Use rewrite to set rules on IIS to implement pseudo-static state. In this way, debugging will not be available during development in vs. If you use IIS for publishing, the file cannot be found. Of course, there must be other methods to implement
Introduction
WCF is short for "Windows Communication Foundation", originally codenamed "Indigo". It is a complete technical framework designed by MS for SOA (Service Oriented Architecture. It can be used to develop distributed (distributed)
Other content: net use ipipc $/user: Create an IPC null link. net use ipipc $ password/User: Create an IPC non-null link. net use H: IPC $ password/User: after the user name is directly logged in, ing the peer C: to the local is H: net use H: IPC $.
This articleArticleThis is an excerpt from my own speech during discussions with others on shuimu BBs. It is an Empirical Summary of the development process over the past few years. Complete personal experience for criticism.
I. Principles of
The most classic command line in the network-what must be done by network security workers-------------------------------------------------------------------------- 1. The most basic and commonly used physical network testing Ping 192.168.0.8-T.
Net use \ IP \ IPC $ ""/User: "" Create an empty IPC Link
Net use \ IP \ IPC $ "password"/User: "User Name" Create an IPC non-empty Link
Net use H: \ IP \ C $ "password"/User: "User Name" directly log on and map to the other Party C: to the local h:
1. Problem
·A larger program contains more names.
More names-The higher the possibility of naming conflicts
How do you name to reflect the structure
Explicit prefixes are not a good solution.
//Traditional naming methodsSealed class
1. The most basic and commonly used physical network testingPing 192.168.0.8-T. The-t parameter is used to wait for the user to interrupt the test.
2. View DNS, IP, Mac, etc.A. Win98: winipcfgB. Win2000 or above: ipconfig/all
C. NSLookup: for
1. The most basic and commonly used physical network testing
Ping 192.168.0.8-T. The-t parameter is used to wait for the user to interrupt the test.
2. View DNS, IP, Mac, etc.
A. Win98: winipcfg
B. Win2000 or above: ipconfig/all
C. NSLookup:
Only one number can be entered
Expression ^ \ D $The description matches a number.Matching example 0, 1, 2, 3Example of Mismatch
Only n numbers can be entered
Expression ^ \ D {n} $ for example ^ \ D {8} $The description matches 8 numbers.Matching
1. Control reversal
Inversion of control (IOC): in short, the Code controller is handed over to the system for control, rather than being inside the code. IOC eliminates direct dependencies between components or modules, makingSoftwareSystem
[Switch] talking about technical principles and technical learning methods,CodeReading and other
Http://xiaotie.cnblogs.com/archive/2005/12/21/301634.html
I. Principles of Technology Selection
A relatively standardized software development
Although there are a lot of learning materials for petshop in the garden, especially the series of anatomy petshop written by Teacher Zhang Yi in my learning materials, it is quite exciting, this is a relatively complete example.. NET Framework,
Only one number can be entered
Expression ^ \ D $The description matches a number.Matching example 0, 1, 2, 3Example of Mismatch
Only n numbers can be entered
Expression ^ \ D {n} $ for example ^ \ D {8} $The description matches 8
Common commands for hacker intrusion:
* Net user: view the user list* Net user username and password/Add add user* Net user username and password change User Password* Net localgroup administrators user name/Add add user to Management Group* Net
Nginx User Guide
1. Run nginx
You can run the nginx command to enable nginx:
nginx
If nginx is enabled, run the nginx command and add the-s parameter to control nginx running.
nginx -s signalSignal Value:
stop-Close quickly
quit-Elegant
Summary of My DOS Command
1. Findstr // Searches for strings in files
A) Findstr/s/m "bruce" *. * // searches for "bruce" in all files
B) Findstr "bruce there" x. y // searches for "bruce" or "there" in file x. y.
C) Findstr/C: "bruce there" x. y /
This guy described "strong", two words "Invincible", four words "swordsman", three words "don't know"
Windows Communication Foundation (WCF)Is a group of data communication application development interfaces developed by Microsoft. It is.. NET
At half past nine A.M., if you come to the interview location, you will also spray the Addy men's perfume.
Enter the table first. OK. I probably did not know the words I wrote.
Then I took a general test and looked at the question type (C # advanced)
Net use \ ip \ ipc $ "/user:" create an empty IPC Link
Net use \ ip \ ipc $ "password"/user: "user Name" creates an IPC non-empty Link
Net use h: \ ip \ c $ "password"/user: "user Name" directly logged in and mapped to the other Party C: to the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.