Web crawler interception method and device, electronic equipment and readable storage medium
A network crawler and terminal equipment technology, applied in the field of network security, can solve the problems of cumbersome operation steps, heavy maintenance workload of protection software upgrades, etc., and achieve the effect of simple process, improved network security and fast speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.
[0038] At this stage, the robot agreement is an agreement between the website and the web crawler, and the robot agreement is usually a simple text in txt format. In the protection based on the robot protocol, the web crawler is informed of the allowed permissions through a simple text format in txt format. When a web crawler visits a site, it first checks whether there is a robots.txt file in the root directory of the site. If it exists, the web crawler will determine the scope of access according to the contents of the file; The crawler will be able to access all pages on the website that are not password protected.
[0039] However, some malicious web crawlers do not abide by the robot protocol, and the aforementioned robot p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


