<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security &#8211; bunyam.in</title>
	<atom:link href="https://bunyam.in/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://bunyam.in</link>
	<description>Easy Solutions</description>
	<lastBuildDate>Wed, 16 Apr 2025 11:06:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>
	<item>
		<title>How to detect request is XHR or Ajax</title>
		<link>https://bunyam.in/how-to-dedect-request-is-xhr-or-ajax/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 29 Sep 2015 09:14:57 +0000</pubDate>
				<category><![CDATA[PHP]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[dedect ajax]]></category>
		<category><![CDATA[dedect xhr]]></category>
		<category><![CDATA[get request]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://bunyam.in/?p=25</guid>

					<description><![CDATA[Detecting XHR is a small trick for security procedure nowadays. Today most web application is detecting by bots or spiders. Some of them looking for your security issues. You can handle it with simple moves.  If you filter just like below, there is a one more layer for your critical... <a href="https://bunyam.in/how-to-dedect-request-is-xhr-or-ajax/">Read more &#187;</a>]]></description>
										<content:encoded><![CDATA[<p>Detecting XHR is a small trick for security procedure nowadays.</p>
<p>Today most web application is detecting by bots or spiders. Some of them looking for your security issues. You can handle it with simple moves. <span id="more-25"></span></p>
<p>If you filter just like below, there is a one more layer for your critical procedures. Because lots of spiders or crawlers does not have skill for set request type.</p>
<p>[php]<br />
/* XHR-AJAX check */<br />
if(!empty($_SERVER[&#8216;HTTP_X_REQUESTED_WITH&#8217;]) &amp;&amp; strtolower($_SERVER[&#8216;HTTP_X_REQUESTED_WITH&#8217;]) == &#8216;xmlhttprequest&#8217;){<br />
/*Your Procedures or processes */<br />
}else{<br />
/*Here is a direct call or bot */<br />
die(&#8216;you shall not pass!&#8217;);<br />
}<br />
[/php]<br />
Simple.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
