Software, your way.
How To Get Good Custom Software
(Download)
(PDF)
burger menu icon
WillMaster

WillMasterBlog > Content Protection

FREE! Coding tips, tricks, and treasures.

Possibilities weekly ezine

Get the weekly email website developers read:

 

Your email address

name@example.com
YES! Send Possibilities every week!

IP-Exclusive Directory Access

A directory that can be accessed only with your IP address is good security. The directory will let in only your IP address. Nobody else can get in, not even bots.

Every internet connection has its own IP address, which makes its connection unique among all internet connections in the world. When browsers and bots asks a server for information, they provide the server with their internet connection IP address. Their IP address is how a server knows which browser to respond to. (If a bot tries to spoof an IP address, they can not get any response at all from the server.)

Their IP address is not the same as your IP address. Only you have your IP address because only you have your internet connection. Thus, only you can access that directory.

Note that more than one browser can have the same IP address. But they must be connected to the internet with the same connection as you. For example, your family may have the same IP address as you do. But your neighbor does not, unless they hacked your Wi‐Fi.

To set it up, select or create a directory for the protection. Then, put these lines into the .htaccess file for that directory.

SetEnvIf REMOTE_ADDR 127.0.0.1 allow_this=1
Order Deny,Allow
Deny from all
Allow from env=allow_this

Replace 127.0.0.1 with your IP address and you are good to go. (If you do not know your IP address, the Willmaster IP address page can be used.)

For testing, try to access the directory with an IP address other than the one you have specified as being allowed. If you have no other way immediately available, the Tor browser can be used; it operates with a different IP address.

It is possible to enable more than one IP address. Perhaps you use more than one internet connection during the course of your work and home activities. Or perhaps you frequently visit relatives who have a different ISP.

To allow additional IP addresses, repeat the SetEnvIf... line. Example, for allowing three IP addresses:

SetEnvIf REMOTE_ADDR 127.0.0.1 allow_this=1
SetEnvIf REMOTE_ADDR 127.0.0.11 allow_this=1
SetEnvIf REMOTE_ADDR 127.0.0.111 allow_this=1
Order Deny,Allow
Deny from all
Allow from env=allow_this

The IP-address method is a quick way to protect a directory without having to implement a cookie and/or log‐in system.

(This content first appeared in Possibilities newsletter.)

Will Bontrager

Was this blog post helpful to you?
(anonymous form)

Support This Website

Some of our support is from people like you who see the value of all that's offered for FREE at this website.

"Yes, let me contribute."

Amount (USD):

Tap to Choose
Contribution
Method


All information in WillMaster Blog articles is presented AS-IS.

We only suggest and recommend what we believe is of value. As remuneration for the time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.

Recent Articles in the Library

Simple 2-Column Flex Code Generator

This generator is intended to provide copy-and-paste code for use where 2 flex columns are desired.

Preventing Line Breaks

Three ways to prevent a browser from inserting its own line breaks.

Keeping Image Location Secret

The URL of an image embedded in a web page may be kept secret.

Easier Reading of JSON Data

For easier reading of JSON data, convert the JSON into an array.

Fixed Position Image

Position an image within a browser window that won't move even with page scroll.

Visually Centering Images

Sometimes an image that is technically centered doesn't look quite centered when viewed.

Cookie Directory Protection

Protecting subdirectories with a cookie can be an especially good method when access needs to be allowed from various internet connections.

How Can We Help You? balloons
How Can We Help You?
bullet Custom Programming
bullet Ready-Made Software
bullet Technical Support
bullet Possibilities Newsletter
bullet Website "How-To" Info
bullet Useful Information List

© 1998-2001 William and Mari Bontrager
© 2001-2011 Bontrager Connection, LLC
© 2011-2024 Will Bontrager Software LLC