1. What is a chain shield?
Chain Shield is a high-performance, high-security, and high-stability anti-leeching system developed for large, medium and small sites to prevent site resources from being plagued by software downloads and hotlinking from external sites, which is a widespread phenomenon on the Internet. .
The Chain Shield anti-leeching system can be widely used in resource downloads, music, games and many other fields that require resource protection, and is safe and efficient. It is an ideal choice for enterprises, institutions, websites and other application entities when choosing anti-leeching solutions.
2. What is the difference between Chain Shield and previous anti-hotlink protection?
1. Different from previous anti-leech measures, the chain shield system has significant advantages in its operating mechanism compared with traditional ones:
Operational security performance: Chain Shield allocates a security certificate for each downloaded resource as an operating mechanism. When a download request arrives, it analyzes the user's permissions to determine whether it is legal, so the site resources are difficult to crack.
REFERER and COOKIES settings are currently widely used anti-hotlinking methods on the Internet. The biggest flaw of these two methods is that hotlinkers can easily imitate them. To download the software, you only need to fill in the main domain name of the link in REFERER. Crack.
2. Added thread control based on single IP.
3. Added the flow control (speed limit) function based on a single IP.
3. Operating principle: When the user visits the site page, Chain Shield records the visitor and gives the download permission. If the user directly downloads the resources through downloading software or browser without accessing the site page, Chain Shield will not give the download permission. The resource is therefore protected.
Chain Shield is a high-performance, high-security, and high-stability anti-theft linking system developed for small and medium-sized sites in order to prevent site resources from being plagued by software downloads and hotlinking from external sites, which is a widespread phenomenon on the Internet.
In order to ensure security and stability, Chain Shield products adopt the triple authentication principle based on large remote servers. That is, when a user accesses a site, the system requires the same IP to at least undergo Chain Shield's triple authentication, that is, site authentication, and then the code is Triple authentication for authentication and remote IP authentication. Resource downloads can only be provided if the above conditions are met at the same time.
In order to protect valuable resources such as the server's hard disk and other hardware resources and bandwidth, and safeguard the interests of the site, Chain Shield products also have download thread control and unit IP flow control functions, and also provide configuration files for webmasters to freely configure.
The Chain Shield server adopts the cache indexing solution used by large search engines, so it has an absolute advantage in performance and can load millions of verification requests every day.
4.Main features:
1. A powerful anti-hotlinking mechanism that fundamentally prevents any form of downloading/linking/referencing of resources on the site, including the imitation of data packets by downloading programs such as REFERER and COOKIES and other hotlinking operations.
2. An efficient and powerful backend service support system that can handle hundreds of millions of user requests every day.
3. Turn on/off the breakpoint resume function. Turning off means that the same IP only allows one download request.
4. The single IP download thread control function can control the number of unit IP download requests within the same time period. (Advanced version)
5. The single IP download flow control function can control the download flow of a single IP within the same time period to ensure the high speed and stability of the website server to the greatest extent. (Advanced version)
6. Hotlink information recording and reporting function (to be completed soon)
7. Supports files in any format, just enter the file format to be protected in the configuration file, such as: "exe", "zip", "rar", "gz", "htm", "gif", "aspx" ,"jpg"
8. Unlimited virtual directory support to maximize the security of local resources.
Expand