WWW Homepage Access Counter and Clock!

- For Unix, Microsoft NT and IBM OS/2 -

Binary for NT is available here!

[Count Release 2.3]

Latest Release: 05-02-96
Initial Release: 04-13-95


*** 0:0

What's new (in 2.3)

Please check this section periodically to see what have been changed or added.

Table of Contents

  1. Requirements
  2. Introduction
  3. Features
  4. Digit styles (all platforms)
  5. Obtaining source/binary archive for Unix, NT and OS/2
  6. Directory Structure (unix)
  7. Steps to compile and install (unix)
  8. Steps to compile and install (NT)
  9. Test the program from command line (unix)
  10. How to call the program from web page? (all platforms)
  11. Counter options (all platforms)
  12. How to use other styles of digits? (all platforms)
  13. How to create an image strip? (all platforms)
  14. How to write "Host Ignore" block in the confguration file? (all platforms)
  15. Examples (all platforms)
  16. What is "Counter Terrorism"? And how this program handles it? (all platforms)
  17. Error messages (all platforms)
  18. Frequently asked questions (all platforms)
  19. Copyright (all platforms)
  20. Acknowledgment
  21. Authors
  22. I like to hear from you
  23. ChangeLog (if you contributed, your name is there)

1. Requirements

I personally compiled and tested it on a Sparc 10 (SunOS 4.1.4) running NCSA httpd 1.4 , CERN httpd 3.0, Apache httpd.

It is reported that the counter runs on:

Operating System First reported by
AIX 3.2.5 ?
AU/X jussi.haro@tothepoint.fi
AT&T Unix SVR4 ?
BSDI chris@technonet.com
DEC OSF1 ma_muquit@fccc.edu
FreeBSD 2.1.5 tomcat@1lo.lublin.pl
HP-UX takao.tsukiyama@tokyo.tohmatsu.co.jp
Linux ashley@photocraftlab.com
NetBSD ?
NEXTSTEP 3.3,3.2,4.0 for Mach
(Motorola,Intel)
jk@exnext.com
NT 3.51 (intel) ma_muquit@fccc.edu
SunOS 4.1.x ma_muquit@fccc.edu
Solaris 2.x ma_muquit@fccc.edu
SCO ?
SGI ma_muquit@fccc.edu
ULTRIX 4.3 mbarria@ing.puc.cl
UnixWare 2/2.03 ebh@fpk.hp.com
ivanlan@tzuk-te.callware.com
Win95 null@dent.showa-u.ac.jp
OS/2 marcio@ausvmr.vnet.ibm.com

The ? mark indicates I forgot the name who reported. If you are running the counter under one of those OS, and won't mind to help someone having problem installing the counter on that OS, drop me a line.

2. Introduction

This is a CGI program to keep record of the raw hits of a web page. It generates a GIF image of the number of hits and returns to the browser as an in-lined image. The program also has a run-time option not to show the digit images, this way the hits can be kept without displaying it. The hits can be be monitored without incrementing from a separate page as well. Almost all of the features are run-time options. The hits are no way accurate. Someone can reload the page again and again to increase the hits. However, people like to see how many times someone visited their page. The same program can be used to count hits for any number of web pages for any number of users. The program can be used to display time or date as well. The time or date of any place in the word can be displayed by specifying a timezone string for that location. The date can be formatted in any combination of MMDDYY (Month-Day-Year). This program started as a fun to play with CGI programming but due to enormous interest, feature request, input from thousands of you, it has turned in to the most configurable counter on the whole World Wide Web and it is free and always will be free.

The program is distributed as a gzip'd tar archive. If you do not have gzip/gunzip, it's available at: prep.ai.mit.edu.

3. Features

  • Does not require server-side includes.

  • Uses image strip as well as individual digit images. Using an image strip reduces disk i/o significantly, therefore, it's faster. A program (mkstrip) is supplied to create an image strip from individual digit images.

  • Comma can be displayed after every 3rd digit from right.

  • Any one color of the image can be changed on the fly.

  • Uses netmasks to mask out a range of hosts in the network or the entire network.

  • Automatic datafile creation, strict mode, use of rgb color database can be controlled from the cfg file at run time.

  • Any arbitrary GIF file can be displayed. Frame and other attributes of the counter can be applied to the GIF file.

  • Count 2.0 is backward compatible with Count1.5's URL. One thing to note, the keyword wxh has no meaning in Count 2.0. It was used in Count 1.5 to specify digit dimensions. In Count 2.0 it is not required, because the digit dimensions are determined automatically. Therefore, you can use variable width digit images in this version.

  • Reasonable default for all QUERY_STRING parameters.

  • The same program can be used to display time or date.

  • The time and date of any timezone in the world can be displayed. The time can be displayed in 12 or in 24 hour format.

  • Supports digit images with variable width.

  • Counter can be displayed without incrementing (for monitoring etc.)

  • A literal digit string can be displayed.

  • A random digit string can be displayed.

  • The color of the digits can be negated.

  • The counter can be rotated (only integral of 90 degrees, 90,180,270). The default rotation is 270 degrees.

  • An ornamental 3D frame can be wrapped around the counter image with user defined thickness and color at run time.

  • The frame and transparent color can be a name (e.g. red,green,pink etc.). The color can be specified as a hex string, e.g. ffffff, ff0000 etc. as well as RGB triplets as before.

  • Single program for any number of users for any number of web pages.

  • Any color of the counter image can be made transparent at run time.

  • Style of digits can be specified at run time.

  • Authorized host names can be in the configuration file. To handle "Counter Terrorism", (looks like this page is dead!) the source code modification is not necessary.

  • IP filtering through a configuration file at run time. Any number of hosts can be ignored from counting. A netmask can be used to filter out a specific range of host in a network or to filter out the entire network. It's a good idea to ignore your own host or entire domain. Gen-conf program will let you create the configuration file interactively.

  • Advisory data file locking. Data file will not get messed up by simultaneous Count.cgi processes. Advisory data file locking is superior to ancillary file locking because advisory locking is handled directly by the Operating System.

  • Maximum number of digits can be set or counter can be displayed with exact number of digits at run time.

  • User will be able to specify a start-up counter value at run time. This will take effect if the data file does not exist. You will be prompted by the configuration program if you want this feature or not.

  • If you do not want to display the counter but like to keep the hits on your page, sh=0 can be defined in the QUERY_STRING at run time. It will write a 1x1 transparent GIF image to the browser but the counter in the data file will be incremented all right.

Obtaing source archive

The source code for this program is distributed as a gzip compressed tar archive. The source code for the current version compiles on Unix and NT.

If you do not have gzip/gunzip, it's available at: prep.ai.mit.edu.

If you do not have gzip/gunzip and tar for NT, they are floating around on the net. Please do not ask me to supply a zipped version for the source distribution.

This machine is getting enormous number of ftp requests lately. Therefore, I had to impose a limit of maximum 10 ftp connections at one time. The limit will go up to 50 maximum connections at 11:00 PM US Eastern Standard Time and go back to 10 maximum connections at 6:00 AM US Eastern Standard Time.
Sorry for the inconvenience!

ftp Download source code archive (2.3) for Unix and NT (gzipped, tarred)
[Latest Version]

Please visit the page for NT binary

ftp Download source+binary archive (2.2) for OS.2 (pkzipped)
The port to OS/2 is done by Marcio C Almeida marcio@ausvmr.vnet.ibm.com

Note: this document talks about compiling and installing the counter to Unix and NT platform. Please read the README.OS2 file for OS/2 installation.

The file wwwcount2.3.tar.gz is a gzip'ed tar file. To extract the distribution, at the shell prompt, type:

    gunzip < wwwcount2.3.tar.gz | tar xvf -
    cd wwwcount2.3
The program will compile with ANSI or non-ANSI C compiler.

6. Directory Structure (unix)

Before going to the configuration procedure, please browse through the default directory structure below. It will help you answering questions of the configuration script. You can change the name of the directories as you please, but keep the directory structure same, it will make your life much easier. You do not have to create any of these directories, they will be created for you by the Count-install program. Only thing you probably have to create are the individual datafiles (keep reading).

[image]

Base Directory is the directory where all the sub-directories and the files related to counter reside.

Log Directory is the directory which holds the counter Log file. Counter error messages or if someone tries to access your counter remotely, warning message regarding this is written to this file.

conf directory holds the configuration file for the counter. configuration file holds information in 4 blocks. Each block resides between a left and right curly brace. This file is created by the program Gen-conf and can be hand crafted later. After creating the file, please read the comments in the file. To know more about netmasks which can be used in the 4th block, please read the section How to write "Host Ignore" block in the configuration file to know how to write the "Host Ignore" block.

data directory holds all the datafiles for the counter. The datafiles stores the access counts of web pages. Each page must have a separate datafile. The datafile is specified at run-time. You will know about it later.

digits directory holds sub-directories with various styles of GIF digits. For example, A sub-directory holds the green led digits. The sub-directories have GIF digit files named zero.gif, one.gif...nine.gif. you will know about it later.

rgb.txt file is used to convert a color name (for example, cyan) to the appropriate red, green and blue color component. This file came from X consortium and supplied with the distribution. You will know about the file later.

4. Digit Styles (all platforms)

The digits used in this program can be individual GIF files or all the digits can be in a single image strip. This gives flexibility of using digits of your choice. In case of individual digit images, they are named as zero.gif, one.gif,.... nine.gif. In case of image strip, the strip is named as strip.gif. At run-time, simply the directory of the images is specified to use a different style. Therefore, a single program can display digits of various styles. Here are the supplied digit styles. I will not supply individual digit images anymore. All the styles of digits are supplied as a single image strip. Note the order of the digits (you will know about it later).

Style A styleA designed by the author
(digits/A/strip.gif)
Style B styleB Borrowed from HTML-access counter. (digits/B/strip.gif)
Style C styleC designed by benjamin@pop3.oro.net
(digits/C/strip.gif)
Style D styleD designed by the author
(digits/D/strip.gif)
Style E styleE desined by the author
(digits/E/strip.gif)

A suggested use of style E is to make the white color transparent (you will know about transparency later).

For a huge collection of GIF digits, check out the Digit Mania page.

Some other sites:

This program will work with any digits from the Digit Mania page. To use those digits, create subdirectories say, F,G, H etc. inside the digits directory and rename the images to zero.gif, one.gif..nine.gif. I suggest create an image strip out of these digits and use it instead of using individual images.

Before using these digits, please read the sections How to use other styles of digits and How to create an image strip.

7. Steps to compile and install (unix)

In the current release of the counter, there should not be any need for hand editing any files. Several configuration scripts are supplied to automate the whole process. I am giving a little description about the scripts just may be you are curious:

Count-config
script to generate the header file config.h, a variable template file for install program.

configure
script to generate correct Makefiles for any Unix system.

Gen-conf
script to generate the configuration file.

Count-install
script to install the Count binary Count.cgi, digit images, configuration file and the rgb color name database to the correct places.

Now at the shell prompt (shell prompt is where you type ls, read your mails etc.), type the following commands in the described order and press Return key:

Step 1

./Count-config
The script will ask questions with brief description. Answer them. Look at the directory structure image to better understand the questions.
Look at a sample session

Step 2

./configure
The script will not ask any questions, but you will see the informational messages about your system. It will create the Makefiles (Makefile, combine/Makefile and utils/Makefile) for your system.
Look at a sample session

Step 3

make clean (not needed if you are compiling the first time)
make
Compilation will start if the previous two scripts completed successfully. It will take some time. If compilation succeeds, go to the next step.

Step 4

./Gen-conf
This script will ask you questions about your system. Answer them. This process will create the configuration file for the counter.
Look at a sample session

Step 5

./Count-install
This is the final step. This scripts will install the necessary things for the counter in your system. You will need root access if you are installing it an area where root access is needed. This program will ask you some questions.

If you finished all the above steps successfully, you are ready to test the counter.

8. Steps to compile and install (NT)

You do not need to compile the program for NT in order to use it. A compiled version is already supplied. I compiled the program on NT 3.51 (intel) with MS Visual C++ 4.0. The makefiles supplied are for MS Visual C++ 4.0 as well. If you use some other kind of compiler, you are on your own.

Assuimg you already downloaded and extracted the sources from the archive. Open a command shell window and perform the following steps:

    1. Edit the file configNT.h and see if you need to change anything.

    2. cd wwwcount2.3
    3. cd combine
    4. nmake -f makefile.wnt
    5. cd ..
    6. nmake -f makefile.wnt
The above procedure will create the executable Count.exe. Copy the file Count.exe to your cgi-bin or scripts directory or where ever you keep the CGI programs. Open the File Manager and copy or move the directory wcount to C drive (if you edited the file configNT.h and changed the location, copy it there). Read the section How to call the program?.

If you want to create the program mkstrip.exe, do:

    1. cd utils
    2. nmake -f makefile.wnt
    3. Copy or move the file mkstrip.exe to somewhere in your path.

9. Test the program from command line (unix)

A shell script is supplied for testing the counter. the name of this script is testcount-sh. Look at this script, you might need to change certain things. Please read the comments in this script for understanding the various run-time options of the counter. You'll also know in detail about the options in the section How to call the program.When you are happy with everything, save it and at the shell prompt type:
    ./testcount-sh
If you have bash or sh for NT, at the command promt, type:
    bash ./testcount-sh
    or
    sh ./testcount-sh

10. How to call the program? (all platforms)

You can refer to the program from web page like this:

<img src="/cgi-bin/Count.cgi?df=sample.dat" align=absmiddle>

The string between ? and " is called the QUERY_STRING. Make sure there is no newlines in the <img src= line and no space in the QUERY_STRING. Here in, df=sample.dat, df means datafile and sample.dat is the counter datafile. The counter stores the hits in this file. This datafile is supplied. If you configured the counter to allow automatic datafile creation (look at count.cfg file), you can specify a datafile with df like df=count.dat. The file count.dat will be created for you if the permission to the data directory is correct.

If you configured not to allow automatic datafile creation (good thing), you have to create this file in the data directory. cd to the data directory and type:

    echo 1 > count.dat

The counter program has lots of options, you can make it work and look the way you desire. In the query string, you can use the options described in the table below. The options can be separated by a | or a &. You can use either one or combination of both. Here is an example:

<img src="/cgi-bin/Count.cgi?ft=T&frgb=gold|df=sample.dat" align=absmiddle>

The options can be in any order and not case sensitive.

Anyway, look at this Example Page you will get the picture.

11. Counter options (all platforms)

[Originally written in HTML table by Kevin]

Parameter Name Description Default
display=X Specifies what to display. A valid string can be specified with display= parameter to display counter, clock or date. The valid value for the string parameter X is counter,clock or date For counter, this parameter is not need as counter is the default display type. display=counter
timezone=X Display time/date of the specified timezone. The parameter timezone= is only significant with display=clock or display=date. Use this parameter if you want to display time or date of another timezone. The timezone must be specified with a negative or positive four digit offset from GMT, for example: timezone=GMT-0500 or timezone=GMT+0000 or timezone=GMT+0530. The routine to display time of various timezones are written in a generic way. Therefore, the unix machines will not be aware of daylight saving time because of the way the routine is written. For example, if daylight saving time is on, to display time of NY, the timezone will be timezone=GMT-0500 instead of timezone=GMT-0400.

If the clock displays your local time wrong, specify your timezone with that parameter in order to display the correct time.

None.
tformat=X

[new in this release]

Time format in 12 or 24 hour. This parameter can be used to display time in 12 or 24 hour format. The valid values for the parameter X is 12 or 24. tformat=12
dformat=X Specifies date format. This parameter is only significant with display=date. The valid value for the string parameter X is any combination of MMDDYY (Month-Day-Year). For example, dformat=ddmmyy, dformat=YYMMDD. dformat=MMDDYY
istrip=B

[new in this release]

Use of image strip On/Off The boolean value of istrip specifies whether to use image strip or not. If you specify istrip=F, the program will look for the individual digit image files in the digits/style directory. The valid values for the Boolean parameter istrip are Y, N, T, F, 1 or 0. istrip=T
ft=X Frame Thickness You can wrap the counter in an ornamental frame of X pixels thick. Use 0 for no frame. Values over 5 make a nice 3-D effect. ft=6
frgb=R;G;B Frame Color Specifies the color of the frame in RGB (red/green/blue) format. Each color component, R, G, and B is specified as a value between 0 and 256. If you use ft= without a frgb= param, the default color is used.

If you specify a frgb= without a ft=, then the frame thickness defaults to 5. All the examples show ft=5. The color can be specified as hex string or a name. Do not use a # before the hex string as Netscape. For example, if you want to specify white in hex, use frgb=ffffff. You also can use a color name (e.g. frgb=blue) if the counter configured to do so (look at the cfg file). Look at the color name mapping database for some hints about color name database.

frgb=100;139;216 or
frgb=648bd8
tr=B Transparency On/Off You can specify if your counter image will have a transparent color with the Boolean B. So tr=Y means there will be a transparent color. It does not matter if the GIF files used for the digits are "transparent"; you must specify explicitly which color to make transparent. If you specify a trgb=, then you do not need to specify tr=Y. If you specify tr=Y and do not specify trgb=, then the default color black will be transparent. The valid values for B are Y, N, T, F, 1, or 0. tr=F
No Transparency
md=X Max Digits Defines maximum number of digits to display. Any value between 5 and 10 inclusive are permitted. Padding with leading zeros is automatically done for you; longer counts are truncated to the given X. md=6
Without padding
pad=B Padding with 0's Turn padding on/off in conjunction with md= setting. Valid values for the Boolean parameter B are Y, N, T, F, 1, or 0. pad=N
Without specification of a md=value

pad=Y
With specification of a md=value

dd=A Digit Directory Denotes directory of a specific styles of digits. Four styles of digits are supplied. They are kept at the directories A,B,C and D respectively. Visit the digit mania page for other styles of digits. dd=A
My green led digits
image=gif_file

[new in this release]

Display this GIF file You can display any GIF image specified with this parameter. The location of this file is determined by the dd= parameter. All attributes of the counter applly to the image. None
comma=B

[new in this release]

Display comma after every 3rd digit from right. The boolean value of parameter comma specifies whether to display comma after every 3rd digit from right. If you use this parameter as true, the left padding with zeros will be turned off. comma=F
srgb=R;G;B
prgb=R;G;B

[new in this release]

Change a color of the image to a target color on the fly. Any one color of the image can be changed to a different color on the fly. srgb stands for source color, that is the color to change. prgb stands for pen color, that is the target color. The values for srgb and prgb can be colon separated color components (e.g, srgb=255;0;0), a hex value (e.g. srgb=ff0000) or a color name (e.g. srgb=red). The color name can be used if you configured the counter to do so (look at the cfg file). srgb=00ff00
(0;255;0 green)

prgb=00ffff
(0;255;255 cyan)

With chcolor=T

chcolor=B Change a color of the image. This parameter is usually used to change the default green color to cyan. That is if you specify chcolor=T, and you want to change green to cyan, then you do not need to specify srgb and prgb parameters. 1x1 GIF is displayed. The valid values for the Boolean parameter B are Y, N, T, F, 1, or 0 chcolor=F
st=X Start Count This parameter is used to set the initial value of the counter to some number X. This is only valid if you decided to allow automatic datafile creation. It is a bad practice to allow automatic datafile creation, however it makes site maintaining easier. The automatic datafile creation option is specified in configuration file and can be changed at run time. Note that this parameter has no effect if the datafile already exists. If you want to change the counter value in a existing datafile, hand edit the file. The minimum value for st is 1. st=1
Count starts at 1
sh=B Show digits Used to turn display of digits on or off according to the Boolean B. When sh=T, counter will be displayed and incremented, this is the default behavior.

If sh=F no digits will show, but the counter will still increment; instead of digits a transparent 1x1 GIF is displayed. The valid values for the Boolean parameter B are Y, N, T, F, 1, or 0

sh=Y
df=data_file Datafile to store count Specifies the name of the file for storing the count in. The file must be allocated to you as was mentioned in the "Authorizations" section above. You can use df=random to display a random number.

One special use of the parameter is df=RANDOM. This returns a random number using the fractional portion of the host's time of day clock as a seed for the generator. Unlike all other WWWcounter parameters, the file name provided is case-sensitive, except for the value random. Or Random, or rANDOM, etc.

df=random
if no datafile is specified
incr=B Increment Count Makes it possible to display the current count without incrementing the count. This can be used to examine the count for reporting or other purposes without adding to the count. Valid values for the Boolean parameter B are Y, N, T, F, 1, or 0.

incr=T
Increment the counter on each invocation
lit=X Display literal Makes it possible to display a given, predetermined string. The valid values for the string X are digits, a,p,: and - None
negate=B Negate the color Makes it possible to negate the color of the counter digits. Note that the Frame is exempted from negating. Valid values for the Boolean parameter B are Y, N, T, F, 1, or 0. negate=F
Do not negate
degrees=X Rotate X degrees Makes it possible to rotate the counter image X degree. The possible values of X is 90, 180, 270 and 360. Note 360 is meaningless as the counter will come back to the original 0 degree. degrees=270
With rotate=Y and without degrees=X
rotate 270 degrees clockwise
rotate=B Rotate On/Off The Boolean value B turns on or off rotating. If you use degrees= setting, rotate is not needed. Valid values for the Boolean parameter B are Y, N, T, F, 1, or 0. rotate=F
Do not rotate

12. How to use other styles of digits

There are several sites including Digit Mania which maintains a array of collection of GIF digits which can be used with the counter. The counter program can use these digits in 2 ways.
  1. use a individual digit image for each digit, for example, zero.gif, one.gif...nine.gif. These digit images reside in the digits/style directory. If you like to use the counter for clock, 3 additional digit images are required, e.g., colon.gif, am.gif and pm.gif. If you want to use comma in your counter digits, another image is required, e.g., comma.gif. If you want to use the counter to display date, one more image is required, e.g., dash.gif. If you collect digits from external source, do not forget to rename the images to zero.gif, one.gif, two.gif, ... nine.gif, colon.gif, am.gif, pm.gif, comma.gif and dash.gif

  2. use a single image strip for digits. This is the default behavior, that is the counter program looks for a image file called strip.gif in digits/style directory by default. Using an image strip is much more efficient than using individual digits, because

    1. the size of an image strip is almost always less than the combined size of individual images.

    2. Disk i/o is significantly reduced, because only one file needs to be opened instead of many.
The section How to create an image strip describes how to create an image strip from individual digit images. If you like to use the individual digits instead, you must use the option istrip=F when you call the counter from web page, because by default istrip=T.

13. How to create an image strip

If you have individual digit images, you can create a image strip out of them. Image strip reduces disk i/o significantly, because the counter will need to read only one image instead of many and the size of the image will in most cases will be less than the combined size of the individual images. There is a program called mkstrip is supplied with the distribution for making image strip. To compile the program, go to the utils directory and at the shell promt, type:
    make
Please note, this program requires the GIF image combining library. Therefore, compile it after compiling the counter.

If compilation succeeds, it will create the binary mkstrip. Now, go to the directory where all the individual digit images are and type:

mkstrip zero.gif one.gif two.gif .... nine.gif colon.gif am.gif pm.gif > strip.gif
Note, the file names are not important but the order is very important. For example, the file names may be 0x.gif, 1x.gif etc.

Create a directory say F inside the digits directory and copy or move the file strip.gif to F. You can use this strip with dd=F.

The above strip can be used for counter and clock but not date. It also can NOT be used if you want to display comma. If you want to use date and comma, you must have the image for comma and dash. For example, the strip of digit style A is created with the command:

mkstrip zero.gif one.gif ... nine.gif colon.gif am.gif pm.gif comma.gif \
    dash.gif > strip.gif
Please note the order of the images used in arguments carefully. The program mkstrip puts the necessary information in the GIF comment extension about the strip. The counter program parses the comment extension to determine the width of the individual digits in the strip. Therefore, the strip can have digit segments of variable width.

For example, the comment of the image strip of digit style A is:

15:0:15:30:45:60:75:90:105:120:135:150:165:180:195:210:225
The leftmost integer 15 indicates there are 15 individual digits in the image and the next colon separated pairs are the location of left and right side of the segment of the individual images from the leftmost edge. If you look carefully you will see that the individual segment of the strip is 15 pixel wide. The height is determined by reading the image. If you use the program mkstrip, you do not need to know anything about the comment, it will be created correctly for you. It is mentioned here because it is possible you obtained a strip from somewhere and you want to add the comment to the image.

14. How to write "Host Ignore" block

This section of the document and the code to use netmasks is written by Davorin Bengez, (dbengez@znanost.hr)

1. Summary of changes

`Host ignore' block contains one or more lines with IP addresses of hosts that will be ignored for counter updates.

New feature in this release is possibility to mask off groups of hosts (subnetworks) defined by corresponding network / netmask pairs. This can be useful if we wish to exclude accesses from the hosts on our campus or hosts of people developing the pages.

To accomplish this, each line in host ignore block can take two arguments. If second argument is present, first is assumed to be network address and second the netmask. If only one argument is present, it is taken as a host address.

Wildcarding the IP address using asterisks cannot be used anymore.

If this concept with "network address / netmask" sound unfamiliar, you should consult your friendly network administrator.

2. How to determine ignore hosts parameters

To configure `ignore hosts' block in configuration file, you should know at least how network / netmask concept works. Here is a brief description.

2.1. IP Addresses and netmasks concept

IP address is a 32 bit value (four octets) that is for readability purposes written as four decimal values separated by a dot (so called dotted quad). For example, network address - in dotted quad notation

 161.53.4.28
is - in binary notation
 10100001 00110101 00000100 00011100
Binary representation is what we will need to determine network addresses and netmasks.

Each network IP address is contained of network and host part.

Generally speaking, networks are split into several classes. Here are three primary forms [1]:

- class A network has first octet in range from 0 to 127. First octet is network address while other three octets specify the host part. In binary notation it is something as (n - network, h - host)

 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh
There are 27 such possible networks, each with (224 - 2) hosts.

- class B network has first octet in range from 128 to 191. First two octets are the network address, and third and fourth are host address. In binary notation it is something as (n - network, h - host)

 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh
There are 214 such possible networks, each with (216 - 2) hosts.

- class C network has first octet in range from 192 to 223. First three octets are the network address, and fourth is host address. In binary notation it is something as (n - network, h - host)

 110nnnnn nnnnnnnn nnnnnnnn hhhhhhhh
There are 221 such possible networks, each with (28 - 2) hosts.

Note: "-2" is because 0 is reserved for "this host", and 255 means broadcast, or "all hosts on this network".

Nothing stops us to divide the network given to us by a service provider into a several smaller networks. This is often done in real life.

Network is being partitioned by setting the 32-bit subnet mask in which 1's represent the network part, and 0's represent the host part if IP address. As of now, we may correctly assume that a default netmask for class B network is 11111111 11111111 00000000 00000000 (in binary, or 255.255.0.0 in dotted quad notation).

For example, if we are given one class C network (maximum of 254 hosts), and we want to partition it into 8 networks of 32 hosts per each subnetwork, we can do it as in the following example:

Example:

Let us assume that we are given class C network with address 220.105.101.0. Initial netmask is set to 255.255.255.0. To partition this network into 8 subnetworks, we need to take 3 bits from host part of the address (23 = 8). Let's write it in binary:

Network address 220.105.101.0:

 11011100 01101001 01100101 00000000
Netmask was 255.255.255.0:
 11111111 11111111 11111111 00000000
As we want to have 8 subnetworks (this needs 3 bits from the host part), netmask will be: 11111111 11111111 11111111 11100000 or 255.255.255.224 in dotted quad notation.

Host part of address has shrunk to 5 bits, and we will have new network address based on 25 intervals. Therefore, our new subnetworks will be:

 220.105.101.0     220.105.101.32    220.105.101.64    220.105.101.96
 220.105.101.128   220.105.101.160   220.105.101.192   220.105.101.224
n.b. The same netmask (255.255.255.224) applies to each of the 8 networks.

From previous example can be seen that netmask cannot be set on arbitrary boundary, but rather on addresses that are powers of 2.

2.2. Configuration guidelines

As a matter of fact, it doesn't matter whether your network is class A, B or C. What matters is which subnetwork or part of the network you want to mask off.

To determine whether a certain host is within a certain network, the host's address AND netmask is compared to the network address. If they are identical, host is within the given network.

Example 1: Determine whether host 161.53.4.4 is located within the network 161.53.4.0 with netmask 255.255.255.0:
                decimal          binary

host address    161.53.4.4       10100001 00110101 00000100 00000100
netmask         255.255.255.0    11111111 11111111 11111111 00000000
ANDed           161.53.4.0       10100001 00110101 00000100 00000000

network address 161.53.4.0       10100001 00110101 00000100 00000000
since 161.53.4.0 = 161.53.4.0, host is contained within the network.

Example 2:

Determine whether the host 161.53.91.7 is located within the network 161.53.91.0 with netmask set to 255.255.255.224
                decimal          binary

host address    161.53.91.7      10100001 00110101 01011011 00000111
netmask         255.255.255.224  11111111 11111111 11111111 11100000
ANDed           161.53.91.0      10100001 00110101 01011011 00000000

network address 161.53.91.0      10100001 00110101 01011011 00000000
since 161.53.91.0 = 161.53.91.0, host is located within the network.

Example 3:

Determine whether the host 161.53.91.65 is located within the network 161.53.91.0 with netmask set to 255.255.255.224
                decimal          binary

host address    161.53.91.65     10100001 00110101 01011011 01100011
netmask         255.255.255.224  11111111 11111111 11111111 11100000
ANDed           161.53.91.96     10100001 00110101 01011011 01100000

network address 161.53.91.0      10100001 00110101 01011011 00000000
since 161.53.91.96 != 161.53.91.0, host is NOT located within the network.

To set the netmask properly, and to check the configuration, you must know what addresses are being covered with certain network address / netmask combination.

Example 4:

Which host are located within the network 161.53.91.0 with netmask set to 255.255.255.224?
                decimal          binary

network address 161.53.91.0      10100001 00110101 01011011 00000000
netmask         255.255.255.224  11111111 11111111 11111111 11100000
It is obvious that only last 5 bits are host address, since netmask will mask off upper 3 bits in last octet. Possible host addresses are from 0 (which cannot be used) up to 00011111 binary, or 31 in decimal. Therefore, hosts within given network are 161.53.91.1 to 161.53.91.31. (n.b. with above configuration, we have possible networks:
 161.53.91.0    161.53.91.32   161.53.91.64   161.53.91.96,
 161.53.91.128  161.53.91.160  161.53.91.192  161.53.91.224

Example 5:

How can I select hosts with addresses in range 161.53.5.16 to 161.53.5.31?
first host      161.53.5.16      10100001 00110101 00000101 00010000
last host       161.53.5.31      10100001 00110101 00000101 00011111

(all selected hosts)             10100001 00110101 00000101 0001xxxx
It can be observed that host part is last four bits of the address, which leads to the netmask of 255.255.255.240. Network address is address of any of the hosts ANDed with netmask:
any host                         10100001 00110101 00000101 0001xxxx
netmask         255.255.255.240  11111111 11111111 11111111 11110000

network         161.53.5.16      10100001 00110101 00000101 00010000
References:

[1] Douglas E. Comer
    "Internetworking With TCP/IP - Principles, Protocols, and Architecture"

[2] Uyless Black
    "TCP/IP and Related Protocols"

16. What is "Counter Terrorism"? And how this program handles it?

If you do not know, in most cases any CGI program can be referred remotely. For example, a CGI program x.cgi (say it returns an in-lined image) in foo.com can be called from foobar.com as follows:
    <img src="http://foo.com/cgi-bin/x.cgi">
That is, someone somewhere on the Internet can refer to your counter and increase the hits and you will not have a clue. You will get the false impression of many people visiting your page. You can look at the so called "Counter Terrorist" (looks like this page is dead!) page for demo.

So how this program handles this? The counter program tries to get a environment variable called HTTP_REFERER for remote referer. It is necessary to check this variable because when someone remotely refer to a CGI program to your machine, the variable REMOTE_ADDR will be the address of your machine. So checking REMOTE_ADDR will not work. Most of the modern browsers returns the env variable HTTP_REFERER. If the browser does not return the variable, counter will be served anyway. But you are not lost totally here. If you decided to ignore count for your host running httpd, the counter will be served but it will not be increased. So, I suggest ignore count for your own host. Gen-conf program is used for generating the configuration file.

Note this is a simple solution of a complex problem. Your feedback is always welcome in this regard.

17. Error Messages

Count will try to return an image in any event. That is, even if it fails for some reason, it will write the error messages in GIF format. The text error messages also will be written to the counter log file defined with LogFile in the directory defined with LogDir in the config.h file. The program Count-config asked about these if you remember.

If you see any of these images, please check the Counter log file you defined with LogDir and LogFile. If the program could not create the log file, it will write the error messages to stderr. In that case if you configured your httpd server to write the log to a file, the error messages will the written to this file.

18. Frequently Asked Questions

1. My CGI scripts don't work. What's wrong?

Answer: Simply linking from your page to an executable program or script won't cause it to be run by the server. There are two common arrangements: either files in directories specially designated by the server administrator are executed as CGI scripts, or files with a special extension (such as .cgi) are executed as CGI scripts.

These are just two possible ways your server might be configured. Many sites don't allow users to run CGI scripts at all. Consult your web server's administrator.

Taken from WWW FAQ

2. In SGI I get error like:
              : libCombine.a
              : - Too many arguments
              *** Error code 1 (bu21)
              *** Error code 1 (bu21)
What's the problem?
Answer: In combine/Makefile, remove the line
    $(RANLIB) $@ 
Thanks to avarro@CENTRCN.UMontreal.CA (12/07/95)

3. Why does the counter show "888888" all the time?
Answer:The counter is running in strict mode (look at count.cfg file). When the counter runs in strict mode, if the browser does not return the environment variable HTTP_REFERER, the counter will display the image 888888 instead of serving the counter. The env variable HTTP_REFERER should contain the web page running the counter. Some browesers does not return this variable in <img GET method. This feature guarantees that the counter can not be accessed remotely to mess up the datafile from a browser like yours. Some entries in the log file are made including the browser type.
4. The counter does not compile on UnixWare with cc, why?
Note for UnixWare 2: Before running the configure script, set and export the environment variable CC to the string
    cc -Xc
Thanks to Ed Horch, ebh@fpk.hp.com
5. The counter does not compile on Solaris with cc, why?
If you are using Sun's cc on Solaris, you may get errors about identifier redeclaration. Remove the line #include <unistd.h> from count.h. Recompile. You will get some errors about undefined variables. Look at /usr/include/unistd.h and add those defines to count.h. recompile.

19. Copyright (all platforms)

Copyright 1995-1996 by Muhammad A Muquit. Permission to use, copy, modify and sell this program for any purpose is hereby granted without fee, provided that this copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. If the program is included in a book, publication or in a software distribution media for sale, the author must be notified about it. No binary only distribution is allowed. All distributions must include the source and this copyright notice.

THIS PROGRAM IS PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY. THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE AUTHOR Muhammad A. Muquit BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Note: This program is developed in my own time. My employer has nothing to do with it.

20. Acknowledgment

Thanks to John Cristy for ImageMagick. I took many routines from ImageMagick for the GIF image combining library. I borrowed the font array and some code from gd library. Thanks to Tom Boutell. Thanks to all of you who showed interest in the counter program. I had fun writing it.

21. Authors

Muhammad A Muquit and
Kevin J. Walsh

23. I like to hear from you

If you are using this program, I like to hear from you. If you are having any problem with the program, please let me know as well. Feel free to send any suggestion. If you think that the program is cool, please consider sending me a picture postcard of the area where you live. Thanks to all of you who sent me the nice postcards. I really appreciate it.

I receive enormous number of mails. Please understand that no way I can answer all of the mails I receive, although eventually I read all the mails. If you do not hear from me in 3 days, please send the mail again.

    
    Muhammad A Muquit
    Fox Chase Cancer Center
    Reseach Computing Services (C119)
    7701 Burholme Avenue
    Philadelphia, PA 19111
    USA
    
Thanks.

Enjoy!

24. ChangeLog

If you contributed or suggested something and if your name is not here, please drop me a line and get the credit.

Count 2.2 (January 16, 1996)

Count 2.1 (January 15, 1996)

Count 2.0 (December 27, 1995)

Count 2.0b

Thanks to John Anthony Ruchak for beta testing Count 1.5.

Count 1.5 (September 11, 1995, 9:00 PM EDT)

Count 1.4 (August 27, 1995)

Count 1.3


ma_muquit@fccc.edu

Last Update: May 05, 1996
Today: 0-0-0

[HOME] Home Page