asp.net 去除viewstate
程序员文章站
2024-03-09 17:22:41
看下这段代码:生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要...
看下这段代码:
生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要做的仅仅是用另一种方式去保存这些数据。这是一段用base64编码的数据而并不是加密,我很好奇到底放了些什么东西在这里面。下面我开始破解这段代码。代码如下:
string str = "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";
byte[] barray;
barray = Convert.FromBase64String(str);
UTF8Encoding utf8 = new UTF8Encoding();
Response.Write(utf8.GetString(barray));
结果如下:
�
-681859587dfdddfText 玩具分类d _!ItemCount0fdf785车系列 Carsddf801船系列 Boatsddf809飞机系列 Planesddf811飞碟系列 UFOddf812益智系列 Educationalddf813婴儿系列 Baby setddf814动漫系列 Cartoonddf815泡泡系列 Bubblesddf816设施系列 Establishmentd df817运动系列 Sportsd
df818武装系列 Military setd df819装饰系列 Ornamentsd df820通讯系列 Communicationd
df821乐器系列 Musicalddf822水机系列 Water gameddf823风扇系列 Fanddf824工具系列 Toolsddf825动物系列 Animalsddf826相机系列 Cameraddf827消防系列 Fire Engineddf828工程系列 Engineeringddf829自装玩具 DIYddf830文具系列 Stationeryddf831其他玩具 Other Toysd NavigateUrl>list.aspx?id=&brand=&num=&order=0&key_n=&key_p_max=&key_p_min=dd>list.aspx?id=&brand=&num=5&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=10&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=15&order=&key_n=&key_p_max=&key_p_min=dd
fd131680./upload/20090326014840585.jpgd131680电动军事艇加军人d CommandName131680dd131680254dozdd131694./upload/20090326014840366.jpgd131694 游泳镜d131694dd131694518dozdd131686./upload/20090326014841257.jpgd131696 游泳镜d131696dd131696524dozdd131700./upload/20090326014841892.jpgd131700 游泳镜d131700dd131700516dozd CurrentPageIndex Recordcount�)PageSizedd__ControlsRequirePostBackKey__'ctl00$middlecontent$rptList$ctl00$cbxId'ctl00$middlecontent$rptList$ctl01$cbxId'ctl00$middlecontent$rptList$ctl02$cbxId'ctl00$middlecontent$rptList$ctl03$cbxId'ctl00$middlecontent$rptList$ctl04$cbxId�P�����LΫ
这个大家可以在http://gallery.toysgogo.com/list.aspx这个页面中看到。
生成了这么多的一段东西,这段东西对seo一点好处也没有。而我要做的就是去掉它,但有一点,去掉但不能让它原来的控件和内容都发生变化,比如说不能使用等等。所以我要做的仅仅是用另一种方式去保存这些数据。这是一段用base64编码的数据而并不是加密,我很好奇到底放了些什么东西在这里面。下面我开始破解这段代码。代码如下:
复制代码 代码如下:
string str = "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";
byte[] barray;
barray = Convert.FromBase64String(str);
UTF8Encoding utf8 = new UTF8Encoding();
Response.Write(utf8.GetString(barray));
结果如下:
复制代码 代码如下:
�
-681859587dfdddfText 玩具分类d _!ItemCount0fdf785车系列 Carsddf801船系列 Boatsddf809飞机系列 Planesddf811飞碟系列 UFOddf812益智系列 Educationalddf813婴儿系列 Baby setddf814动漫系列 Cartoonddf815泡泡系列 Bubblesddf816设施系列 Establishmentd df817运动系列 Sportsd
df818武装系列 Military setd df819装饰系列 Ornamentsd df820通讯系列 Communicationd
df821乐器系列 Musicalddf822水机系列 Water gameddf823风扇系列 Fanddf824工具系列 Toolsddf825动物系列 Animalsddf826相机系列 Cameraddf827消防系列 Fire Engineddf828工程系列 Engineeringddf829自装玩具 DIYddf830文具系列 Stationeryddf831其他玩具 Other Toysd NavigateUrl>list.aspx?id=&brand=&num=&order=0&key_n=&key_p_max=&key_p_min=dd>list.aspx?id=&brand=&num=5&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=10&order=&key_n=&key_p_max=&key_p_min=dd?list.aspx?id=&brand=&num=15&order=&key_n=&key_p_max=&key_p_min=dd
fd131680./upload/20090326014840585.jpgd131680电动军事艇加军人d CommandName131680dd131680254dozdd131694./upload/20090326014840366.jpgd131694 游泳镜d131694dd131694518dozdd131686./upload/20090326014841257.jpgd131696 游泳镜d131696dd131696524dozdd131700./upload/20090326014841892.jpgd131700 游泳镜d131700dd131700516dozd CurrentPageIndex Recordcount�)PageSizedd__ControlsRequirePostBackKey__'ctl00$middlecontent$rptList$ctl00$cbxId'ctl00$middlecontent$rptList$ctl01$cbxId'ctl00$middlecontent$rptList$ctl02$cbxId'ctl00$middlecontent$rptList$ctl03$cbxId'ctl00$middlecontent$rptList$ctl04$cbxId�P�����LΫ
这个大家可以在http://gallery.toysgogo.com/list.aspx这个页面中看到。