Some ways to deal with crawlers to prevent personal information leaks

 

a word: "the machine does not understand, but people can understand the" text". For example, numbers can use numbers, Chinese capitals, or symbols, and so on.

My phone number is

for example: 1. 9. 0 2 4 5 1 2 3.

 

if the email address you can use instead of full width half angle, or cross use: for example, my email is [email protected] This is the least "encryption" approach that does not affect the reading experience, so that the crawler can’t read it now.

but because of the development of the multi crawler trash foreigner now, if this method is popular, or Chinese involved, this method will fail (full width and half-width character relationship, so it can be interpreted as "decoding" the character real email address).

below to some elements, lazy words can be copied directly down later use:

the 5 6 7 8 9 10 4

: the results of the 6, 10, 30, the office supplies, and on them, making a

123 4, the father, and the like, and we can, in the new,

.

1234567890

above some good, at least individuals can understand, and the following is with Chinese characteristics:

/

Yiersansiwuliuqibajiushi

Yiersansiwuliuqibajiushi 1.0

Three Siwuluqibajiu of

II

here are some of the techniques that require a little picture reading:

1:

offers

2: one is

3:

4:

0:

1:

2::

: 3 *

: 4:

¹ ² ³ production by some within production of alpha y y,

, none of the above lines is numeric or alphabetic, found from Greek and so on. If it is not UTF-8 encoded, it does not apply to Universal users.

0:

1:

2:

.3:

/

4:

5:

.

of course, because I don’t have Mars input on my computer, or I can find more interesting symbols.

What

needs to stress is that you don’t have to have every number

Leave a Reply

Your email address will not be published. Required fields are marked *