PHP converts Chinese characters to Pinyin is one of the tasks that programmers often need to operate, although this small function can play a great role, the following is the correct pinyin method of Chinese characters, we can learn from.
network
/*** Generate Smarttemplate Template handler framework** The Smarttemplate template class is extremely efficient and has a small code size.* His extensible template function is unique.** Although there are only a few methods, it is easy to use.* But
Summary: There are many friends of the site to provide complex, Jane two versions of the confusion, how to achieve it? This is one of the most important points of knowledge that is missing from many PHP books nowadays. The author collects and
This article lists some of the more common mistakes we made in PHP programming, which are listed in 10.
Error 1:foreach Loop left hanging pointer
In a foreach loop, if we need to change the elements of an iteration or to improve efficiency, it's a
If you are an Apple user, especially an ipad user, there may be a problem with not knowing how to open and edit the M s-o ffice document, always switching to a computer operating document that installs the Windows system. With the release of Google
In reality we often see such a description, ranked in the first alphabetical order. This is the sort of method most Chinese use. So how do you do it in a PHP program? The following to share in the PHP program to obtain the first letter of Chinese
Note: If the result is longer than the server parameter Max_allowed_packet, the string value function returns nullFor operations on string positions, the first position is marked as 1.
ASCII (str)Returns the ASCII code value of the leftmost
DAT files, information files about IP-corresponding areasQqwry.dat fileDownload yourself Onlineclass file, parsing the Qqwry.data file'siplocation.php File
Copy Code code as follows:
class Iplocation {
/**
* @var Resource pointer
*/
Park,unpark,ord These 3 functions, in our work, they are not much estimated. In my most recent job, because communication requires a binary stream, the interface is received in PHP. At that time, a lot of information was consulted. Because they are
Now let's talk about the reply.php code:
---------------------------------
reply.php
?
function Check_strlen_long ($txt)
{
$len =strlen ($txt);
$count = 0;
for ($i =0; $i {
if (Ord ($txt [$i]) {$count = $count +1;}
if (Ord ($txt [$i]) ==10 or ord
This article mainly introduces the PHP AES (ECB) decryption problem after the solution, very simple and practical, the need for small partners can refer to.
Content: ABCD
key:1234567890123456
base64:t7ut2nq1afvr9unja0wkwa== after encryption
?
First, cross-site scripting attacks are caused by the lack of strict filtering of user input, so we must intercept the possible risks before all the data comes into our web site and database. The Htmlentities () function can be used for illegal
' Or 1=1
' or ' 1=1
'/*
'%23
' and password= ' Mypass
Id=-1 Union Select 1,1,1
Id=-1 Union Select char (), char (), char (97)
Id=1 Union select 1,1,1 from members
Id=1 Union select 1,1,1 from admin
Id=1 Union select 1,1,1 from user
Userid=1 and
Objective:
To tell you the truth,Sandals also think UTF8 is a good thing ...After all, the same screen shows that China and Japan South Korea's attraction to East Asians is not small ...(Of course, the benefit is not just this ....) )Not only is the
Most of the similar code on the network can only be used under the GB2312 encoding, the following class can convert Chinese characters to pinyin under Utf-8 encoding, and the specific code and usage are as follows: = ' 5.0 ')? Array_combine
1. All edit is only allowed? S?? In the end, Zheng is only allowed to do so. into one small iteration C
2. Don't want to? χ??? Edit all?? OnKeyPress Events
So you just.? One??, all the other points in object Inspector? :
Procedure
This article mainly introduces the use of PHP to remove the file BOM Header example, the need for friends can refer to the following Code as follows: function Checkbom ($filename) { global $auto; & nbsp $contents = file_get_contents
I found a chat and file Transfer tool based on TCP protocol on the Delphi Box [http://www.2ccc.com/], so I changed it to the D2009 version of the code.
Source code Download Address: http://www.2ccc.com/article.asp?articleid=3894
The steps are as
Delphi characters and strings [1]-string, ansistring, widestring, String[n], shortstring
The most common string
var str: string; {定义} begin str := '万一'; {赋值} ShowMessage(IntToStr(Length(str))); {长度是: 4} end;
Long string ansistring; In the
PHP encryption and decryption function sharing, one is discuz! authcode encryption function (with detailed decomposition), one is the Encrypt () function. Need to use PHP to encrypt specific information, that is, through the encryption algorithm to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.