>Brad Dixon wrote:
>
>> URL -----> Squid ------> Parse through program --------> client
>
>Um ... any chance you could enlighten us as to what you are trying to
>achieve, and why? Are you trying to censor the content your clients are
>going to see, or are you trying to measure data for billing purpose? Are
>you trying to spy on your clients? Or what?
>
This is the senerio ...
I have a new database system that I have incorperated and want to set up a system for
some graphic designers to have images in there clients URL's entered into the database
and scaned for dupes before they recieve them on their browser if there is a dupe the
image is transposed on to a new html ducement and sent to them instead .. They need it
for some type of copywrite scheam they are running. the flow chart would be as follows -
-------> dupe image send this warning url ->
URL -----> squid -----> database client
-------> No Dupe -------------------------->
Make any bloody sense ??
>
Kind Regards
Brad Dixon.
Network Manager.
Preferred Internet Providers.
Email : brad@pip.com.au.
Phone : 488-7655.
Received on Mon Jan 20 1997 - 22:53:37 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:34:08 MST