Fact-checked by Grok 2 weeks ago

Inline linking

Inline linking, also known as hotlinking or direct linking, refers to the practice of external content—such as images, videos, or other media files—directly into a webpage using code, where the content is hosted on a third-party rather than being downloaded and stored on the linking itself. This technique typically involves using tags like <img src="external-url"> for images, allowing the to fetch and render the resource inline with the surrounding content without the user leaving the page. Technically, inline linking leverages HTTP requests to retrieve the embedded object from its original host each time the page loads, which can improve page load times for the linking site by offloading storage and costs but places the burden on the source . Common legitimate uses include platforms embedding user-generated images or news sites displaying thumbnails from stock photo services with permission, enhancing content richness without duplicating files. However, it is often controversial when done without authorization, as it can consume the host's and resources—sometimes referred to as ""—potentially increasing hosting costs or slowing down the source site. From a legal perspective, inline linking has sparked debates over , particularly whether displaying externally hosted constitutes unauthorized or public display. , a landmark 2023 ruling by the Ninth Circuit Court of Appeals held that embedding links to publicly posted Instagram photos does not infringe copyrights, as it merely points to existing displays rather than copying the files—a decision affirmed by the U.S. Supreme Court's denial of in 2025. Despite this, outcomes can vary by ; for instance, the Court of Justice of the has ruled that unauthorized of images via framing can constitute infringement if it circumvents technical measures restricting access to the . To mitigate risks, website owners often implement hotlink protection measures, such as referrer checking or token-based authentication, to block unauthorized embeds.

Fundamentals

Definition and Overview

Inline linking, also known as hotlinking or leeching, is the practice of embedding and displaying resources such as images, videos, or scripts from an external server directly within a webpage by referencing their , without hosting the resource on the linking site's own server. This method allows the content to be fetched and rendered by the user's browser, integrating the external resource seamlessly into the page's layout as if it were local. The technique emerged in the early 1990s alongside the development of HTTP and standards, with the NCSA browser's release on April 22, 1993, marking a pivotal moment by introducing the ability to display images inline with text for the first time. Prior to this, web browsers like those based on earlier hypertext systems treated images as separate entities or required manual retrieval, but 's innovation via the <img> tag enabled direct referencing, facilitating widespread adoption of inline linking by 1994 as graphical web content proliferated. Key advantages of inline linking include reduced storage and bandwidth demands on the linking site's server, as the external host bears the load of serving the resource, and the facilitation of dynamic content sharing where updates to the original file automatically reflect on the embedding page without manual intervention. For instance, a webpage can embed an image using <img src="https://external-site.com/image.jpg">, contrasting with local hosting where the file would be uploaded and served from the site's own domain, such as <img src="/local-images/image.jpg">. Unlike server-side includes (SSI), which involve directives processed on the web server to dynamically insert content before the page is sent to the client—such as embedding variables or files via server directives like <!--#include virtual="file.html" -->—inline linking occurs entirely client-side, with the browser independently requesting and rendering the external resource via its URL. This distinction ensures that inline linking does not require server-side scripting or configuration, relying instead on standard HTML interpretation.

Technical Implementation via HTTP

Inline linking operates through standard HTTP mechanisms, where a , upon loading an document, parses elements such as <img> or <object> that reference external resources via absolute in attributes like src or href. This parsing triggers the browser to initiate an HTTP GET request to the specified URL on the remote server, typically immediately after the relevant is encountered during document rendering. The request includes headers such as User-Agent to identify the client and Referer indicating the originating page, though the latter may be omitted or stripped for privacy reasons. Upon receiving the GET request, the remote authenticates the request if necessary, locates the , and sends a response starting with an HTTP status code. For successful retrieval, the server issues a 200 status, accompanied by response headers including Content-Type to specify the type—such as image/jpeg for files or image/png for —which informs the how to interpret and render the binary data in the response body. The body contains the raw data, which the browser then decodes and displays inline within the page layout. If compression is enabled via headers like Content-Encoding: gzip, the decompresses the payload before processing. This request-response flow ensures the external integrates seamlessly into the host page without requiring the host to store or serve the content itself. Cross-origin inline linking, where the resource URL differs in scheme, host, or port from the host page, generally proceeds without restrictions for simple display purposes, as browsers permit fetching and rendering images from other origins by default. However, if the page's attempts to access the loaded image data—such as drawing it to a <canvas> element—CORS () comes into play. The <img> element's crossorigin attribute can be set to anonymous or use-credentials to initiate a CORS-enabled fetch, prompting the server to include headers like Access-Control-Allow-Origin in its response to authorize the cross-origin access; without these, the browser blocks pixel-level manipulation to prevent data leakage. Servers may also use Cross-Origin-Resource-Policy (CORP) headers to further restrict no-cors cross-origin fetches, enhancing security against unauthorized embedding. From a performance perspective, inline linking introduces additional network due to the separate HTTP requests for each external resource, potentially delaying page compared to locally hosted assets. Browsers mitigate this through caching defined by HTTP headers: the Cache-Control directive (e.g., max-age=3600) instructs the browser or intermediate proxies on storage duration, while ETag or Last-Modified enables conditional requests for validation on subsequent loads. Content Delivery Networks (CDNs) further optimize by caching resources at edge servers worldwide, reducing round-trip times for repeated or geographically distant fetches. In practice, these features can significantly lower the effective for inline resources, though uncached cross-origin fetches still contribute to initial load times. Modern HTTP versions address inefficiencies in resource loading via . HTTP/2 streams multiple requests and responses over a single connection, eliminating the need for parallel connections and reducing , which accelerates the concurrent fetching of numerous inline assets like images and stylesheets. HTTP/3 builds on this by using over , providing native multiplexing, faster handshakes, and better loss recovery, further minimizing latency for inline linking in high-latency or lossy networks. Edge cases include error responses: if a resource is missing, the server returns a 404 Not Found status, prompting the browser to handle the failure gracefully—often by displaying an alternate placeholder or broken icon—without halting page rendering.

Applications

Legitimate Uses

Inline linking facilitates content syndication by enabling websites to embed shared from external platforms without duplicating files, thereby reducing needs and ensuring content remains up-to-date at the source. For instance, the oEmbed specification allows seamless integration of videos from or photos from directly into web pages via simple references, which the provider's converts into embeddable code that loads the inline. This approach promotes efficient sharing across sites while respecting the original host's infrastructure and bandwidth management. In dynamic applications, inline linking supports real-time content updates through external , such as weather widgets from services like or stock tickers from financial APIs like Alpha Vantage, where scripts fetch and display live without requiring server-side hosting. These implementations leverage HTTP requests to pull fresh on page load or via periodic refreshes, enhancing user engagement with timely, accurate visuals like current temperature maps or fluctuating share prices. This method minimizes development overhead and ensures scalability for high-traffic sites needing constant . Collaborative platforms, including wikis and online forums, commonly employ inline linking for user-contributed images hosted on third-party services like , allowing contributors to upload media externally and reference it directly in posts or edits. This practice streamlines by offloading storage and delivery to specialized hosts, fostering participation without burdening the platform's resources. For example, in forums, users paste Imgur direct links into image tags, enabling inline display that enriches discussions with visuals while maintaining the original file's integrity and availability. Inline linking offers and advantages by preserving from the source, such as alt text for images, which aids screen readers and without alteration during embedding. When served via external Content Delivery Networks (CDNs), it supports responsive by delivering optimized images based on and location, improving load times and mobile compatibility. Specific examples include social media embeds like X (formerly ) Cards, introduced in 2012, which inline rich previews of articles or media to boost click-through rates and traffic. In , retailers often inline product images from supplier servers to accelerate site setup, cut hosting costs, and ensure images reflect the latest inventory visuals.

Controversial and Abusive Uses

One prominent abusive use of inline linking is bandwidth theft, commonly known as hotlinking, where websites embed images, videos, or other directly from another site's to avoid their own hosting costs. This practice forces the source to handle all delivery requests, resulting in unexpected traffic spikes that can significantly increase operational expenses and degrade performance for legitimate users. For instance, hotlinking can consume substantial , with one documented case from 2008-2009 showing a transmitting an average of 1.7 daily due to unauthorized image links, peaking at 22.7 and ultimately leading to a after 40 days of sustained . Such misuse disrupts web ecosystems by shifting resource burdens unfairly, often prompting hosting providers to impose fees or suspend services when quotas are exceeded. In the context of , inline linking enables leeching by allowing sites to reference copyrighted media—such as videos or software—hosted on third-party file-sharing platforms without uploading the content themselves. This evades direct hosting bans, as pirates can reverse-engineer access to content delivery networks (CDNs) and embed links to or illicit material across multiple platforms, complicating efforts. For example, CDN leeching has emerged as a sophisticated method for redistributing premium video content, where unauthorized links exploit global server distributions to bypass geographic and legal restrictions, thereby inflating data demands on legitimate providers. The impacts include elevated costs for content owners, reduced for paying subscribers, and broader proliferation of pirated works that undermine revenue streams. Additionally, studies indicate that up to 33.8% of analyzed sites hotlink multiple software packages, facilitating the unauthorized distribution of potentially pirated files while dodging prosecution through non-hosting. Deliberate overuse of inline linking can manifest as resource exhaustion attacks, akin to low-level distributed denial-of-service (DDoS) efforts, where coordinated hotlinks to large files overwhelm target with fetch requests. This exhausts and computational resources, slowing or crashing sites; for instance, hotlinking of media files like images or PDFs generates repeated server hits, simulating DDoS by draining CPU and memory without sophisticated tools. In web ecosystems, this leads to for affected services, financial losses from emergency scaling, and exploitation, as seen in cases where external sites' embeds cause disproportionate load on origin servers. Historical incidents highlight the evolution of these abuses, particularly in the early when forum communities engaged in "hotlinking wars" to sabotage competitors by embedding resource-intensive links, causing server overloads and crashes. Measurements from that era reveal widespread prevalence, with 75% of sampled sites hotlinking images, often in blogging and contexts where unauthorized embeds peaked at over 165,000 daily requests, crippling small hosts. In modern examples, aggregation sites have hotlinked images from platforms like without permission, as illustrated by a 2015 case where Huffington Post embedded comics from , spiking bandwidth costs and prompting retaliatory alterations to the linked content. More recently, as of 2025, AI tools like have been observed hotlinking images in generated responses, embedding external media without caching, which can strain source servers and prompt protective measures. These events underscore ongoing tensions in content sharing, eroding trust and incentivizing protective measures across the web.

Mitigation Strategies

Client-Side Prevention

Client-side prevention of inline linking, also known as hotlinking, relies on browser-level and user-initiated mechanisms to detect and restrict the loading of external resources embedded directly into web pages. These techniques empower users to control resource fetches, particularly cross-origin ones that bypass server-side protections, by intervening at the point of request or rendering. Such methods are essential for mitigating bandwidth theft and risks associated with unauthorized embeds, though their effectiveness depends on user configuration and browser support. Browser extensions provide a primary tool for users to block cross-origin resource loads, often through customizable filters and domain whitelists. For instance, , a widely used open-source content blocker, employs network filtering rules to prevent the loading of images, scripts, and other media from untrusted domains, effectively stopping hotlinked content by intercepting HTTP requests before they reach external servers. Similarly, focuses on script execution but extends to blocking inline and remote elements like frames and objects from non-whitelisted sites, allowing users to selectively permit resources only from trusted origins to avoid exploitation via embedded third-party content. These extensions operate transparently in the background, updating filter lists from community-maintained sources to target known abusive linking patterns without requiring server intervention. Content Security Policy (CSP) serves as another client-enforced mechanism, implemented via HTTP headers or meta tags in , to restrict the sources from which resources such as images and scripts can be loaded. Browsers like and parse CSP directives—such as img-src 'self'—to confine inline embeds to the same , blocking attempts to fetch media from external domains and thereby preventing hotlinking at the rendering stage. This policy, standardized by the W3C, enhances user control by allowing site owners to declare trusted sources, with the browser rejecting non-compliant loads to mitigate risks like through unauthorized embeds. User agent modifications, including VPNs and proxies, offer additional layers of prevention by intercepting and rewriting outbound requests to thwart direct external fetches. Privacy-oriented proxies can apply rewriting rules to redirect or nullify hotlinked resource paths, ensuring that cross-origin links resolve to local placeholders or are outright blocked based on predefined policies. While not exclusively designed for hotlinking, these tools integrate filtering to anonymize traffic and prevent bandwidth-draining embeds, particularly in or high-privacy setups. Privacy-focused browsers incorporate built-in features to default-block third-party trackers and inline embeds, reducing the need for manual extensions. Brave's Shields system, for example, aggressively filters cross-site resources, including embedded images and scripts from external domains, by default to curb tracking and unauthorized linking. Likewise, Firefox's Enhanced Tracking Protection automatically blocks content from known tracking domains, which often overlap with hotlinking sources, using curated blocklists to prevent inline loads in both standard and private browsing modes. These browsers prioritize user privacy by enforcing strict cross-origin policies out of the box, making prevention more accessible without additional setup. Despite their utility, prevention methods have inherent limitations, as they remain user-dependent and vulnerable to circumvention. requires active installation and configuration of extensions or selection of specific browsers, leaving less tech-savvy users exposed to hotlinking. Moreover, sophisticated embeds—such as those using data URIs, same-origin proxies, or obfuscated scripts—can evade filters, as these techniques do not alter the underlying HTTP mechanics and rely on the user's vigilance for updates. Overall, while effective for proactive users, these approaches complement rather than fully replace server-side controls.

Server-Side Prevention

Server-side prevention of inline linking, often referred to as hotlinking, involves configuring web servers to detect and restrict unauthorized requests for embedded resources such as images, stylesheets, or scripts. These methods rely on server-side logic to inspect incoming requests and respond accordingly, thereby protecting and resources from external sites embedding content without permission. Common techniques include header validation, , content alteration, authorization tokens, automated monitoring, and standards-based policies. One primary approach is checking the HTTP Referer header, which indicates the originating of the request. Servers can deny or redirect requests lacking a valid referer from authorized . For instance, in using the mod_rewrite module, administrators rules to forbid access to specific file types if the referer does not match the site's . An example configuration in .htaccess or httpd.conf might include:
RewriteEngine On
RewriteCond %{HTTP_REFERER} !^$
RewriteCond %{HTTP_REFERER} !^https?://(www\.)?example\.com [NC]
RewriteRule \.(gif|jpg|png)$ - [F,NC]
This setup returns a 403 Forbidden status for image requests from unauthorized sources, though it can be bypassed by clients omitting the referer header. IP-based throttles excessive requests from suspicious sources, reducing the impact of frequent inline fetches. In , the ngx_http_limit_req_module implements a "leaky bucket" algorithm to cap requests per , using zones for tracking. A typical directive limits each IP to one request per second with a burst allowance:
http {
    limit_req_zone $binary_remote_addr zone=hotlink:10m [rate](/page/Rate)=1r/[s](/page/%s);
    ...
    [location](/page/Location) ~* \.(jpg|jpeg|png|gif)$ {
        limit_req zone=hotlink burst=5 nodelay;
    }
}
This prevents by delaying or rejecting overloads, applicable to inline linking scenarios where external sites repeatedly pull resources. To deter misuse further, servers can serve altered resources or issue redirects for detected hotlinking. Upon identifying invalid requests via referer checks, the server might deliver a watermarked version of the —overlaying text or to attribute —or redirect to a custom page. In , mod_rewrite can proxy such requests to a script that applies watermarks dynamically using tools like , caching results to minimize processing overhead. Alternatively, a simple 403 Forbidden response or redirect to the site's homepage enforces policy without serving content. These responses maintain control over resources while signaling . Token-based enhances by requiring explicit permission for access, particularly for cloud-stored assets. Services like use presigned URLs, which embed temporary signatures generated with AWS credentials, granting time-limited access (up to 7 days via ) to private objects. Legitimate inline linking involves generating these URLs server-side for approved clients, ensuring external sites cannot directly embed or hotlink without invalidation upon expiration. This method prevents unauthorized sharing by tying access to specific, short-lived tokens rather than public URLs. The Cross-Origin-Resource-Policy (CORP) HTTP response header provides a standardized way to control cross-origin access to resources. Set by the server hosting the content, CORP instructs browsers to block loading of the resource in cross-origin contexts unless explicitly allowed. Possible values include same-origin (blocks cross-origin loads), same-site (allows same-site but blocks cross-origin), and cross-origin (allows all). As of 2025, CORP is supported in major browsers including , , , and . It complements referrer checks by enforcing policy at the browser level without relying on client headers, though it does not apply to CORS-enabled fetches. Content delivery networks (CDNs) like offer integrated hotlink protection, combining referrer validation with additional features such as bot detection and country-based blocking to prevent unauthorized embeds. These services offload processing from origin servers while applying rules at the edge. Advanced monitoring complements these controls through log analysis tools that automatically ban repeat offenders. Fail2Ban scans logs for patterns indicating hotlinking attempts, such as repeated invalid referer requests to image paths, and adds blocks via or similar firewalls. Custom filters define regex matches for abuse signatures, triggering bans after a threshold (e.g., 5 failures in 10 minutes) for durations like 1 hour. This proactive banning reduces ongoing threats without manual intervention. Inline linking intersects with primarily through the exclusive rights to and granted to owners. In the United States, under 17 U.S.C. § 106(5), holders possess the exclusive right to publicly display their works, which courts have interpreted to potentially encompass inline linking or , even when the is not stored locally on the linking but retrieved directly from the original . This interpretation posits that inline linking constitutes a "display" because the linked appears integrated into the linking page, facilitating unauthorized exhibition without the owner's permission, though it typically does not involve since no fixed copy is made on the linker's . The doctrine under 17 U.S.C. § 107 may provide a defense in certain contexts, particularly for transformative uses such as thumbnails in results, where reduced-resolution previews serve an informational purpose without supplanting the original work's market. In contrast, direct embeds of full-resolution images or media via inline linking are less likely to qualify as , as they often lack substantial transformation and may compete directly with the original, potentially harming the holder's commercial interests. Internationally, approaches vary, with the European Union's Directive 2001/29/EC (InfoSoc Directive) permitting temporary reproductions under Article 5(1) when they are transient, incidental, and solely for technical transmission in a , such as caching required for inline linking to enable efficient display. This exception contrasts with the stricter mechanisms in the U.S. (DMCA), 17 U.S.C. § 512, which facilitates takedown notices for alleged infringements, including inline links deemed to violate display rights, requiring service providers to remove or disable access upon notification to maintain safe harbor protections. Moral rights, as enshrined in Article 6bis of the for the Protection of Literary and Artistic Works, further complicate inline linking by protecting creators' rights to attribution (paternity) and , independent of economic rights. Inline embeds that fail to credit the original or alter the work's context—such as juxtaposing it with unrelated content—can infringe these rights, particularly in jurisdictions like the where are robustly enforced, unlike the more limited protections in the U.S. under the (VARA), 17 U.S.C. §§ 106A–106B. Post-2020 developments have introduced evolving challenges, particularly with inline linking to -generated content or non-fungible tokens (NFTs), where unclear authorship and ownership raise novel questions; for instance, outputs often lack eligibility due to absent human authorship, yet linking to them may still implicate underlying training data rights, while NFT-linked embeds can blur lines between licensed access and unauthorized display. In 2025, U.S. courts in cases, such as those involving and , have applied defenses to training data usage, potentially influencing future assessments of linking to -derived works without direct precedents on embeds as of November 2025. In the United States, the case of Perfect 10, Inc. v. Amazon.com, Inc. (2007) established a significant precedent for inline linking of thumbnails. The Ninth Circuit Court of Appeals ruled that Google's creation and display of inline thumbnails from copyrighted images constituted under the Copyright Act, as the thumbnails were transformative and served an informational purpose without harming the market for the original works. This decision emphasized that inline linking to reduced-resolution images does not infringe the copyright holder's display right when the linking party does not host the full copies. In the , Infopaq International A/S v. Danske Dagblades Forening (2009) addressed temporary reproductions involved in inline processes. The Court of Justice of the (CJEU) held that the caching and processing of short text extracts from newspaper articles for media monitoring constituted a "reproduction" under the InfoSoc Directive, even if transient, if the extracts conveyed the originality of the work. This precedent extended to inline linking scenarios where automated caching occurs, requiring assessment of whether such acts interfere with the copyright holder's exclusive rights. The CJEU's decision in GS Media BV v. Sanoma Media BV (2016) introduced liability for to unauthorized content. The court ruled that posting a hyperlink to freely accessible infringing material constitutes a "communication to the public" if done for profit, or if the linker knew or should have known of the illegality, thereby making the linker jointly liable for infringement. This shifted focus to the linker's intent and knowledge, influencing inline linking practices across member states. In , Roadshow Films Pty Ltd v. iiNet Ltd (2012) examined of infringement through facilitation. The unanimously held that the internet service provider did not authorize customers' infringements via , despite receiving infringement notices, as mere provision of and lack of specific control over links did not meet the authorization threshold under the Copyright Act. The decision clarified that passive enabling of links to infringing content does not impose liability without evidence of inducement. India's Super Cassettes Industries Ltd. v. Inc. (2011, with key rulings in 2016) addressed platform liability for including links. The ruled that MySpace, as an , lost safe harbor protections under the Information Technology Act upon gaining actual knowledge of infringing material, holding it liable for hosting and facilitating access to unauthorized music videos via embeds and links. This imposed a duty on platforms to expeditiously remove such content, extending to inline linking of copyrighted works. Post-2020 developments in the U.S. include Hunley v. Instagram, LLC (2023), where the Ninth Circuit affirmed that embedding Instagram photos via inline links does not infringe copyright, as it does not involve displaying a copy fixed in the embedder's system, upholding the server test and dismissing claims against Instagram for secondary liability. Emerging blockchain-related IP disputes have begun to touch on inline linking, such as cases involving non-fungible tokens (NFTs) where platforms link to unauthorized digital art, but specific precedents remain limited, with courts applying traditional copyright doctrines to decentralized embeds. In April 2025, the U.S. denied certiorari in a petition challenging the Ninth Circuit's server test (McGucken v. , LLC), leaving the circuit split unresolved and maintaining uncertainty in embedding liability across jurisdictions. These cases illustrate evolving trends toward stricter liability for knowing facilitation of infringing links, particularly in the and jurisdictions emphasizing duties, while U.S. rulings maintain a permissive stance for non-hosting embeds to foster online innovation.

References

  1. [1]
    Hotlink - Glossary - MDN Web Docs - Mozilla
    Jul 11, 2025 · A hotlink (also known as an inline link) is an object (typically an image) directly linked to from another site.Missing: definition | Show results with:definition
  2. [2]
    What Is Hotlinking? - KeyCDN Support
    Mar 30, 2023 · Hotlinking, also known as "inline linking", is known as the act of stealing someone's bandwidth by linking directly to their website's assets, ...
  3. [3]
    Hotlinking: What it is, why it's bad, and how not to do it - Yoko Co
    Hotlinking, also known as “inline linking,” is when someone embeds an image, video, or other media hosted on another website directly into their own webpage.Missing: definition | Show results with:definition
  4. [4]
    Hotlinking: What Is It and Why Is It Bad? - Vodien
    Apr 4, 2024 · Also known as inline linking or remote linking, it is a web development practice where a website directly embeds or links to resources (such ...Missing: definition | Show results with:definition
  5. [5]
    What is Hotlink | Glossary - CyberGhost VPN
    Hotlink, also known as inline linking or direct linking, refers to the practice of displaying an image, video, or other media file on a website by linking ...
  6. [6]
    Potential Liabilities for Web-Linking to Copyrighted Content - Finnegan
    May 5, 2017 · However, the process known as inline linking may give rise to copyright infringement. Framing, another type of linking, may invoke ...
  7. [7]
    Victory! Embedded Links to Photos on Instagram Don't Infringe ...
    Jul 20, 2023 · The 9th Circuit Court of Appeals, in a ruling published this week, made clear that linking does not constitute infringement, and kept in place ...
  8. [8]
    Rules on Copyright Infringement for Inline Linking Developing in the ...
    Nov 12, 2019 · Inline linking occurs when a service provider “embeds” on the provider's website content that is hosted at another location or “destination URL” ...<|control11|><|separator|>
  9. [9]
    How to help prevent hotlinking using referer checking, AWS WAF ...
    Apr 17, 2025 · Hotlinking—also known as inline linking—is a form of content leeching where an unauthorized third-party website embeds links to resources ...
  10. [10]
    April 22, 1993: Mosaic Browser Lights Up Web With Color, Creativity
    Apr 22, 2010 · The result, NCSA Mosaic, was the first web browser with the ability to display text and images inline, meaning you could put pictures and text ...
  11. [11]
    What Is A Hotlink - Periscope Media
    A hotlink, also known as inline linking or direct linking, is when a website directly links to a file (such as an image, video, or document) hosted on another ...<|control11|><|separator|>
  12. [12]
    Apache httpd Tutorial: Introduction to Server Side Includes
    SSI (Server Side Includes) are directives that are placed in HTML pages, and evaluated on the server while the pages are being served. They let you add ...
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
    Cross-Origin-Resource-Policy (CORP) header - MDN Web Docs
    Jul 4, 2025 · The HTTP Cross-Origin-Resource-Policy response header (CORP) indicates that the browser should block no-cors cross-origin or cross-site requests ...
  18. [18]
    Cache-Control header - HTTP - MDN Web Docs
    Jul 4, 2025 · The HTTP Cache-Control header holds directives (instructions) in both requests and responses that control caching in browsers and shared caches.HTTP caching · Clear-Site-Data header · Pragma header · Expires header
  19. [19]
  20. [20]
    HTTP/2 - Glossary - MDN Web Docs
    Oct 20, 2025 · HTTP/2 is a major revision of the HTTP network protocol. The primary goals for HTTP/2 are to reduce latency and head-of-line blocking.Missing: hotlinking | Show results with:hotlinking
  21. [21]
    QUIC - Glossary - MDN Web Docs
    Oct 20, 2025 · QUIC is a multiplexed transport protocol implemented on UDP. It is used instead of TCP as the transport layer in HTTP/3.
  22. [22]
  23. [23]
    oEmbed
    oEmbed is a format for allowing an embedded representation of a URL on third party sites. The simple API allows a website to display embedded content (such as ...Missing: benefits | Show results with:benefits
  24. [24]
    Embedding YouTube Videos in WordPress: Best Practices
    Mar 22, 2022 · Embedding saves server resources, guarantees better loading, and saves storage. Use oEmbed, classic editor, or block editor with YouTube Embed ...
  25. [25]
    Integrating Weather Updates and Alerts into Digital Signage ...
    Weather integration enhances user experience by providing real-time information, improving decision-making, and increasing engagement. It helps businesses ...
  26. [26]
    See the Market Evolve in Real-Time with a Stock Ticker Display
    Some of the benefits of using live stock market ticker displays include: The ability to stay up-to-date on market activity; To make informed investment ...<|control11|><|separator|>
  27. [27]
    How To: Link Images Easily with IMGUR - Sweet Shoppe Designs
    Mar 12, 2022 · Hi everyone. I thought I'd come share a quick tutorial on where to host your images and how to link them up in your forum posts.
  28. [28]
    Image CDN for SEO Benefits: Improve Speed and Rankings - Vodien
    Oct 10, 2025 · Discover how an image CDN for SEO benefits improves page speed, optimises Core Web Vitals, and preserves image search equity for higher ...
  29. [29]
  30. [30]
    About Twitter Cards | Docs | Twitter Developer Platform - X
    With X Cards, you can attach rich photos, videos and media experiences to Tweets, helping to drive traffic to your website.
  31. [31]
    The Case for Using Vendor Images - Pixelz
    Sep 14, 2023 · Using vendor images improves time to site, reduces costs, increases product offerings, and increases agility and flexibility in workflows.
  32. [32]
    [PDF] An investigation of hotlinking and its countermeasures
    May 25, 2010 · Hotlinking is a web behavior that links web resources on a hosting site into a webpage belonging to another site.
  33. [33]
    Hotlinking: What Is It and Why Is It Bad? - Hostinger
    Sep 20, 2025 · Hotlinking is when someone embeds an image or media file from your website onto theirs by linking directly to your file's URL.
  34. [34]
    The ins and outs of CDN leeching: Next gen online video piracy
    May 1, 2024 · CDN leeching refers to the unauthorized or improper use of a CDN, where content is being stolen and republished to other platforms.Missing: linking | Show results with:linking
  35. [35]
    Security: A Guide to Combatting DDoS and Resource Exhaustion
    May 30, 2024 · Combat DDoS and resource exhaustion by using .htaccess to block IPs, using robots.txt to limit bot requests, and blocking media hotlinking. ...
  36. [36]
    Hotlinking is Bad For Everyone Involved - Drive, Capture, Convert
    Jun 1, 2021 · Hotlinking is Bandwidth Theft. Possibly the most infamous example of this was in 2015, when the Huffington Post UK hotlinked several images ...<|control11|><|separator|>
  37. [37]
    uBlock Origin - Free, open-source ad content blocker.
    Sep 26, 2024 · The uBlock Origin is a free and open-source, cross-platform browser extension for content filtering—primarily aimed at neutralizing privacy ...
  38. [38]
    Usage - NoScript: block scripts and own your browser!
    The NoScript Security Suite is a free extensions for Firefox, Chrome and other browsers, preemptively blocks malicious scripts and allows JavaScript and ...
  39. [39]
    An investigation of hotlinking and its countermeasures - ScienceDirect
    Apr 1, 2011 · First, some web developers are unprofessional. Their laziness makes them to directly link web objects hosted somewhere else. Second, the ...<|control11|><|separator|>
  40. [40]
    Hotlinking: Pitfalls & How to Protect Yourself - Hostwinds
    Dec 5, 2023 · Bandwidth Theft: Hotlinking consumes the bandwidth of the host website. The linking website benefits from the resources without hosting them ...
  41. [41]
    Brave Shields - Blocking Ads, Trackers & more
    Brave blocks both third-party cookies and third-party storage (e.g. storage in iframes) by default; some other privacy-focused browsers do, too. What's unique ...Missing: embeds | Show results with:embeds
  42. [42]
    Enhanced Tracking Protection in Firefox for desktop - Mozilla Support
    Starting with Firefox version 120, the Copy Clean Link feature is automatically enabled to safeguard users against URL-based tracking by stripping tracking ...SmartBlock for Enhanced... · Private Browsing · Privacy and securityMissing: inline | Show results with:inline
  43. [43]
    Firefox tracking protection - Privacy on the web | MDN
    Jun 6, 2025 · Firefox tracking protection blocks content from domains that track users across sites, using a list of known tracking sites.Missing: inline | Show results with:inline
  44. [44]
    Hotlinking: Key Reasons to Avoid and Methods to Protect Your Site
    Apr 28, 2025 · Hotlinking might seem an easy way to acquire website assets, but in reality, it brings several disadvantages. Learn here how to avoid it.
  45. [45]
    What is Hotlinking? Mitigation Strategies, Impact & Protection
    May 3, 2024 · If many website owners create hotlinked files from your website, it can considerably raise your bandwidth usage and degrade the user experience ...
  46. [46]
    Using mod_rewrite to control access - Apache HTTP Server
    It describes how you can use mod_rewrite to control access to various resources, and other related techniques.
  47. [47]
    Module ngx_http_limit_req_module - nginx
    The ngx_http_limit_req_module module (0.7.21) is used to limit the request processing rate per a defined key, in particular, the processing rate of requests ...
  48. [48]
    Sharing objects with presigned URLs - AWS Documentation
    You can create a presigned URL for sharing an object without writing any code by using the Amazon S3 console, AWS Explorer for Visual Studio (Windows), or AWS ...
  49. [49]
    How Fail2Ban Works to Protect Services on a Linux Server
    Aug 2, 2022 · Fail2ban is a daemon that can be used to monitor the logs of services and ban clients that repeatedly fail authentication checks.Missing: hotlink abusers
  50. [50]
    17 U.S. Code § 106 - Exclusive rights in copyrighted works
    The owner of copyright under this title has the exclusive rights to do and to authorize any of the following: (1) to reproduce the copyrighted work in copies ...
  51. [51]
    [PDF] IN-LINE LINKING IN THE AGE OF THE SERVER TEST
    Feb 10, 2023 · In 2007, the U.S. Court of Appeals for the Ninth Circuit adopted a new interpretation of 17 U.S.C. § 106(5), which codifies the display right of ...
  52. [52]
    Two Cases Raise New Copyright Infringement Concerns for Internet ...
    Jan 21, 2020 · Two recent district court cases found that in-line linking or embedding can constitute direct infringement of display rights, creating new uncertainty over the ...
  53. [53]
    Now on Display: In-Line Linking in the Age of the Server Test
    ... U.S. Court of Appeals for the Ninth Circuit adopted a new interpretation of 17 U.S.C. § 106(5), which codifies the display right of the Copyright Act of 1976.
  54. [54]
    Connecting to Other Websites - Copyright Overview by Rich Stim
    Apr 2, 2013 · Courts have held in two cases where search engines linked to thumbnail images, that such uses are permitted as fair use.Missing: doctrine | Show results with:doctrine
  55. [55]
    Copyright and Fair Use :: Topics - Lumen Database
    Yes, the creation and use of "thumbnails" -- smaller, lower resolution depictions of the original image -- as part of such a search engine may be a fair use ...
  56. [56]
    [PDF] Court Gives Thumbs-Up for Use of Thumbnail Pictures Online
    The court ruled that using thumbnail pictures for online visual search is "transformative fair use," but inline linking and framing can violate copyright.
  57. [57]
    Linking, Framing, and Inlining - Nolo
    "Inlining" is the process of displaying a graphic file on one website that originates at another. For example, inlining occurs if a user at site A can, without ...
  58. [58]
    EUR-Lex - 32001L0029 - EN - European Union
    This Directive concerns the legal protection of copyright and related rights in the framework of the internal market, with particular emphasis on the ...Missing: linking | Show results with:linking
  59. [59]
    Copyright exceptions | CLARIN ERIC - CLARIN ERIC
    According to art. 5.1 of the InfoSoc Directive, temporary acts of reproduction which are an essential part of a technological process and whose sole purpose is ...Missing: inline linking
  60. [60]
    17 U.S. Code § 512 - Limitations on liability relating to material online
    A service provider's compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material ...Missing: inline | Show results with:inline<|control11|><|separator|>
  61. [61]
    [PDF] Authors, Attribution, and Integrity: Examining Moral Rights in the ...
    joining the Berne Convention to exploring a new copyright agreement being negotiated through the auspices of the United Nations Educational, Scientific and ...Missing: inline | Show results with:inline
  62. [62]
    Moral Rights in U.S. Copyright Law - Copyrightlaws.com
    Jan 8, 2023 · Moral Rights in U.S. Copyright Law. The U.S. amended its Copyright Act to include moral rights when it joined the Berne Convention in 1989.Missing: inline | Show results with:inline
  63. [63]
    Copyright and Artificial Intelligence | U.S. Copyright Office
    Copyright and Artificial Intelligence analyzes copyright law and policy issues raised by artificial intelligence.Spring 2023 AI Listening · Studies · Registration Guidance for...
  64. [64]
    Generative Artificial Intelligence and Copyright Law - Congress.gov
    Jul 18, 2025 · This Legal Sidebar explores questions that courts and the US Copyright Office have confronted regarding whether generative AI outputs may be copyrighted.
  65. [65]
    AI Copyright Infringement: Legal Risks & What To Know - Martensen IP
    Oct 14, 2025 · AI copyright lawsuits related to tools like ChatGPT and Gemini are rising. Learn how U.S. law treats AI-generated works, fair use, ...
  66. [66]
    [PDF] the making available right in the united states - Copyright
    framework of the reproduction, distribution, performance and display rights of Section 106 of the Copyright Act. ... 17 U.S.C. § 106(4), (6). In addition to ...
  67. [67]
    [PDF] Now on Display: In-Line Linking in the Age of the Server Test
    Feb 10, 2023 · Perfect 10 v. Amazon.com, Inc., 508 F.3d 1146, 1155 (9th Cir. 2007) ... The court's decision in Perfect 10 has been upheld and followed by cases ...
  68. [68]
    The (Il)Legality of Embedding Tweets - Plagiarism Today
    Feb 20, 2018 · In ruling against a summary judgment, a New York judge found that sites may be held liable for embedding infringing material.Missing: LLC 2013 dismissed
  69. [69]
    62008CJ0005 - EN - EUR-Lex - European Union
    Judgment of the Court (Fourth Chamber) of 16 July 2009. Infopaq International A/S v Danske Dagblades Forening. Reference for a preliminary ruling: Højesteret - ...
  70. [70]
    [PDF] European Court of Justice, 16 July 2009, Infopaq v DDF - ippt.eu
    Jul 16, 2009 · Those questions have been raised in the context of proceedings between Infopaq International A/S ('In- fopaq') and the professional association ...
  71. [71]
    GS Media and Sanoma - CURIA - Documents - European Union
    Sep 8, 2016 · This request for a preliminary ruling concerns the interpretation of Article 3(1) of Directive 2001/29/EC of the European Parliament and of the Council of 22 ...
  72. [72]
    hyperlinks to unauthorized content may infringe copyright - WIPO
    The ECJ's answers in Sanoma Media Netherlands BV et al v GS Media show that a hyperlink's legal status is ambiguous. Under European copyright law, hyperlinking ...
  73. [73]
    [PDF] ROADSHOW FILMS PTY LTD & ORS v iiNET LIMITED
    Apr 20, 2012 · The High Court held that the respondent, an internet service provider, had not authorised the infringement by its customers of the appellants' ...
  74. [74]
    [PDF] Case Note - classic austlii
    Roadshow v iiNet concerned the liability of an internet service provider ('ISP') for copyright infringements its customers had committed using peer-to-peer file ...
  75. [75]
    My Space Inc. vs Super Cassettes Industries Ltd. on 23 December ...
    Dec 23, 2016 · Super Cassettes (SCIL) sued MySpace for copyright infringement, claiming MySpace hosted their works without permission, and sought to stop the ...
  76. [76]
    My Space Inc. vs Super Cassettes Industries Ltd. - wilmap
    May 19, 2020 · The Delhi High Court held on December 23, 2016, that MySpace, a social networking platform was liable to take down copyright infringed content within 36 hours.
  77. [77]
    [PDF] Hunley v. Instagram, LLC - Ninth Circuit Court of Appeals
    Jul 17, 2023 · The district court held that Instagram could not be liable for secondary infringement because embedding a photo does not. “display a copy” of ...
  78. [78]
    [PDF] Blockchain technologies and IP ecosystems: A WIPO white paper
    Annex III includes a detailed repository of potential use cases for the IP ecosystem, such as time-stamping, anti-counterfeiting and IP licensing, among others.
  79. [79]
    [PDF] Copyright Infringement Liability of Online Content Sharing Platforms ...
    The EU copyright liability regime for internet service providers has significantly changed after the enactment of article 17 of the Digital. Single Market ...