cookie的污染!
下图是我用wireshark的抓包,有个关于cookie的问题我比较郁闷:
当GET /user.php?act=login HTTP/1.1
后回返的HTTP/1.1 200 OK
设置了cookie如下:
ECS_ID=0a22939846734023b5b1dfd98de4d0f28230d386; path=/
ECS[visit_times]=1; expires=Sun, 07-Oct-2012 17:39:28 GMT; path=/
之后GET /captcha.php?is_login=1&2132503621 HTTP/1.1
的cookie却是:
Cookie: ECS_ID=0a22939846734023b5b1dfd98de4d0f28230d386; ECS[visit_times]=1; cnzz_a2408473=0; sin2408473=; rtime=0; ltime=1318124382171; cnzz_eid=55038762-1318120773-; __utma=17458850.2041195220.1318124382.1318124382.1318124382.1;
__utmb=17458850.1.10.1318124382; __utmc=17458850; __utmz=17458850.1318124382.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
之后搜索到一篇文章才知道乍回事,见下文章:
- __utmv is used for user-custom variables in Analytics
__utma __utmz
- __utmz tracks where a visitor came from (search engine, search keyword, link)
- __utma tracks each user"s amount of visits, first, last visit.
- __utmb and __utmc are used to track when a visit starts and ends to some decent time resolution (c expires quickly). If you look at cookie state changes (e.g. using firecookie ), you will see these change a lot .
声明:该文观点仅代表作者本人,牛骨文系教育信息发布平台,牛骨文仅提供信息存储空间服务。