SlideShare uma empresa Scribd logo
1 de 46
HTTP
All you need to know
Who are you?
Gökhan Şengün
R&D Business Dev., New Product & Solutions Manager
www.gokhansengun.com
@gokhansengun
Aim
• Better understand HTTP basics to debug problems better
• Know HTTP players to see the big picture
• Know useful tools to do things faster
HTTP
• HTTP is a stateless protocol.
• How is being stateless like?
• A stateless protocol does not require the server to retain information or
status about each user for the duration of multiple requests.
Http Proxy
Popular Http Proxies
• Fiddler
• Burp Suite
• Browser Developer Tools (Embedded Proxy)
Demo – Bare Metal - Using Telnet
Demo – Browser Developer Tool
Demo – Fiddler
Demo – Burp Suite
Http Protocol – Important Parts
Methods
Method Used for
GET Retrieve a resource
POST Create / Update a resource [Not Idempotent]
PUT Create / Update a resource [Idempotent]
DELETE Delete a resource
HEAD Retrieve a resource except the body
Response Codes
Code Meaning
1xx Informative
2xx Success
3xx Requires Additional Action
4xx Client Error (It is your fault)
5xx Server Error (It is my fault)
Accept (Req)
MIME used for media-type. Client gives hint about the types that
it understands well and preference.
Syntax:
• Accept: <MIME_type>/<MIME_subtype>
Examples:
• Accept: application/json, text/xml;q=0.9, */*;q=0.8
Content-Type (Req / Resp)
MIME used for media-type
Examples:
• Content-Type: text/html; charset=utf-8
• Content-Type: application/json
• Content-Type: text/xml
Demo – Accept and Content-Type
Host (Req)
• Hints the web server about the domain name requested
• Optionally includes port, default
• HTTP: 80
• HTTPS: 443
Examples:
• Host: www.gokhansengun.com
• Host: localhost:8090
Connection (Req / Resp)
• Hint from both client and the web server about TCP connection
• close: if either party for some reason wants to close
• keep-alive: if either party want to keep open for further requests
• Persistent connection (default in HTTP/1.1
• RFC 2616 limits 2 connection per host, browsers have 6 now.
Examples:
• Connection: close
• Connection: keep-alive
BTW: Http Pipelining
• Only Idempotent
requests allowed (GET,
HEAD)
• Guess why?
• Has benefit only on
high latency setups.
Accept-Languge (Req)
• Hint from client about its language preference
Examples:
• Accept-Language: en-US,en;q=0.8
• Accept-Language: tr-TR, tr;q=0.9, en;q=0.8, *;q=0.5
Demo – Accept-Language
Accept-Encoding (Req)
• Hint from client about its encoding preference
Examples:
• Accept-Encoding: Accept-Encoding: gzip, deflate, sdch
• Omit for non-encoding
Demo – Accept-Encoding
Referer (Req)
• Hint from client about the last page user navigated from.
• Allows analytics, caching, logging
Examples:
• Referer: http://ads.xyz.com
User-Agent (Req)
• Hint from client about the type of client
Examples:
• User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/54.0.2840.71 Safari/537.36
Cache-Control (Req / Resp)
• Hint from server to all over the world about resource’s cache
eligibility.
• Cache-Control: no-cache
• Cache-Control: public
• Cache-Control: private
• Cache-Control: no-store
• Cache-Control: max-age=300
• Cache-Control: public, max-age=31536000
Post / Redirect / Get Pattern (1)
• Problem (Multiple Post requests)
Post / Redirect / Get Pattern (2)
Post / Redirect / Get Pattern (3)
• Solution
Demo – Mix
HTTP Players
• Web Servers
• Load Balancers
• DDoS Protection and WAF Systems
• Cache Server
• CDN (Content Delivery Networks)
• Cloudflare
Web Servers
• Nginx
• Apache
• IIS
Load Balancers
• Balance HTTP load between servers
• Balance statefully (needs your SSL private key)
• Cache responses
• Alters requests and responses
• Blocks, rate-limits requests
• Does SSL-offloading (needs your SSL private key and
beneficial only if you have HW LB)
DDoS Protection Systems and WAF
• Observes traffic (needs your SSL private key)
• Detects malicious activity – several attacks
• Blocks IP, IP Range
• Redirects to No CAPTCHA or reCAPTCHA
• Rate-limits requests
Cache Servers
• Caches any type of HTTP responses from origion
• Could be static file or reference data
• Like very very simple KV store
• Powerful if scripting allowed
Examples:
• Varnish
• Nginx
CDN (Content Delivery Network)
• Caches the content on the edges
• Request does not enter your data center
• Very very efficient
Cloudflare
• CDN
• Load Balancing (Cloud – Region Based through DNS)
• DDoS
• WAF
• Rate Limiting
• Website Optimization
• Cache Header Optimization
• AutoMinify
• Aggressive Gzip
• Automatic Content Caching
Cookies
• Helps stateless HTTP protocol statefulness when necessary,
• Has restrictions in EU.
Types:
• Session Cookies
• Persistent Cookies
Authentication and Tokens
• Basic Authentication
• Forms Authentication
• Token Authentication
Session Cookie vs Token Auth
HTTP Security
• Use SSL/TLS for transport layer security (HTTPS everything)
• Why?
• Set Cookies with HttpOnly
• Avoid Cross Site Scripting
• Set Cookies with Secure
• Avoid sending cookies in HTTP requests
• Use HSTS (HTTP Strict Transport Security) header
• Instruct browser to comm only with HTTPS for a period of time
• Avoid SSL-stripping attacks
HTTP Performance Measurement
• Use Apache ab
• Use Apache JMeter (blogs from www.gokhansengun.com)
• http://loader.io/
• https://www.blazemeter.com/
• Use APM (Application Performance Monitoring) tools
• NewRelic, Dynatrace, Riverbed, App
Scaling HTTP
• Use Cache Server
• Use CDN
• Cache Aggressively
• Use DNS load balancing
• Use SPA (Single Page Application) Technique
• Minify and bundle JS / CSS
Questions?

Mais conteúdo relacionado

Mais procurados

Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
johnny19910916
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
Peter R. Egli
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
rahul kundu
 

Mais procurados (20)

Http-protocol
Http-protocolHttp-protocol
Http-protocol
 
HTTP
HTTPHTTP
HTTP
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
HTTP fundamentals for developers
HTTP fundamentals for developersHTTP fundamentals for developers
HTTP fundamentals for developers
 
HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?HTTP vs HTTPS, Do You Really Need HTTPS?
HTTP vs HTTPS, Do You Really Need HTTPS?
 
Introduction to HTTP protocol
Introduction to HTTP protocolIntroduction to HTTP protocol
Introduction to HTTP protocol
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
HTTP & HTML & Web
HTTP & HTML & WebHTTP & HTML & Web
HTTP & HTML & Web
 
HTTPS
HTTPSHTTPS
HTTPS
 
HTTP
HTTPHTTP
HTTP
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycle
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction to HTTP
Introduction to HTTPIntroduction to HTTP
Introduction to HTTP
 
Http request and http response
Http request and http responseHttp request and http response
Http request and http response
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Http methods
Http methodsHttp methods
Http methods
 

Semelhante a Http - All you need to know

Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
bryan_call
 
Computer network (10)
Computer network (10)Computer network (10)
Computer network (10)
NYversity
 
05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver
tarensi
 

Semelhante a Http - All you need to know (20)

Http2 in practice
Http2 in practiceHttp2 in practice
Http2 in practice
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application Technologies
 
CNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application TechnologiesCNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application Technologies
 
computer networking
computer networkingcomputer networking
computer networking
 
Ch 3: Web Application Technologies
Ch 3: Web Application TechnologiesCh 3: Web Application Technologies
Ch 3: Web Application Technologies
 
Introduction to Web Sockets
Introduction to Web SocketsIntroduction to Web Sockets
Introduction to Web Sockets
 
SPDY Talk
SPDY TalkSPDY Talk
SPDY Talk
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Under the Covers with the Web
Under the Covers with the WebUnder the Covers with the Web
Under the Covers with the Web
 
Measuring CDN performance and why you're doing it wrong
Measuring CDN performance and why you're doing it wrongMeasuring CDN performance and why you're doing it wrong
Measuring CDN performance and why you're doing it wrong
 
general protocol basics
general protocol basicsgeneral protocol basics
general protocol basics
 
Class 1 - World Wide Web Introduction
Class 1 - World Wide Web IntroductionClass 1 - World Wide Web Introduction
Class 1 - World Wide Web Introduction
 
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and WoeAltitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
 
Web technology Unit I Part C
Web technology Unit I  Part CWeb technology Unit I  Part C
Web technology Unit I Part C
 
EKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdfEKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdf
 
5 things you didn't know nginx could do velocity
5 things you didn't know nginx could do   velocity5 things you didn't know nginx could do   velocity
5 things you didn't know nginx could do velocity
 
Using Communication and Messaging API in the HTML5 World
Using Communication and Messaging API in the HTML5 WorldUsing Communication and Messaging API in the HTML5 World
Using Communication and Messaging API in the HTML5 World
 
Computer network (10)
Computer network (10)Computer network (10)
Computer network (10)
 
05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver05.m3 cms list-ofwebserver
05.m3 cms list-ofwebserver
 
JUDCon 2013- JBoss Data Grid and WebSockets: Delivering Real Time Push at Scale
JUDCon 2013- JBoss Data Grid and WebSockets: Delivering Real Time Push at ScaleJUDCon 2013- JBoss Data Grid and WebSockets: Delivering Real Time Push at Scale
JUDCon 2013- JBoss Data Grid and WebSockets: Delivering Real Time Push at Scale
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Http - All you need to know

  • 3. Gökhan Şengün R&D Business Dev., New Product & Solutions Manager www.gokhansengun.com @gokhansengun
  • 4. Aim • Better understand HTTP basics to debug problems better • Know HTTP players to see the big picture • Know useful tools to do things faster
  • 5. HTTP • HTTP is a stateless protocol. • How is being stateless like? • A stateless protocol does not require the server to retain information or status about each user for the duration of multiple requests.
  • 7. Popular Http Proxies • Fiddler • Burp Suite • Browser Developer Tools (Embedded Proxy)
  • 8. Demo – Bare Metal - Using Telnet
  • 9. Demo – Browser Developer Tool
  • 11. Demo – Burp Suite
  • 12. Http Protocol – Important Parts
  • 13. Methods Method Used for GET Retrieve a resource POST Create / Update a resource [Not Idempotent] PUT Create / Update a resource [Idempotent] DELETE Delete a resource HEAD Retrieve a resource except the body
  • 14. Response Codes Code Meaning 1xx Informative 2xx Success 3xx Requires Additional Action 4xx Client Error (It is your fault) 5xx Server Error (It is my fault)
  • 15. Accept (Req) MIME used for media-type. Client gives hint about the types that it understands well and preference. Syntax: • Accept: <MIME_type>/<MIME_subtype> Examples: • Accept: application/json, text/xml;q=0.9, */*;q=0.8
  • 16. Content-Type (Req / Resp) MIME used for media-type Examples: • Content-Type: text/html; charset=utf-8 • Content-Type: application/json • Content-Type: text/xml
  • 17. Demo – Accept and Content-Type
  • 18. Host (Req) • Hints the web server about the domain name requested • Optionally includes port, default • HTTP: 80 • HTTPS: 443 Examples: • Host: www.gokhansengun.com • Host: localhost:8090
  • 19. Connection (Req / Resp) • Hint from both client and the web server about TCP connection • close: if either party for some reason wants to close • keep-alive: if either party want to keep open for further requests • Persistent connection (default in HTTP/1.1 • RFC 2616 limits 2 connection per host, browsers have 6 now. Examples: • Connection: close • Connection: keep-alive
  • 20. BTW: Http Pipelining • Only Idempotent requests allowed (GET, HEAD) • Guess why? • Has benefit only on high latency setups.
  • 21. Accept-Languge (Req) • Hint from client about its language preference Examples: • Accept-Language: en-US,en;q=0.8 • Accept-Language: tr-TR, tr;q=0.9, en;q=0.8, *;q=0.5
  • 23. Accept-Encoding (Req) • Hint from client about its encoding preference Examples: • Accept-Encoding: Accept-Encoding: gzip, deflate, sdch • Omit for non-encoding
  • 25. Referer (Req) • Hint from client about the last page user navigated from. • Allows analytics, caching, logging Examples: • Referer: http://ads.xyz.com
  • 26. User-Agent (Req) • Hint from client about the type of client Examples: • User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.71 Safari/537.36
  • 27. Cache-Control (Req / Resp) • Hint from server to all over the world about resource’s cache eligibility. • Cache-Control: no-cache • Cache-Control: public • Cache-Control: private • Cache-Control: no-store • Cache-Control: max-age=300 • Cache-Control: public, max-age=31536000
  • 28. Post / Redirect / Get Pattern (1) • Problem (Multiple Post requests)
  • 29. Post / Redirect / Get Pattern (2)
  • 30. Post / Redirect / Get Pattern (3) • Solution
  • 32. HTTP Players • Web Servers • Load Balancers • DDoS Protection and WAF Systems • Cache Server • CDN (Content Delivery Networks) • Cloudflare
  • 33. Web Servers • Nginx • Apache • IIS
  • 34. Load Balancers • Balance HTTP load between servers • Balance statefully (needs your SSL private key) • Cache responses • Alters requests and responses • Blocks, rate-limits requests • Does SSL-offloading (needs your SSL private key and beneficial only if you have HW LB)
  • 35. DDoS Protection Systems and WAF • Observes traffic (needs your SSL private key) • Detects malicious activity – several attacks • Blocks IP, IP Range • Redirects to No CAPTCHA or reCAPTCHA • Rate-limits requests
  • 36. Cache Servers • Caches any type of HTTP responses from origion • Could be static file or reference data • Like very very simple KV store • Powerful if scripting allowed Examples: • Varnish • Nginx
  • 37. CDN (Content Delivery Network) • Caches the content on the edges • Request does not enter your data center • Very very efficient
  • 38.
  • 39. Cloudflare • CDN • Load Balancing (Cloud – Region Based through DNS) • DDoS • WAF • Rate Limiting • Website Optimization • Cache Header Optimization • AutoMinify • Aggressive Gzip • Automatic Content Caching
  • 40. Cookies • Helps stateless HTTP protocol statefulness when necessary, • Has restrictions in EU. Types: • Session Cookies • Persistent Cookies
  • 41. Authentication and Tokens • Basic Authentication • Forms Authentication • Token Authentication
  • 42. Session Cookie vs Token Auth
  • 43. HTTP Security • Use SSL/TLS for transport layer security (HTTPS everything) • Why? • Set Cookies with HttpOnly • Avoid Cross Site Scripting • Set Cookies with Secure • Avoid sending cookies in HTTP requests • Use HSTS (HTTP Strict Transport Security) header • Instruct browser to comm only with HTTPS for a period of time • Avoid SSL-stripping attacks
  • 44. HTTP Performance Measurement • Use Apache ab • Use Apache JMeter (blogs from www.gokhansengun.com) • http://loader.io/ • https://www.blazemeter.com/ • Use APM (Application Performance Monitoring) tools • NewRelic, Dynatrace, Riverbed, App
  • 45. Scaling HTTP • Use Cache Server • Use CDN • Cache Aggressively • Use DNS load balancing • Use SPA (Single Page Application) Technique • Minify and bundle JS / CSS

Notas do Editor

  1. Demo using Telnet
  2. Show Text wizard Repeat Requests Compose
  3. GET carries parameters in the URL whereas POST carries in the request body COPY paste the URL easily
  4. GET carries parameters in the URL whereas POST carries in the request body COPY paste the URL easily
  5. Using Github API https://api.github.com/users/gokhansengun
  6. www.facebook.com using Fiddler’s Composer
  7. www.gokhansengun.com using Fiddler’s Composer
  8. Visit www.milliyet.com.tr Revisit Visit www.gokhansengun.com Revisit Visit localhost/app, login Post Redirect Get Tell what 301, 302, 304 are.
  9. Apache Ab ab -k -c 1000 -n 10000 http://172.16.41.197/ist