Software, your way.
burger menu icon
WillMaster

WillMasterBlog > Content Protection

FREE! Coding tips, tricks, and treasures.

Possibilities weekly ezine

Get the weekly email website developers read:

 

Your email address

name@example.com
YES! Send Possibilities every week!

IP-Exclusive Directory Access

A directory that can be accessed only with your IP address is good security. The directory will let in only your IP address. Nobody else can get in, not even bots.

Every internet connection has its own IP address, which makes its connection unique among all internet connections in the world. When browsers and bots asks a server for information, they provide the server with their internet connection IP address. Their IP address is how a server knows which browser to respond to. (If a bot tries to spoof an IP address, they can not get any response at all from the server.)

Their IP address is not the same as your IP address. Only you have your IP address because only you have your internet connection. Thus, only you can access that directory.

Note that more than one browser can have the same IP address. But they must be connected to the internet with the same connection as you. For example, your family may have the same IP address as you do. But your neighbor does not, unless they hacked your Wi‐Fi.

To set it up, select or create a directory for the protection. Then, put these lines into the .htaccess file for that directory.

SetEnvIf REMOTE_ADDR 127.0.0.1 allow_this=1
Order Deny,Allow
Deny from all
Allow from env=allow_this

Replace 127.0.0.1 with your IP address and you are good to go. (If you do not know your IP address, the Willmaster IP address page can be used.)

For testing, try to access the directory with an IP address other than the one you have specified as being allowed. If you have no other way immediately available, the Tor browser can be used; it operates with a different IP address.

It is possible to enable more than one IP address. Perhaps you use more than one internet connection during the course of your work and home activities. Or perhaps you frequently visit relatives who have a different ISP.

To allow additional IP addresses, repeat the SetEnvIf... line. Example, for allowing three IP addresses:

SetEnvIf REMOTE_ADDR 127.0.0.1 allow_this=1
SetEnvIf REMOTE_ADDR 127.0.0.11 allow_this=1
SetEnvIf REMOTE_ADDR 127.0.0.111 allow_this=1
Order Deny,Allow
Deny from all
Allow from env=allow_this

The IP-address method is a quick way to protect a directory without having to implement a cookie and/or log‐in system.

(This content first appeared in Possibilities newsletter.)

Will Bontrager

Was this blog post helpful to you?
(anonymous form)

Support This Website

Some of our support is from people like you who see the value of all that's offered for FREE at this website.

"Yes, let me contribute."

Amount (USD):

Tap to Choose
Contribution
Method


All information in WillMaster Blog articles is presented AS-IS.

We only suggest and recommend what we believe is of value. As remuneration for the time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.

Recent Articles in the Library

Tap to Select

Find out how to make a link or button to select the content in a div or other HTML element.

Capitalizing the First Letter of Words

Here, find both PHP code and JavaScript code to capitalize the first letter of a word.

Fixed-position Table Header

During a vertical scroll, the table header scrolls out of view -- unless the header is fixed in position.

Simple Floating Menu

When not needed, the menu on the left side of a web page retracts to be out of the way. Tap it and it expands.

CSS Drop Shadows for Images

Images can be given drop shadows using pure CSS.

Ajax File Upload

Learn how to upload a file as soon as a file upload form field is given a file to upload.

Another Form Spam Prevention Technique

This technique should stop much or most of the form spam you are experiencing, perhaps even all of it.

How Can We Help You? balloons
How Can We Help You?
bullet Custom Programming
bullet Ready-Made Software
bullet Technical Support
bullet Possibilities Newsletter
bullet Website "How-To" Info
bullet Useful Information List

© 1998-2001 William and Mari Bontrager
© 2001-2011 Bontrager Connection, LLC
© 2011-2024 Will Bontrager Software LLC