Step1: Three Web Server Environment configuration: iptables-f; Setenforce 0 shut down the firewall; close SetlinuxStep2: Three Web server install softwareSTEP3: Host modification configuration file: vim/usr/local/nginx/conf/nginx.confProxy Server Modify the file: Modify the port, the port can be set by itself, do not change the default is OK, but the corresponding matchFor test needs, change the HTML files
Links | web | web
This article introduces web spiders to get all the links in the Web page method, the principle of implementation: Use the System.Net.WebClient class to get the content of the remote Web page, and then use the URL
The exception of a website as a professional person, is not easily exposed to the user, because it is not safe, it seems that you are missing is one thing, as long as the site to consider the data security issues, the following for you to share some common web layer framework is how to handle the unified exception.Before all is in the STRUTS2 configuration file to configure the interceptor to uniformly hand
1. DOM WEB standards are currently a hot topic, but the following is a document. all [] that does not comply with the standards. DOM--DOCUMENT object model Document object model provides methods to access document objects. for example, if you want to change the background color of a table in a document, you can use document in javascript. all [] access this TABLE
, which is the ASCII character set (Character set), also called ASCII code, when the computer slowly develops, People found that the previous 128 characters can not meet the demand, and then on the basis of expansion, GB2312, BIG5, etc. are extended after the encoding, and later, in order to achieve in a document can correctly display all types of characters, so the Unicode character set was born, And UTF-8 is one of the implementations of Unicode, si
not "!" Important "This thing out." As we all know, when browsers display Web pages, will be based on the CSS style sheet of the Web page to determine how to display, but we do not necessarily have all the elements in the stylesheet to describe the specific, of course, do n
useful.Use hacker I can. The browser is divided into 3 categories: IE6, IE7 and roaming; other (IE8 Chrome FF Safari Opera, etc.)IE6 know Hacker is the underscore _ and the asterisk *IE7 Hacker is an asterisk * (including the!important in question 6 above is also considered a kind of hack. But less practical. )such as such a CSS settings height:300px;*height:200px;_height:100px;IE6 browser when reading to height:300px will think high 300px; Continue reading, he also know *heihgt, so when IE6 re
, minimizing. In addition, you should be aware of some unnecessary redirects. For example, to add a/(Slash) to the Web site's pip directory, you can effectively avoid a redirect. There is a difference between Http://www.dbanotes.net/arch and Http://www.dbanotes.net/arch. If it is an Apache server, this problem can be eliminated by configuring Alias or Mod_rewrite or Directoryslash.4. Making Ajax cacheable (make Ajax cacheable)Response time is critical
1. DOM
WEB standards are currently a hot topic, but the following is a document. all [] that does not comply with the standards. DOM--DOCUMENT object model Document object model provides methods to access document objects. for example, if you want to change the background color of a table in a document, you can use document in javascript. all [] access this TAB
CSS implements the code that is compatible with all the browser's div suspension on the side of the page:Fixed suspension on the side of the Web page effect is very frequent, especially the customer service system or announcement system, CSS provides the Position:fixed property to achieve this function, but IE6 browser does not support, although IE6 fewer users, but after
When browsing the web, sometimes you may find a set of very beautiful pictures, such as various wallpaper, design materials. According to the traditional method to click on a single download, it is very troublesome. And through some tool software download, but also may download to many useless advertisement picture. How can you quickly download only those pictures you want in the Web?
"Ideas for solving pr
Article Introduction: The other is "reset" for a particular project, a custom modified content that can be placed in files such as Layout.css, TYPOGRAPHY.CSS, and they are imported into a base.css to form the underlying style of a project. This article is about how to write a generic reset.css for all the projects, as well as an introduction to RESET.CSS after you set up a play
0, IntroductionWhenever you have a new project, the first step
not be written in reverse, important this property IE does not recognize, But other browsers can identify. So under IE it is actually interpreted as:DIV{MARING:30PX;MARGIN:28PX} Repeat the definition in accordance with the last one to execute, so can not write only margin:xx px!important; #box {width:600px;//for ie6.0-w\idth : 500px; For ff+ie6.0}#box {width:600px!important//for ff width:600px;//for ff+ie6.0 width:500px;//for ie6.0-} 8. Attribute se
JavaScript Style Guide
Felix ' s node. js Style Guide
Idiomatic.js
Code conventions for the JavaScript programming Language
Jsbeautifier
Airbnb JavaScript Style Guide
JSON Generator
JSON Generator–tool for generating random JSON data
General front-end development and the habit of front-end Practices/conventions
Isobar
Being A Web Developer
Front End Dev Guidelines
HTML and CSS
There are two types of paths used in Java: absolute paths and relative paths. Ultimately, Java can only use absolute paths to find resources in essence. All the relative paths to find resources are just a few convenient ways. It's just the API that helps us build an absolute path to find resources!When developing Web-related applications, it is often necessary to obtain the physical path of the current Webr
Technology is progressing, and web design techniques are progressing. New technology poses new challenges, so we need new solutions. Sometimes, we have no experience with new uncharted territory, and we can only build solutions based on our intuition. And sometimes the problems we face in new areas have a shadow of the past, and we can find the answers from history and other people's experiences.
Compared with the long and glorious history of other d
This period of time, work idle down, contact with spring Security, for me a poor foundation of people, is undoubtedly a challenge ah.After a period of groping, finally have a point, here, to special thanks to http://blog.csdn.net/u012367513/article/details/38866465 Two of the blog to my help. My code has been compiled on his basis, but has added some of his own insights. Thanks again for his help.My foundation is very weak, but the two-headed blog post has been explained is very clear, but I sti
The web system pushes a message to all users, like Sina Weibo pushes a message to all users. how to design the message queue web system to push a message to all users, how to design a message queue to push a message to users like Sina Weibo
Reply content:
How to design a
BackgroundCode
Reference content is as follows: Using system; Using system. Data; Using system. configuration; Using system. Web; Using system. Web. Security; Using system. Web. UI; Using system. Web. UI. webcontrols; Using system. Web. UI. webcontr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.