Hacking For Beginners – Manthan Desai
2010
Directory Access controls
• Htaccess files provide a way to make configuration changes on a per-directory basis.
• Htaccess files should be used in a case where the content providers need to make configuration changes to the serveron a per-directory basis, but do not have root access on the server system.
Configuring .htacess
How Attackers Hide Them While Attacking
Proxy Servers
• A Proxy Server is a server that acts as an intermediary between a workstation user and the Internet so that theenterprise can ensure security, administrative control and caching service.
• Hackers generally use the Proxy server on the Internet to make their Identity invisible to the target.
• So They hide their IP address by using the proxy server and make an anonymous brousing over internet.
• Please See the diagram for better understanding.
www.hackingtech.co.tv
Page 62