Chapter 14. Client Identification: Papers, Please!
Seeing through a thin disguise may come in handy on many occasions
The challenge of determining the true identity of software and its legitimacy can be rather easily resolved locally on the computer running the software. But it’s not so easy to do so over a network.
Both system administrators and application developers often attempt to identify software being used at the other end of a network-based session, with varying degrees of success. We attempt to identify software for several reasons. For the WWW (World Wide Web), the most common goal is to optimize the content served to a client based on the rendering engine being used—whether that content is legitimate or malicious. The goal for client ...
Get Silence on the Wire now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.