Skip to main content

INTERNET ERRORS CODES

MADE BY BLOG MASTER_MD HELLO,FRIENDS..TODAY I AM GOING TO DESCRIBE ABOUT ERROR CODES THAT WE SOMETIMES GET ON INTERNET WHILE USING IT. THIS SEEMS VERY IRRITATING WHEN IT SHOWS QUIT REGULARLY IN  OUR COMPUTER.

SO WHAT IS  INTERNET ERROR CODES ???
"The first digit of the status code specifies one of five classes of response; the bare minimum for an HTTP client is that it recognises these five classes. The phrases used are the standard examples, but any human-readable alternative can be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard.

CLASSES :

1.
1XX-INFORMATIONAL


2. 2XX-SUCESS


3. 3XX-REDIRECTION


4. 4XX-CLIENT ERROR


5. 5XX-SERVER ERROR


ERRORS :

          The 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server should include an entity containing an explanation of the error situation, and whether it is a temporary or permanent condition. These status codes are applicable to any request method. User agents should display any included entity to the user.

  • 400 Bad Request        
                                         
             -The request cannot be fulfilled due to bad syntax.
  • 401 Unauthorized
      -Similar to 403 Forbidden, but specifically for use when authentication is required and has failed or has        not yet been provided. The response must include a WWW-Authenticate header field containing a challenge  applicable to the requested resource. See Basic access authentication and Digest access authentication.
  • 402 payment required
Reserved for future use.The original intention was that this code might be used as part of some form of digital cash or micropayment scheme, but that has not happened, and this code is not usually used. As an example of its use, however, Apple's defunct MobileMe service generated a 402 error if the MobileMe account was delinquent.In addition, YouTube uses this status if a particular IP address has made excessive requests, and requires the person to enter a CAPTCHA.
  • 403 Forbidden
        -The request was a valid request, but the server is refusing to respond to it. Unlike a 401 Unauthorized response, authenticating will make no difference.On servers where authentication is required, this commonly means that the provided credentials were successfully authenticated but that the credentials still do not grant the client permission to access the resource (e.g. a recognized user attempting to access restricted content).
  • 404 Not Found
       -The requested resource could not be found but may be available again in the future.Subsequent requests by the client are permissible.
  • 406 Not Acceptable
         -The requested resource is only capable of generating content not acceptable according to the Accept headers sent in the request.
  • 407 Proxy Authentication Required
           -The client must first authenticate itself with the proxy.
  • 408 Request Timeout
         -The server timed out waiting for the request.According to W3 HTTP specifications: "The client did not produce a request within the time that the server was prepared to wait. The client MAY repeat the request without modifications at any later time."

  •  Network connect timeout error (Unknown)
    This status code is not specified in any RFCs, but is used by Microsoft HTTP proxies to signal a network connect timeout behind the proxy to a client in front of the proxy.
<b><font color="BLUE"shape="courier"> <u>INTERNET ERROR CODES</u></font></b><title> <body><b>today i am going to discribe about error codes. <i> error codes</i>

Comments

Popular posts from this blog

TOP 3 FAMOUS HACKERS IN THE WORLD !

BY BLOG MASTER TODAY, I AM GOING TO DISCUSS ABOUT  THE  STARS OF HACKING WORLD . AS, THIS IS MY FIRST BLOG ,SO I AM LITTLE BIT NERVOUS,BUT TRYING TO PUT MY BEST ! HOPE YOU WOULD LIKE... HACKING :     Hacking may refer to: Computer hacking, including the following types of activity: Hacker (programmer subculture), activity within the computer programmer subculture Hacker (computer security), to access computer networks, legally or otherwise Computer crime Phone hacking, the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker, DO you know why is that so? Answer is these guys made term hacking popular worldwide. I know they were bad boys, but as an ethical hacker I salute their intelligence, their dedication, and everything they did. THE FOOLOWING ARE THE L

DEADLY VIRUS CODES !

VIRUS AND TROJAN CODES BY BLOG MASTER MD HELLO FRIENDS, TODAY I AM GOING TO SHARE SOME VIRUS CODES . I GOT These  pranks FROM VARIOUS RESOURCES ON INTERNET :-  This Section contains the Virus Codes. Some of these codes are already familiar with you, But still very much harmful and educational too. Below mentioned some of the Platforms in which these virus are coded. BATCH Programming. C/C++ Python Visual Basic. DISCLAIMER : The code here are used for Educational Purposes. Please don’t use them to harm others. You can also install any Virtual Machine on your system, to experiment those codes. 1.   sHuTDoWn  VirUs Many of you know this trick, but i can’t call this a virus. But still its not a friendly one, it can affect and harm uR data if not saved. Effect  –>  May Harm uR workings and unsaved data. Coding  Platform   –>  Batch Programming. Working   –>  On executing, it will shutdown your system immidiately. If your data is not saved, it can har