CopyCodeThe Code is as follows :#! /Bin/bash
CD/home/backup/
Echo "---"
Echo "delete start:" $ (date + '% Y % m % d _ % x ')
Echo "delete..." $ (date-D-5day + "% Y % m % d _ % H % m ")
Rm-RF web _ $ (date-D-6day + "% Y % m % d ")*
Echo "delete
CodeAs follows:
Global:
Copy codeThe Code is as follows: $ (function (){
Document. onkeydown = function (e ){
VaR EV = Document. All? Window. Event: E;
If (EV. keycode = 13 ){
$ ('# Formid). Submit (); // process the event
}
}
});
A
On the Apache HTTP Server, set the virtual host as follows:
Open CONF/httpd. conf in the Apache installation directory and add the following two sections.CopyCodeThe Code is as follows: Servername fuwu.jb51.netServeralias fuwu.jb51.net
They are:
1. Basic usage: set verification rules through styles
Copy codeThe Code is as follows:
Email age
When a form is submitted, an error occurs if no email is entered or the email is incorrect, as shown below:
The default prompt after the
SetACL.exe 0.904 help: SetACL.exe script home
Example:
SetACL.exe c: \ nihao/dir/deny everyone/read_ex
Set the read and run permissions for the E: \ wxDesktop folder everyone user.
SetACL MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \
Create a clustered index for the CreateTime column in The Liwu_Items table
First, the paging syntax unique to sqlserver2005Copy codeThe Code is as follows: declare @ page intDeclare @ pagesize intSet @ page = 2Set @ pagesize = 12
Set statistics io
1. Basic backdoor defense skills
First, you must disable unnecessary ports on the local machine or only allow access from specified ports. Second, you must use the Trojan-killing software to effectively prevent Trojans and backdoors. Third, you must
Obtain Select:
Obtain the selected text in the select statement:
$ ("# DdlRegType"). find ("option: selected"). text ();
Obtain the value selected by the select statement:$ ("# DdlRegType"). val ();
Obtain the index selected by the select statement:
Preface
FCKeditor is a widely used HTML editor. NET application scenarios for FCKeditor and FCKeditor.. NET configuration, function extensions (such as user-defined file upload sub-directories, user-defined file names, post-processing of uploaded
Solve the problem of excessive CPU usage:
1. configure a separate application pool for each website in IIS. That is, they do not affect each other.
2. Set the CPU monitoring of the application pool to no more than 25% (4 CPU for the server),
Technically, the most secure way to achieve gray-scale web pages is to directly process all images without considering compatibility or efficiency. However, it takes a lot of effort to switch back.
The ie series supports css filters. filter: gray
1. Implement horizontal center through css:
Copy codeThe Code is as follows:. className {
Margin: 0 auto;
Width: 200px;
Height: 200px;
}
2. Implement horizontal and vertical center through cssCreating a horizontal and vertical div using css is
I searched the internet for a lot of methods that didn't work. After studying for a day, I found that the following configuration can perfectly support 'url _ model' => 2.
Copy codeThe Code is as follows: location/project /{
Index. php;
If (! -E $
1. China Public controller-license registration, change the old ip address to a new ip address, and confirm that the verification is passed. In addition, the ip address in the parameter settings of the master and the control end is changed to a new
Copy codeThe Code is as follows:
drag me
SetCapture is used to set the scope or scope of an object's method to be triggered.If this parameter is not set, the div is triggered only in the current window. If this parameter is set, it is triggered
The development tool should have corresponding functions, so it is tested:
Premise: it is only a simple small test, and addEventListener is a standard binding function. IE is incompatible with this function (IE corresponds to attachEvent). Therefore,
This article takes a look at its source code. The add definition is as follows (Omitted in most cases)
Copy codeThe Code is as follows: add: function (elem, types, handler, data ){
If (elem. nodeType = 3 | elem. nodeType = 8 ){
Return;
}
...
}
Four
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service