the redirection page using a URL parameter of his/her own selection, from any page, which uses the web
2131:
attacks. If a redirect target is not sufficiently validated by a web application, an attacker can make a web application redirect to an arbitrary website. This vulnerability is known as an open-redirect vulnerability. In certain cases when an open redirect occurs as part of an
1873:
in the query string. Many large community websites use link redirection on external links to lessen the chance of an exploit that could be used to steal account information, as well as make it clear when a user is leaving a service, to lessen the chance of effective
200:
With URL redirects, incoming links to an outdated URL can be sent to the correct location. These links might be from other sites that have not realized that there is a change or from bookmarks/favorites that users have saved in their browsers. The same applies to
651:
All of these status codes require the URL of the redirect target to be given in the Location: header of the HTTP response. The 300 multiple choices will usually list all choices in the body of the message and show the default choice in the Location: header.
1413:). The W3C's Web Content Accessibility Guidelines (7.4) discourage the creation of auto-refreshing pages, since most web browsers do not allow the user to disable or control the refresh rate. Some articles that they have written on the issue include 1766:
Sometimes a mistake can cause a page to end up redirecting back to itself, possibly via other pages, leading to an infinite sequence of redirects. Browsers should stop redirecting after a certain number of hops and display an error message.
399:
or HTML content. The techniques used typically depend on the role of the person implementing it and their access to different parts of the system. For example, a web author with no control over the headers might use a
1869:
hide referrer information and provide a clear gateway between other websites.) This type of redirection is often used to prevent potentially-malicious links from gaining information using the referrer, for example a
895:
HTTP/1.1 allows for either a relative URI reference or an absolute URI reference. If the URI reference is relative the client computes the required absolute URI reference according to the rules defined in RFC 3986.
165:
Otherwise the website will be contacted over HTTP. A website operator may decide to serve such requests by redirecting the browser to the HTTPS variant instead and hopefully also priming HSTS for future accesses.
2140:
from the victim website. Open redirect vulnerabilities are fairly common on the web. In June 2022, TechRadar found over 25 active examples of open redirect vulnerabilities on the web, including sites like
1781:
Note: An earlier version of this specification recommended a maximum of five redirections (, Section 10.3). Content developers need to be aware that some clients might implement such a fixed limitation.
259:
Sometimes the URL of a page changes even though the content stays the same. Therefore, URL redirection can help users who have bookmarks. This is routinely done on Knowledge whenever a page is renamed.
1812:
as an efficient, user friendly method for creating shortened URLs. A major drawback of some URL redirection services is the use of delay pages, or frame based advertising, to generate revenue.
1587:
One main difference to the above redirect methods is that for a frame redirect, the browser displays the URL of the frame document and not the URL of the target page in the URL bar. This
158:
If a user types in a URI or clicks on a link that refers to the insecure variant, the browser will automatically redirect to the secure version in case the website is contained in the
1007:
with the first rewrite directive below (only affecting the internal state, without any HTTP replies issued to the client just yet), and then with the second rewrite directive, an
449:
This method is often used as a fall-back â€” if the browser does not support the automatic redirect, the visitor can still reach the target document by following the link.
174:
A user might mistype a URL. Organizations often register these misspelled domains and redirect them to the intended location. This technique is often used to "reserve" other
2330: 60:
attempts to open a URL that has been redirected, a page with a different URL is opened. Similarly, domain redirection or domain forwarding is when all pages in a URL
1736:
One redirect may lead to another in a redirect chain. If a redirect leads to another redirect, this may also be known as a double redirect. For example, the URL "
503:(originally "temporary redirect" in HTTP/1.0 and popularly used for CGI scripts; superseded by 303 and 307 in HTTP/1.1 but preserved for backward compatibility) 2565: 841:(e.g. by enabling "non-parsed-headers"). Many web servers will generate a 3xx status code if a script outputs a "Location:" header line. For example, in 1489:
However, HTTP headers or the refresh meta tag may be preferred for security reasons and because JavaScript will not be executed by some browsers and many
1458:
to the browser's history. It can cause redirect loops when users hit the back button. With the following command you can prevent this type of behaviour.
1852:. Their goal was to make long URLs short, to be able to post them on internet forums. Since 2006, with the 140 character limit on the extremely popular 301:. Device targeting has become increasingly important with the rise of mobile clients. There are two approaches to serve mobile users: Make the website 958:
Such configuration can be applied to one or all sites on the server through the server configuration files or to a single content directory through a
1791:
There exist services that can perform URL redirection on demand, with no need for technical work or access to the web server your site is hosted on.
2675: 1409:
discourage the use of meta refresh, since it does not communicate any information about either the original or new resource, to the browser (or
3430: 2646: 2551: 1417:, Use standard redirects: don't break the back button! and Core Techniques for Web Content Accessibility Guidelines 1.0 section 7. 975:
has an integrated http rewrite module, which can be used to perform advanced URL processing and even web-page generation (with the
2578: 2781: 3229: 2999: 2845: 355:
which indicates the source of the link. This field is populated with the URL of the current web page, and will end up in the
2334: 1752:. This is unavoidable if the different links in the chain are served by different servers though it should be minimised by 3269: 2814:
Innocenti, Tommaso; Golinelli, Matteo; Onarlioglu, Kaan; Mirheidari, Ali; Crispo, Bruno; Kirda, Engin (4 December 2023).
3244: 3057: 2136:
flow, the vulnerability is known as a covert redirect. When a covert redirect occurs, the attacker website can steal
285:
submissions if the user clicks the refresh button after submitting the form, creating a more intuitive interface for
2467: 395:
Several different kinds of response to the browser will result in a redirection. These vary in whether they affect
2905: 2214: 412:
The simplest technique is to ask the visitor to follow a link to the new page, usually using an HTML anchor like:
2750: 2408: 2359: 2294: 1356:
This response is easier to generate by CGI programs because one does not need to change the default status code.
404:
whereas a web server administrator redirecting all pages on a site is more likely to use server configuration.
159: 178:(TLD) with the same name, or make it easier for a ".edu" or ".net" site to accommodate users who type ".com". 3440: 2978:
Knittel, Lukas; Mainka, Christian; Niemietz, Marcus; Noß, Dominik Trevor; Schwenk, Jörg (13 November 2021).
379:. This technique also eliminates other potentially sensitive information from the referrer URL, such as the 3224: 3106: 17: 937:
and redirection, Apache mod_rewrite can be used. E.g., to redirect a requests to a canonical domain name:
908:
mod_alias extension can be used to redirect certain requests. Typical configuration directives look like:
2928: 999: 3264: 1730: 2672: 2266: 237:
services provide a solution to this problem by redirecting a user to a longer URL from a shorter one.
2462: 1415:
W3C Web Content Accessibility Guidelines (1.0): Ensure user control of time-sensitive content changes
1406: 473: 359:
of the server serving the external link. Since sensitive pages may have sensitive URLs (for example,
331:
user to a site that would attempt to trick them into downloading antivirus software and installing a
162:
preload list shipped with the application or if the user had already visited the origin in the past.
3435: 3239: 3136: 3101: 2980:"XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers" 1603: 1397:"Please follow <a href=\"https://www.example.com/\">this link</a>!" 1016: 332: 124: 53: 1402:
Note: Usually, the HTTP server adds the status line and the Content-Length header automatically.
2650: 2591: 1591:
technique may be used so that the reader sees a more memorable URL or to fraudulently conceal a
3074: 3050: 2166: 1502: 2349: 2280: 2137: 983: 302: 2740: 2628: 1758:
the URL as much as possible on the server before returning it to the browser as a redirect.
3279: 3249: 3216: 2764: 2422: 2373: 461: 2398: 497:(redirects permanently from one URL to another passing link equity to the redirected page) 8: 3254: 3096: 884: 2929:"What is an Open Redirect vulnerability, why is it dangerous and how can you stay safe?" 3018: 2986:. CCS '21. New York, NY, USA: Association for Computing Machinery. pp. 1771–1788. 2822:. ACSAC '23. New York, NY, USA: Association for Computing Machinery. pp. 256–267. 1805: 905: 314:
Redirects have been used to manipulate search engines with unethical intentions, e.g.,
31: 3420: 3234: 3177: 3043: 3029: 2995: 2984:
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
2841: 2559: 2222: 2191: 1821: 269: 3035: 2789: 2711: 1778:
detect and intervene in cyclical redirections (i.e., "infinite" redirection loops).
1729:"Double redirect" redirects here. For Knowledge's guideline on Double redirect, see 1414: 3375: 3322: 2987: 2831: 2823: 2754: 2412: 2363: 1596: 175: 2953: 515:(indicates that the client's requested resource is only available through a proxy) 3387: 3091: 2979: 2815: 2679: 2491:"mdoc.su – Short manual page URLs for FreeBSD, OpenBSD, NetBSD and DragonFly BSD" 2390: 2153: 987: 368: 275: 2861: 2767: 2744: 2425: 2402: 2376: 2353: 387:
by indicating to the end user that they passed a clear gateway to another site.
97:
to allow multiple domain names belonging to the same owner to refer to a single
3397: 3367: 3317: 3259: 3182: 3172: 3116: 2512: 2176: 2133: 1849: 991: 465: 278: 234: 223: 84: 45: 2533: 3414: 3332: 3297: 3197: 3131: 3023: 2226: 2181: 1410: 1008: 979:
directive). A showing example of such advanced use of the rewrite module is
934: 512: 315: 230: 202: 2991: 2827: 2692: 3425: 3380: 3337: 3307: 3157: 2954:"CWE - CWE-601: URL Redirection to Untrusted Site ('Open Redirect') (4.14)" 2736: 2394: 1266: 1122: 401: 396: 352: 348: 298: 240: 2308: 2244: 3342: 3152: 1490: 61: 57: 27:
Technique for making a Web page available under more than one URL address
2836: 3312: 3289: 3162: 3121: 3083: 2463:"A dynamic web-site written wholly in nginx.conf? Introducing mdoc.su!" 2230: 1870: 1425: 1129:
This is an example of a simple HTML document that uses this technique:
509:(forces a GET request to the new URL even if original request was POST) 380: 356: 286: 282: 2883: 2813: 994:
service entirely with the help of nginx configuration language alone.
527:(provides a new URL for the browser to resubmit a GET or POST request) 521:(provides a new URL for the browser to resubmit a GET or POST request) 155:
URI scheme and plain HTTP (an insecure URI beginning with "http://").
3347: 3327: 3202: 3019:
Mapping URLs to Filesystem Locations - Apache HTTP Server Version 2.4
2759: 2417: 2368: 2171: 2146: 1754: 960: 246: 116: 664:
response with the 301 "moved permanently" redirect looks like this:
3392: 3302: 3187: 3167: 3066: 2610: 2186: 2128: 1875: 1865: 1592: 1118: 1020: 1015:
would be issued to the client to actually redirect to the external
1012: 536: 532: 524: 518: 506: 500: 494: 488: 384: 327: 254: 131: 91: 49: 2579:"Google and Yahoo accept undelayed meta refreshs as 301 redirects" 1501:
A slightly different effect can be achieved by creating an inline
484:
HTTP/1.1 defines several status codes for redirection (RFC 7231):
3274: 3192: 3126: 2269:. Matt Cutts, former Head of Google Webspam Team. 4 January 2006. 1853: 1845: 371:
could be embedded in all external URLs, transforming for example
112: 108: 98: 2735: 2347: 2297:. Open Web Application Security Project (OWASP). 21 August 2014. 367:
URL to leave the organization. A redirection page that performs
2157:
which allowed them to reliably detect cross-origin redirects.
2142: 1003:
were to come along, it would first be redirected internally to
186:
Web pages may be redirected to a new domain for three reasons:
120: 2629:"Core Techniques for Web Content Accessibility Guidelines 1.0" 1074:"https://leaf.dragonflybsd.org/cgi/web-man?command=" 835: 297:
Redirects can be effectively used for targeting purposes like
3352: 3111: 3032:
The Web Application Security Consortium Threat Classification
2746:
Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
2554:. 2 August 2002. Archived from the original on 2 August 2002. 2439: 2355:
Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
972: 361:
https://company.com/plans-for-the-next-release-of-our-product
152: 69: 65: 1804:
for content that frequently changes hosts, similarly to the
193:
an author might move their individual pages to a new domain;
2389: 1881:
Here is a simplistic example of such a service, written in
1848:
in 2002 a new kind of redirecting service was born, namely
1844:, use of redirection services declined. With the launch of 1809: 1745: 1113: 661: 655: 458: 250: 151:
A website may potentially be accessible over both a secure
2816:"OAuth 2.0 Redirect URI Validation Falls Short, Literally" 2712:"Double Redirects May Take Google More Time To Pick Up On" 1856:
service, these short URL services have been heavily used.
377:
https://redirect.company.com/https://externalsite.com/page
2149:. Open redirects have their own CWE identifier, CWE-601. 1882: 1833: 1829: 1825: 1455: 1359:
Here is a simple CGI program that effects this redirect:
842: 2977: 1737: 1370:"Refresh: 0; url=https://www.example.com/\r\n" 241:
Meaningful, persistent aliases for long or changing URLs
190:
a site might desire, or need, to change its domain name;
347:
When a link is clicked, the browser sends along in the
2331:"PHP Redirects: 302 to 301 Rock Solid Robust Solution" 2323: 2127:
URL redirection can be abused by attackers to perform
3065: 2152:
URL redirection also provides a mechanism to perform
1602:
Before HTML5, the same effect could be done with an
292: 2906:"Serious security flaw in OAuth, OpenID discovered" 980: 950:%{HTTP_HOST}^(+\.)*oldsite\.example\.com\.?(:*)?$ 2647:"Cross-browser client side URL redirect generator" 2490: 1740:" (with "*.com" as domain) is first redirected to 143:There are several reasons to use URL redirection: 2404:Uniform Resource Identifier (URI): Generic Syntax 2348:Roy T. Fielding; Julian F. Reschke, eds. (2014). 1454:Normally JavaScript pushes the redirector site's 899: 3412: 2820:Annual Computer Security Applications Conference 2564:: CS1 maint: bot: original URL status unknown ( 2295:"Unvalidated Redirects and Forwards Cheat Sheet" 338: 2876: 326:URL redirection is sometimes used as a part of 181: 1820:The first redirect services took advantage of 1741: 887:language, this can also be accomplished using 309: 217: 104:to guide navigation into and out of a website; 73: 64:are redirected to a different domain, as when 3051: 2926: 2854: 2729: 1273:The same effect can be achieved with an HTTP 79:URL redirection is done for various reasons: 2511:Murenin, Constantine A. (23 February 2013). 2489:Murenin, Constantine A. (23 February 2013). 2461:Murenin, Constantine A. (18 February 2013). 893:response.redirect "https://www.example.com/" 868:'Location: https://www.example.com/' 107:for privacy protection (such as redirecting 3030:Security vulnerabilities in URL Redirectors 1932:<!-- Fallback using meta refresh. --> 1794: 1173:"0; url=https://www.example.com/" 836:Using server-side scripting for redirection 3058: 3044: 2592:"Web Content Accessibility Guidelines 1.0" 2581:. Sebastian's Pamphlets. 3 September 2007. 2440:"Module ngx_http_rewrite_module - rewrite" 2309:"Redirects & SEO - The Complete Guide" 1749: 543:Redirect status codes and characteristics 2835: 2758: 2416: 2367: 208: 2709: 2703: 2209: 2207: 1114:Refresh Meta tag and HTTP refresh header 856:'HTTP/1.1 301 Moved Permanently' 656:Example HTTP response for a 301 redirect 452: 321: 3024:Taxonomy of JavaScript Redirection Spam 2510: 2488: 2460: 2245:"Redirects & SEO - The Total Guide" 1420: 1379:"Content-Type: text/html\r\n" 954:^(.*)$ https://newsite.example.net/$ 1 169: 14: 3413: 2333:. WebSiteFactors.co.uk. Archived from 2267:"SEO advice: discussing 302 redirects" 30:For URL redirection on Knowledge, see 3039: 2809: 2807: 2774: 2685: 2665: 2639: 2621: 2602: 2584: 2572: 2552:"An Exploration of Dynamic Documents" 2544: 2526: 2504: 2482: 2454: 2432: 2204: 929:https://www.example.com/newpage.html 919:https://www.example.com/newpage.html 845:, one can use the "header" function: 3431:Black hat search engine optimization 2898: 2710:Schwartz, Barry (18 December 2007). 2383: 2362:. p. 68. sec. 7.1.2. 2341: 2301: 2287: 2273: 2259: 2237: 1678:"https://www.example.com/" 1641:"https://www.example.com/" 1559:"https://www.example.com/" 1540:"https://www.example.com/" 1428:can cause a redirect by setting the 1337:"https://www.example.com/" 1219:"https://www.example.com/" 789:"https://www.example.org/" 430:"https://www.example.com/" 263: 2788:. 14 September 2007. Archived from 2782:"Net gains for tiny Pacific nation" 1859: 990:, which implements a deterministic 24: 3245:Distributed Checksum Clearinghouse 2804: 2753:. p. 54. sec. 6.4. 2739:; Julian F. Reschke, eds. (2014). 2215:"Google revives redirect snoopery" 2122: 1917:'Refresh: 0; url=https://' 1864:Redirection services can hide the 1724: 1496: 1481:'https://www.example.com/' 1449:'https://www.example.com/' 560:Request Method Subsequent Request 407: 25: 3452: 3230:Challenge–response spam filtering 3067:Unsolicited digital communication 3012: 2693:"HTML 5.2: 11. Obsolete features" 1761: 1748:), where you can navigate to the 390: 293:Device targeting and geotargeting 2608: 2411:. p. 28. sec. 5. 967: 491:(e.g. offer different languages) 146: 134:attacks or malware distribution. 72:are automatically redirected to 2971: 2946: 2920: 2671:Aaron Emigh (19 January 2005). 1606:that contains the target page: 1303:0; url=https://www.example.com/ 383:, and can reduce the chance of 363:), it is not desirable for the 2649:. Insider Zone. Archived from 2283:. Google Inc. 3 December 2015. 1770:The HTTP/1.1 Standard states: 1265:This technique can be used by 997:For example, if a request for 900:Apache HTTP Server mod_rewrite 52:available under more than one 13: 1: 2927:Mike Williams (5 June 2022). 2197: 1270:do not support this feature. 1126:PageRank to the target page. 373:https://externalsite.com/page 281:that prevents some duplicate 274:Post/Redirect/Get (PRG) is a 130:for hostile purposes such as 127:links into normal links); and 182:Moving pages to a new domain 7: 2160: 1786: 310:Manipulating search engines 218:Short aliases for long URLs 138: 10: 3457: 3265:Naive Bayes spam filtering 2673:"Anti-Phishing Technology" 2397:; Masinter, Larry (2005). 2138:authentication information 2034:Attempting to redirect to 1815: 1742:https://www.wikipedia.org/ 1731:Knowledge:Double redirects 1728: 267: 244: 221: 196:two web sites might merge. 29: 3366: 3288: 3215: 3145: 3082: 3073: 2678:27 September 2007 at the 1086:"&section=" 94:when web pages are moved; 3240:Disposable email address 3102:Directory harvest attack 2716:Search Engine Roundtable 2611:"Use standard redirects" 1887: 1795:URL redirection services 1608: 1507: 1460: 1434: 1361: 1279: 1131: 1025: 939: 910: 847: 794:https://www.example.org/ 690:https://www.example.org/ 666: 414: 123:respectively or to turn 2992:10.1145/3460120.3484739 2828:10.1145/3627106.3627140 775:This page has moved to 48:technique for making a 2864:. OWASP. 16 March 2014 2399:"Reference Resolution" 2167:Canonical link element 1840:per year to less than 1784: 1750:language-specific site 1040:^/DragonFly(BSD)?(.*)? 1000:/DragonFlyBSD/HAMMER.5 594:GET / POST may change 577:GET / POST may change 525:308 permanent redirect 519:307 temporary redirect 335:of some sort instead. 209:Logging outgoing links 3026:(Microsoft Live Labs) 2886:. Tetraph. 1 May 2014 1772: 1744:(with domain name in 1738:https://wikipedia.com 1364:# !/usr/bin/perl 1013:302 Found status code 554:Temporary / Permanent 495:301 moved permanently 472:is a response with a 453:HTTP status codes 3xx 322:Manipulating visitors 3441:Internet terminology 3250:Email authentication 2513:"mdoc.su.nginx.conf" 2119:server's resources. 1993:"0;url=https:// 1421:JavaScript redirects 986:3 April 2022 at the 889:response.buffer=true 489:300 multiple choices 481:subsequent request. 170:Similar domain names 3097:Bulk email software 2337:on 12 October 2012. 2221:. 29 January 2009. 1984:"refresh" 1164:"Refresh" 544: 539:are not redirects. 2908:. CNET. 2 May 2014 2682:(PDF). Radix Labs. 2281:"Sneaky Redirects" 2233:on 17 August 2011. 1806:Domain Name System 933:For more flexible 906:Apache HTTP Server 542: 32:Knowledge:Redirect 3408: 3407: 3235:Context filtering 3211: 3210: 3001:978-1-4503-8454-4 2884:"Covert Redirect" 2847:979-8-4007-0886-2 2741:"Redirection 3xx" 2538:www.w3schools.com 2192:URI normalization 1832:" (Austria) and " 1822:top-level domains 1432:attribute, e.g.: 681:Moved Permanently 649: 648: 270:Post/Redirect/Get 264:Post/Redirect/Get 176:top-level domains 16:(Redirected from 3448: 3376:Advance-fee scam 3323:Keyword stuffing 3080: 3079: 3060: 3053: 3046: 3037: 3036: 3006: 3005: 2975: 2969: 2968: 2966: 2964: 2950: 2944: 2943: 2941: 2939: 2924: 2918: 2917: 2915: 2913: 2902: 2896: 2895: 2893: 2891: 2880: 2874: 2873: 2871: 2869: 2858: 2852: 2851: 2839: 2811: 2802: 2801: 2799: 2797: 2778: 2772: 2771: 2762: 2760:10.17487/RFC7231 2733: 2727: 2726: 2724: 2722: 2707: 2701: 2700: 2689: 2683: 2669: 2663: 2662: 2660: 2658: 2643: 2637: 2636: 2625: 2619: 2618: 2606: 2600: 2599: 2588: 2582: 2576: 2570: 2569: 2563: 2555: 2548: 2542: 2541: 2530: 2524: 2523: 2521: 2519: 2508: 2502: 2501: 2499: 2497: 2486: 2480: 2479: 2477: 2475: 2458: 2452: 2451: 2449: 2447: 2436: 2430: 2429: 2420: 2418:10.17487/RFC3986 2395:Fielding, Roy T. 2391:Berners-Lee, Tim 2387: 2381: 2380: 2371: 2369:10.17487/RFC7231 2345: 2339: 2338: 2327: 2321: 2320: 2318: 2316: 2305: 2299: 2298: 2291: 2285: 2284: 2277: 2271: 2270: 2263: 2257: 2256: 2254: 2252: 2241: 2235: 2234: 2229:. Archived from 2211: 2114: 2111: 2108: 2105: 2102: 2099: 2095: 2092: 2089: 2086: 2083: 2080: 2077: 2074: 2070: 2067: 2064: 2061: 2058: 2055: 2052: 2049: 2046: 2043: 2040: 2037: 2033: 2030: 2027: 2024: 2021: 2018: 2015: 2012: 2009: 2006: 2003: 2000: 1997: 1994: 1991: 1988: 1985: 1982: 1979: 1976: 1973: 1970: 1967: 1964: 1960: 1957: 1954: 1951: 1948: 1945: 1942: 1939: 1936: 1933: 1930: 1927: 1924: 1921: 1918: 1915: 1912: 1909: 1906: 1903: 1900: 1899:htmlspecialchars 1897: 1894: 1891: 1860:Referrer masking 1843: 1839: 1801:redirect service 1720: 1717: 1714: 1711: 1708: 1705: 1702: 1699: 1696: 1692: 1689: 1686: 1682: 1679: 1676: 1673: 1670: 1667: 1663: 1660: 1657: 1654: 1651: 1648: 1645: 1642: 1639: 1636: 1633: 1630: 1627: 1624: 1623:"100%" 1621: 1618: 1615: 1612: 1597:website spoofing 1595:site as part of 1583: 1580: 1577: 1573: 1570: 1567: 1563: 1560: 1557: 1554: 1551: 1548: 1544: 1541: 1538: 1535: 1532: 1531:"100%" 1529: 1526: 1523: 1522:"100%" 1520: 1517: 1514: 1511: 1485: 1482: 1479: 1476: 1473: 1470: 1467: 1464: 1450: 1447: 1444: 1441: 1438: 1431: 1398: 1395: 1392: 1389: 1388:"\r\n" 1386: 1383: 1380: 1377: 1374: 1371: 1368: 1365: 1351: 1348: 1345: 1341: 1338: 1335: 1332: 1329: 1326: 1322: 1319: 1316: 1313: 1310: 1307: 1304: 1301: 1298: 1295: 1292: 1289: 1286: 1283: 1276: 1261: 1258: 1255: 1252: 1249: 1246: 1243: 1240: 1237: 1233: 1230: 1227: 1223: 1220: 1217: 1214: 1211: 1208: 1204: 1201: 1198: 1195: 1192: 1189: 1186: 1183: 1180: 1177: 1174: 1171: 1168: 1165: 1162: 1159: 1156: 1153: 1150: 1147: 1144: 1141: 1138: 1135: 1109: 1106: 1103: 1100: 1096: 1093: 1090: 1087: 1084: 1081: 1078: 1075: 1072: 1069: 1066: 1063: 1060: 1057: 1054: 1051: 1048: 1045: 1041: 1038: 1035: 1032: 1029: 1006: 1002: 978: 963: 953: 949: 946: 943: 928: 925: 922: 918: 914: 894: 890: 878: 875: 872: 869: 866: 863: 860: 857: 854: 851: 831: 828: 825: 822: 819: 816: 813: 810: 807: 803: 800: 797: 793: 790: 787: 784: 781: 778: 774: 771: 768: 764: 761: 758: 755: 752: 749: 746: 743: 740: 736: 733: 730: 727: 724: 721: 718: 715: 712: 709: 706: 703: 700: 697: 694: 691: 688: 685: 682: 679: 676: 673: 670: 548:HTTP Status Code 545: 541: 533:304 not modified 444: 441: 438: 434: 431: 428: 425: 422: 419: 402:Refresh meta tag 378: 374: 366: 362: 342: 56:address. When a 21: 3456: 3455: 3451: 3450: 3449: 3447: 3446: 3445: 3436:Internet search 3411: 3410: 3409: 3404: 3388:Make Money Fast 3362: 3358:URL redirection 3284: 3207: 3141: 3092:Address munging 3069: 3064: 3015: 3010: 3009: 3002: 2976: 2972: 2962: 2960: 2952: 2951: 2947: 2937: 2935: 2925: 2921: 2911: 2909: 2904: 2903: 2899: 2889: 2887: 2882: 2881: 2877: 2867: 2865: 2862:"Open Redirect" 2860: 2859: 2855: 2848: 2812: 2805: 2795: 2793: 2780: 2779: 2775: 2737:Roy T. Fielding 2734: 2730: 2720: 2718: 2708: 2704: 2691: 2690: 2686: 2680:Wayback Machine 2670: 2666: 2656: 2654: 2653:on 26 July 2020 2645: 2644: 2640: 2627: 2626: 2622: 2607: 2603: 2590: 2589: 2585: 2577: 2573: 2557: 2556: 2550: 2549: 2545: 2534:"HTML meta tag" 2532: 2531: 2527: 2517: 2515: 2509: 2505: 2495: 2493: 2487: 2483: 2473: 2471: 2459: 2455: 2445: 2443: 2438: 2437: 2433: 2388: 2384: 2346: 2342: 2329: 2328: 2324: 2314: 2312: 2307: 2306: 2302: 2293: 2292: 2288: 2279: 2278: 2274: 2265: 2264: 2260: 2250: 2248: 2243: 2242: 2238: 2213: 2212: 2205: 2200: 2163: 2154:cross-site leak 2125: 2123:Security issues 2116: 2115: 2112: 2109: 2106: 2103: 2100: 2097: 2093: 2090: 2087: 2084: 2081: 2078: 2075: 2072: 2068: 2065: 2062: 2059: 2056: 2053: 2050: 2047: 2044: 2041: 2038: 2035: 2031: 2028: 2025: 2022: 2019: 2016: 2013: 2010: 2007: 2004: 2001: 1998: 1995: 1992: 1989: 1986: 1983: 1980: 1977: 1974: 1971: 1968: 1965: 1962: 1958: 1955: 1952: 1949: 1946: 1943: 1940: 1937: 1934: 1931: 1928: 1925: 1922: 1919: 1916: 1913: 1910: 1907: 1904: 1901: 1898: 1895: 1892: 1889: 1862: 1841: 1837: 1824:(TLD) such as " 1818: 1797: 1789: 1764: 1734: 1727: 1725:Redirect chains 1722: 1721: 1718: 1715: 1712: 1709: 1706: 1703: 1700: 1697: 1694: 1690: 1687: 1684: 1680: 1677: 1674: 1671: 1668: 1665: 1661: 1658: 1655: 1652: 1649: 1646: 1643: 1640: 1637: 1634: 1631: 1628: 1625: 1622: 1619: 1616: 1613: 1610: 1585: 1584: 1581: 1578: 1575: 1571: 1568: 1565: 1561: 1558: 1555: 1552: 1549: 1546: 1542: 1539: 1536: 1533: 1530: 1527: 1524: 1521: 1518: 1515: 1512: 1509: 1499: 1497:Frame redirects 1487: 1486: 1483: 1480: 1477: 1474: 1471: 1468: 1465: 1462: 1452: 1451: 1448: 1445: 1442: 1439: 1436: 1430:window.location 1429: 1423: 1400: 1399: 1396: 1393: 1390: 1387: 1384: 1381: 1378: 1375: 1372: 1369: 1366: 1363: 1354: 1353: 1349: 1346: 1343: 1339: 1336: 1333: 1330: 1327: 1324: 1320: 1317: 1314: 1311: 1308: 1305: 1302: 1299: 1296: 1293: 1290: 1287: 1284: 1281: 1274: 1263: 1262: 1259: 1256: 1253: 1250: 1247: 1244: 1241: 1238: 1235: 1231: 1228: 1225: 1221: 1218: 1215: 1212: 1209: 1206: 1202: 1199: 1196: 1193: 1190: 1187: 1184: 1181: 1178: 1175: 1172: 1169: 1166: 1163: 1160: 1157: 1154: 1151: 1148: 1145: 1142: 1139: 1136: 1133: 1121:introduced the 1116: 1111: 1110: 1107: 1104: 1101: 1098: 1094: 1091: 1088: 1085: 1082: 1079: 1076: 1073: 1070: 1067: 1064: 1061: 1058: 1055: 1052: 1049: 1046: 1043: 1039: 1036: 1033: 1030: 1027: 1004: 998: 988:Wayback Machine 976: 970: 959: 956: 955: 951: 947: 944: 941: 931: 930: 926: 923: 920: 916: 912: 902: 892: 888: 880: 879: 876: 873: 870: 867: 864: 861: 858: 855: 852: 849: 838: 833: 832: 829: 826: 823: 820: 817: 814: 811: 808: 805: 801: 798: 795: 791: 788: 785: 782: 779: 776: 772: 769: 766: 762: 759: 756: 753: 750: 747: 744: 741: 738: 734: 731: 728: 725: 722: 719: 716: 713: 710: 707: 704: 701: 698: 695: 692: 689: 686: 683: 680: 677: 674: 671: 668: 658: 645:may not change 628:may not change 476:beginning with 455: 447: 446: 442: 439: 436: 432: 429: 426: 423: 420: 417: 410: 408:Manual redirect 393: 376: 372: 369:referrer hiding 364: 360: 351:a field called 345: 340: 324: 312: 295: 276:web development 272: 266: 257: 243: 229:limitations of 226: 220: 211: 184: 172: 149: 141: 38:URL redirection 35: 28: 23: 22: 15: 12: 11: 5: 3454: 3444: 3443: 3438: 3433: 3428: 3423: 3406: 3405: 3403: 3402: 3401: 3400: 3390: 3385: 3384: 3383: 3372: 3370: 3368:Internet fraud 3364: 3363: 3361: 3360: 3355: 3350: 3345: 3340: 3335: 3330: 3325: 3320: 3318:Google bombing 3315: 3310: 3305: 3300: 3294: 3292: 3286: 3285: 3283: 3282: 3277: 3272: 3267: 3262: 3260:List poisoning 3257: 3252: 3247: 3242: 3237: 3232: 3227: 3221: 3219: 3213: 3212: 3209: 3208: 3206: 3205: 3200: 3195: 3190: 3185: 3180: 3175: 3170: 3165: 3160: 3155: 3149: 3147: 3143: 3142: 3140: 3139: 3134: 3129: 3124: 3119: 3117:Email spoofing 3114: 3109: 3104: 3099: 3094: 3088: 3086: 3077: 3071: 3070: 3063: 3062: 3055: 3048: 3040: 3034: 3033: 3027: 3021: 3014: 3013:External links 3011: 3008: 3007: 3000: 2970: 2945: 2919: 2897: 2875: 2853: 2846: 2803: 2792:on 12 May 2014 2773: 2728: 2702: 2684: 2664: 2638: 2620: 2609:Team, the QA. 2601: 2583: 2571: 2543: 2525: 2503: 2481: 2470:(Mailing list) 2453: 2431: 2382: 2340: 2322: 2300: 2286: 2272: 2258: 2236: 2202: 2201: 2199: 2196: 2195: 2194: 2189: 2184: 2179: 2177:Domain masking 2174: 2169: 2162: 2159: 2134:authentication 2124: 2121: 2048:"https:// 1961:Redirecting... 1888: 1861: 1858: 1850:URL shortening 1817: 1814: 1796: 1793: 1788: 1785: 1763: 1762:Redirect loops 1760: 1726: 1723: 1664:Please follow 1609: 1545:Please follow 1508: 1498: 1495: 1461: 1435: 1422: 1419: 1362: 1323:Please follow 1315:Content-Length 1280: 1205:Please follow 1132: 1115: 1112: 1099:$ db$ 1$ ds$ 2 1026: 992:URL shortening 969: 966: 940: 911: 901: 898: 848: 837: 834: 702:Content-Length 667: 657: 654: 647: 646: 643: 640: 637: 634: 630: 629: 626: 625:not by default 623: 620: 617: 613: 612: 609: 606: 603: 600: 596: 595: 592: 591:not by default 589: 586: 583: 579: 578: 575: 572: 569: 566: 562: 561: 558: 555: 552: 549: 529: 528: 522: 516: 510: 504: 498: 492: 466:World Wide Web 454: 451: 416:Please follow 415: 409: 406: 392: 391:Implementation 389: 344: 337: 323: 320: 311: 308: 294: 291: 279:design pattern 268:Main article: 265: 262: 242: 239: 235:URL shortening 224:URL shortening 222:Main article: 219: 216: 210: 207: 203:search engines 198: 197: 194: 191: 183: 180: 171: 168: 148: 145: 140: 137: 136: 135: 128: 105: 102: 95: 88: 85:URL shortening 46:World Wide Web 42:URL forwarding 40:, also called 26: 9: 6: 4: 3: 2: 3453: 3442: 3439: 3437: 3434: 3432: 3429: 3427: 3424: 3422: 3419: 3418: 3416: 3399: 3396: 3395: 3394: 3391: 3389: 3386: 3382: 3379: 3378: 3377: 3374: 3373: 3371: 3369: 3365: 3359: 3356: 3354: 3351: 3349: 3346: 3344: 3341: 3339: 3336: 3334: 3333:Referrer spam 3331: 3329: 3326: 3324: 3321: 3319: 3316: 3314: 3311: 3309: 3306: 3304: 3301: 3299: 3296: 3295: 3293: 3291: 3287: 3281: 3278: 3276: 3273: 3271: 3268: 3266: 3263: 3261: 3258: 3256: 3253: 3251: 3248: 3246: 3243: 3241: 3238: 3236: 3233: 3231: 3228: 3226: 3223: 3222: 3220: 3218: 3214: 3204: 3201: 3199: 3198:Telemarketing 3196: 3194: 3191: 3189: 3186: 3184: 3181: 3179: 3176: 3174: 3171: 3169: 3166: 3164: 3161: 3159: 3156: 3154: 3151: 3150: 3148: 3144: 3138: 3135: 3133: 3132:Pink contract 3130: 3128: 3125: 3123: 3120: 3118: 3115: 3113: 3110: 3108: 3105: 3103: 3100: 3098: 3095: 3093: 3090: 3089: 3087: 3085: 3081: 3078: 3076: 3072: 3068: 3061: 3056: 3054: 3049: 3047: 3042: 3041: 3038: 3031: 3028: 3025: 3022: 3020: 3017: 3016: 3003: 2997: 2993: 2989: 2985: 2981: 2974: 2959: 2958:cwe.mitre.org 2955: 2949: 2934: 2930: 2923: 2907: 2901: 2885: 2879: 2863: 2857: 2849: 2843: 2838: 2833: 2829: 2825: 2821: 2817: 2810: 2808: 2791: 2787: 2783: 2777: 2769: 2766: 2761: 2756: 2752: 2748: 2747: 2742: 2738: 2732: 2717: 2713: 2706: 2698: 2694: 2688: 2681: 2677: 2674: 2668: 2652: 2648: 2642: 2634: 2630: 2624: 2616: 2612: 2605: 2597: 2593: 2587: 2580: 2575: 2567: 2561: 2553: 2547: 2539: 2535: 2529: 2514: 2507: 2492: 2485: 2469: 2468: 2464: 2457: 2441: 2435: 2427: 2424: 2419: 2414: 2410: 2406: 2405: 2400: 2396: 2392: 2386: 2378: 2375: 2370: 2365: 2361: 2357: 2356: 2351: 2344: 2336: 2332: 2326: 2310: 2304: 2296: 2290: 2282: 2276: 2268: 2262: 2246: 2240: 2232: 2228: 2224: 2220: 2219:Blog.anta.net 2216: 2210: 2208: 2203: 2193: 2190: 2188: 2185: 2183: 2182:HTTP location 2180: 2178: 2175: 2173: 2170: 2168: 2165: 2164: 2158: 2155: 2150: 2148: 2144: 2139: 2135: 2130: 2120: 1886: 1884: 1879: 1877: 1872: 1867: 1857: 1855: 1851: 1847: 1835: 1831: 1827: 1823: 1813: 1811: 1807: 1802: 1792: 1783: 1779: 1777: 1771: 1768: 1759: 1757: 1756: 1751: 1747: 1743: 1739: 1732: 1607: 1605: 1600: 1598: 1594: 1590: 1506: 1504: 1494: 1492: 1459: 1457: 1433: 1427: 1418: 1416: 1412: 1411:search engine 1408: 1403: 1360: 1357: 1278: 1271: 1268: 1130: 1127: 1124: 1120: 1024: 1022: 1018: 1014: 1010: 1009:HTTP response 1001: 995: 993: 989: 985: 982: 974: 968:nginx rewrite 965: 962: 942:RewriteEngine 938: 936: 935:URL rewriting 927:/oldpage.html 917:/oldpage.html 909: 907: 897: 886: 885:ASP scripting 846: 844: 665: 663: 653: 644: 641: 638: 635: 632: 631: 627: 624: 621: 618: 615: 614: 610: 607: 604: 601: 598: 597: 593: 590: 587: 584: 581: 580: 576: 573: 570: 567: 564: 563: 559: 556: 553: 550: 547: 546: 540: 538: 537:305 use proxy 534: 531:Status codes 526: 523: 520: 517: 514: 513:305 use proxy 511: 508: 507:303 see other 505: 502: 499: 496: 493: 490: 487: 486: 485: 482: 479: 475: 471: 467: 463: 460: 450: 413: 405: 403: 398: 388: 386: 382: 370: 358: 354: 350: 336: 334: 329: 319: 317: 316:URL hijacking 307: 304: 300: 290: 288: 284: 280: 277: 271: 261: 256: 252: 248: 238: 236: 232: 231:microblogging 225: 215: 206: 204: 195: 192: 189: 188: 187: 179: 177: 167: 163: 161: 156: 154: 147:Forcing HTTPS 144: 133: 129: 126: 122: 118: 114: 110: 106: 103: 100: 96: 93: 89: 86: 82: 81: 80: 77: 75: 74:wikipedia.org 71: 70:wikipedia.net 67: 66:wikipedia.com 63: 59: 55: 51: 47: 43: 39: 33: 19: 3381:Lottery scam 3357: 3338:Scraper site 3308:Doorway page 3178:Mobile phone 3158:Cold calling 2983: 2973: 2961:. Retrieved 2957: 2948: 2936:. Retrieved 2932: 2922: 2910:. Retrieved 2900: 2888:. Retrieved 2878: 2866:. Retrieved 2856: 2837:11572/399070 2819: 2794:. Retrieved 2790:the original 2785: 2776: 2745: 2731: 2719:. Retrieved 2715: 2705: 2696: 2687: 2667: 2655:. Retrieved 2651:the original 2641: 2632: 2623: 2614: 2604: 2595: 2586: 2574: 2546: 2537: 2528: 2516:. Retrieved 2506: 2494:. Retrieved 2484: 2472:. Retrieved 2466: 2456: 2444:. Retrieved 2434: 2403: 2385: 2354: 2343: 2335:the original 2325: 2313:. Retrieved 2303: 2289: 2275: 2261: 2249:. Retrieved 2239: 2231:the original 2218: 2151: 2126: 2117: 1880: 1863: 1828:" (Tonga), " 1819: 1800: 1798: 1790: 1780: 1775: 1773: 1769: 1765: 1753: 1735: 1601: 1588: 1586: 1500: 1491:web crawlers 1488: 1453: 1424: 1404: 1401: 1358: 1355: 1306:Content-Type 1272: 1264: 1128: 1123:meta refresh 1117: 996: 971: 957: 932: 903: 881: 839: 693:Content-Type 659: 650: 551:HTTP Version 530: 483: 477: 469: 464:used by the 456: 448: 411: 397:HTTP headers 394: 349:HTTP request 346: 325: 313: 299:geotargeting 296: 273: 258: 227: 212: 199: 185: 173: 164: 157: 150: 142: 92:broken links 78: 41: 37: 36: 18:Web redirect 3343:Social spam 3255:Greylisting 3225:Client-side 3153:Auto dialer 2912:21 December 2890:21 December 2868:21 December 2518:25 December 2496:25 December 2474:24 December 2446:24 December 2442:. nginx.org 2315:29 November 2251:29 November 1267:web authors 1095:^/./(+)\.() 1005:/d/HAMMER.5 952:RewriteRule 948:RewriteCond 611:always GET 474:status code 343:information 287:user agents 90:to prevent 58:web browser 3415:Categories 3348:Spam blogs 3313:Forum spam 3290:Spamdexing 3163:Flyposting 3122:Image spam 3084:Email spam 2721:28 January 2697:www.w3.org 2633:www.w3.org 2615:www.w3.org 2596:www.w3.org 2350:"Location" 2198:References 1978:http-equiv 1871:session ID 1604:HTML frame 1426:JavaScript 1158:http-equiv 1031:/DragonFly 1017:cgi script 642:by default 381:session ID 303:responsive 245:See also: 3328:Link farm 3298:Blog spam 3217:Anti-spam 3183:Newsgroup 3173:Messaging 3075:Protocols 2933:TechRadar 2657:27 August 2311:. Audisto 2247:. Audisto 2227:1797-1993 2172:Clean URL 2147:Instagram 1774:A client 1755:rewriting 1342:this link 1312:text/html 1224:this link 961:.htaccess 915:permanent 699:text/html 639:Permanent 622:Temporary 605:Temporary 588:Temporary 571:Permanent 557:Cacheable 501:302 found 435:this link 339:Removing 289:(users). 247:Permalink 117:Invidious 115:links to 3421:Spamming 3393:Phishing 3303:Cloaking 3280:Spamhaus 3188:Robocall 3168:Junk fax 2786:BBC News 2676:Archived 2560:cite web 2187:Link rot 2161:See also 2129:phishing 2071:https:// 1890:<?php 1876:phishing 1866:referrer 1787:Services 1716:frameset 1707:noframes 1650:noframes 1614:frameset 1593:phishing 1589:cloaking 1469:location 1443:location 1277:header: 1119:Netscape 1102:redirect 1059:location 1028:location 984:Archived 921:Redirect 913:Redirect 765:=Moved= 684:Location 636:HTTP/1.1 619:HTTP/1.1 602:HTTP/1.1 585:HTTP/1.0 568:HTTP/1.0 470:redirect 462:protocol 385:phishing 365:referrer 341:referrer 328:phishing 255:Link rot 139:Purposes 132:phishing 99:web site 50:web page 3275:SpamCop 3193:Spambot 3137:Spambot 3127:Joe job 2963:8 April 2938:8 April 1987:content 1854:Twitter 1846:TinyURL 1842:$ 10.00 1838:$ 50.00 1816:History 1475:replace 1297:Refresh 1275:refresh 1167:content 1092:rewrite 1037:rewrite 1019:of web- 1011:with a 981:mdoc.su 457:In the 353:referer 233:sites. 113:Twitter 109:YouTube 44:, is a 2998:  2844:  2796:27 May 2225:  2143:Google 2066:" 2011:" 1911:header 1905:$ _GET 1776:SHOULD 1579:iframe 1516:height 1513:iframe 1463:window 1437:window 977:return 964:file. 862:header 850:header 333:Trojan 253:, and 121:Nitter 62:domain 3398:Voice 3353:Sping 3270:SORBS 3146:Other 3112:DNSWL 3107:DNSBL 2107:</ 2098:</ 2088:</ 2085:?> 2079:$ url 2073:<? 2063:?> 2057:$ url 2051:<? 2017:</ 2008:?> 2002:$ url 1996:<? 1966:title 1963:</ 1956:title 1929:?> 1923:$ url 1893:$ url 1713:</ 1704:</ 1695:</ 1685:</ 1632:frame 1576:</ 1566:</ 1525:width 1503:frame 1394:print 1385:print 1376:print 1367:print 1344:</ 1254:</ 1245:</ 1236:</ 1226:</ 1179:</ 1176:/> 973:Nginx 824:</ 815:</ 806:</ 796:</ 748:</ 742:title 739:</ 737:Moved 732:title 608:never 437:</ 375:into 153:HTTPS 3203:VoIP 2996:ISBN 2965:2024 2940:2024 2914:2014 2892:2014 2870:2014 2842:ISBN 2798:2010 2768:7231 2751:IETF 2723:2024 2659:2015 2566:link 2520:2014 2498:2014 2476:2014 2448:2014 2426:3986 2409:IETF 2377:7231 2360:IETF 2317:2015 2253:2015 2223:ISSN 2145:and 2113:> 2110:html 2104:> 2101:body 2094:> 2069:> 2042:href 2036:< 2032:> 2029:body 2026:< 2023:> 2020:head 2014:> 1975:meta 1972:< 1969:> 1959:> 1953:< 1950:> 1947:head 1944:< 1941:> 1938:html 1935:< 1810:AJAX 1746:.org 1719:> 1710:> 1701:> 1698:body 1691:> 1683:link 1681:> 1672:href 1666:< 1662:> 1659:body 1656:< 1653:> 1647:< 1644:> 1629:< 1626:> 1617:rows 1611:< 1582:> 1572:> 1564:link 1562:> 1553:href 1547:< 1543:> 1510:< 1405:The 1350:> 1340:> 1331:href 1325:< 1282:HTTP 1260:> 1257:html 1251:> 1248:body 1242:> 1232:> 1222:> 1213:href 1207:< 1203:> 1197:< 1194:> 1191:body 1188:< 1185:> 1182:head 1155:meta 1152:< 1149:> 1146:head 1143:< 1140:> 1137:html 1134:< 1083:$ ds 1071:$ db 1050:last 904:The 891:and 874:exit 830:> 827:html 821:> 818:body 812:> 802:> 792:> 783:href 777:< 773:> 767:< 763:> 760:body 757:< 754:> 751:head 745:> 735:> 729:< 726:> 723:head 720:< 717:> 714:html 711:< 669:HTTP 662:HTTP 535:and 468:, a 459:HTTP 443:> 433:> 424:href 418:< 357:logs 283:form 251:PURL 160:HSTS 119:and 111:and 83:for 68:and 3426:URL 2988:doi 2832:hdl 2824:doi 2765:RFC 2755:doi 2423:RFC 2413:doi 2374:RFC 2364:doi 2096:. 1883:PHP 1834:.is 1830:.at 1826:.to 1635:src 1534:src 1456:URL 1407:W3C 1291:200 1288:1.1 1080:set 1068:set 1047:$ 2 1021:man 924:301 877:(); 843:PHP 708:174 678:301 675:1.1 633:308 616:307 599:303 582:302 574:Yes 565:301 125:AMP 54:URL 3417:: 2994:. 2982:. 2956:. 2931:. 2840:. 2830:. 2818:. 2806:^ 2784:. 2763:. 2749:. 2743:. 2714:. 2695:. 2631:. 2613:. 2594:. 2562:}} 2558:{{ 2536:. 2465:. 2421:. 2407:. 2401:. 2393:; 2372:. 2358:. 2352:. 2217:. 2206:^ 1926:); 1908:); 1885:. 1878:. 1799:A 1599:. 1574:. 1505:: 1493:. 1352:. 1321:78 1294:OK 1097:$ 1062:/d 1044:/d 1042:$ 1023:: 945:on 871:); 859:); 660:A 445:. 249:, 76:. 3059:e 3052:t 3045:v 3004:. 2990:: 2967:. 2942:. 2916:. 2894:. 2872:. 2850:. 2834:: 2826:: 2800:. 2770:. 2757:: 2725:. 2699:. 2661:. 2635:. 2617:. 2598:. 2568:) 2540:. 2522:. 2500:. 2478:. 2450:. 2428:. 2415:: 2379:. 2366:: 2319:. 2255:. 2091:a 2082:; 2076:= 2060:; 2054:= 2045:= 2039:a 2005:; 1999:= 1990:= 1981:= 1920:. 1914:( 1902:( 1896:= 1733:. 1693:. 1688:a 1675:= 1669:a 1638:= 1620:= 1569:a 1556:= 1550:a 1537:= 1528:= 1519:= 1484:) 1478:( 1472:. 1466:. 1446:= 1440:. 1391:; 1382:; 1373:; 1347:a 1334:= 1328:a 1318:: 1309:: 1300:: 1285:/ 1239:p 1234:. 1229:a 1216:= 1210:a 1200:p 1170:= 1161:= 1108:} 1105:; 1089:; 1077:; 1065:{ 1056:} 1053:; 1034:{ 865:( 853:( 809:p 804:. 799:a 786:= 780:a 770:p 705:: 696:: 687:: 672:/ 478:3 440:a 427:= 421:a 101:; 87:; 34:. 20:)

Index

Web redirect
Knowledge:Redirect
World Wide Web
web page
URL
web browser
domain
wikipedia.com
wikipedia.net
wikipedia.org
URL shortening
broken links
web site
YouTube
Twitter
Invidious
Nitter
AMP
phishing
HTTPS
HSTS
top-level domains
search engines
URL shortening
microblogging
URL shortening
Permalink
PURL
Link rot
Post/Redirect/Get

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑