Vim Editor Usage rules
The Vi Editor has 3 usage modes: General mode, edit mode, and command mode.
$SHELL: View the current default SHELL type
$BASH _version: View the current Shell version3. General Mode:
Cursor Movement shortcut keys
Operation
Shortcut keys
Move Cursor Down
Down ARROW key,J, space bar
Move Cursor up
Up ARROW key,K,backspace key
Mo
system:Let's edit and bind the PPTV project, plus this one:127.0.0.1 pptv.com www.pptv.comRefresh Dns:ipconfig/flushdnsVirtual domain VirtualHost Configuration detailedWhat is rewrite? is rewrite, rewrite the URL of the access connection, sometimes in order to access the URL concise point , such as:Www.pptv.com/i/?user_id=123time=123from=webI think this address is too long to be concise enough to rely on the Apache virtual domain rules to write it si
Rules for the use of variables in JavaHad to accept the variable little temper :1. Variables in Java need to be declared before using 650) this.width=650; "src=" http://img.mukewang.com/53688962000154e005940070.jpg "/>2, when the variable is used, you can declare the variable while initializing 650) this.width=650; "src=" http://img.mukewang.com/5358cc640001c54f01800024.jpg "/> can also be declared after the assignment 650) this.width=650; "src=" http
Regular Expressions-match rules the basic pattern matches everything from the very basic to the beginning. Patterns, which are the most basic elements of regular expressions, are a set of characters that describe the character of a string. Patterns can be simple, consist of ordinary strings, or can be very complex, often with special characters representing a range of characters, repeating, or representing context. For example: ^once This pattern cont
I. Rules of writing1. IndentA tab.2. Curly braces {}Both of the writing rules are available, according to the individual habits.3. There is a space between the parentheses and the keyword, and the parentheses are close to the function4. Operators and variables (or expressions) have a space on either side (except for string operations)Second, naming norms1. Class nameBig Hump2. Class PropertiesM heel Big Hum
Matter is a good set of JS physics engine, Layaair built-in, become more usefulmatter provides a collisionfilter attribute for each collision, and supports three properties, namely
GroupCategoryMask
With three attributes, you can design a complex collision relationship.The rules are as follows:First case
On the premise that two group is equalIf any group is greater than 0, then the two always collide, for example, everyone is 1,
Write in front
The experimental reference
The pox script sets the controller's forwarding policy, so just understand the script.
The Mininet script sets up the topology and related information, so just understand the script as well.
Pox scripts are not understood at the moment.
This experiment I learned: Pox controller Web interface, the first time really see the flow table entries.
Experimental topology
In this environment, assuming H1 Ping H4,
1. Start JBoss Server, open http://127.0.0.1:8080/drools-guvnor page into Guvnor system 2. Create a new rule: in the left-hand navigation bar, select Knowledgebase->create new->new, enter the name of the business rules in the pop-up dialog box Helloworldrule, initialize the directory to select one, type select DRL Rule (Technical Rule–text Editor), package Select Default package, as shown in the following illustration:
3. Click OK to do the regular
Here is a list of tag nesting rules that must be followed under HTML 4 Strict and XHTML 1.0 Strict, such as you can't embed a in .
Description:
For the convenience of readers, the labels in this article use uppercase (according to XHTML rules, element names must be lowercase, such as instead of )
Lowercase words indicate a group or series of HTML tags
Each entry (label) follows a list
Core tips: Rules for JavaScript Library developers
1. Keep Non-invasive My HTML tags don't want to know your JavaScript code.
2. Modification and extension of object.prototype! is strictly prohibited This is important and requires a rule that is entirely against it. Objects are the basic building blocks of JavaScript functionality and don't mess with them.
3. Don't overdo the expansion of JavaScript-built objects as little as possible. Don't misund
Xml
There are always exceptions to the rules. There is one exception to my rule on attributes: Sometimes I assign an ID reference value to an element. These ID reference values can be used to access XML elements that are essentially exactly the same as the name or ID attribute in HTML. This is illustrated by the following example:The IDs in these examples are just a counter, or a unique identification number, used to identify different annotations in
effort to do stand where. Roughly is pushing a word at the station group?
Baidu's rankings have never been ranked according to the so-called "rules of the game". Never ranked in front of all of a sudden, feeling is always an instant problem, the ranking is quite large. And ranked off, is also an instant problem, once the scenery of the station, suddenly unknown. For example, then Hill SEO information Station, Aunt Li and so on. Chushda said he put th
to modify the content of the Web page, also greatly improve the download speed;
Centralized management style information: The basic concept of CSS is to be able to display the content of the Web page and its performance of the style set apart, that is, the page's appearance settings information from the content of the Web page independent, and centralized management. In this way, when you want to change the appearance of the page, just change the style set part, the HTML file itself does not n
I believe that all of you have had this experience when doing penetration testing, obviously an XSS loophole, but there are XSS filtering rules or WAF protection cause we can not successfully use, such as our input
1. Bypassing MAGIC_QUOTES_GPC
Magic_quotes_gpc=on is a security setting in PHP that will rotate some special characters, such as ' (single quotes) to \, "(double quotes) to \, \ to \
For example: will be converted to , so that our XSS doe
The rules for overriding methods are as follows:
1. Parameter list: must exactly match the argument list of the overridden method.
2. Return type: Must be exactly the same
as the return type or subtype declared in the overridden method in the superclass 3. Access level: must not be stronger than the overridden method, and can be weaker than the overridden method.
4. Non-check exception: An overriding method can throw any unchecked exception, regard
, ^ (. *) $ means all content. Then the space is followed by the directory where we guide the user, and we take him to the new domain. Refers to what is obtained from the matching URL in the preceding brackets.
This is a complete and small example. about how to call a part of the URL in Rewritecond, we can refer to this article (Apache mod_rewrite Learning (Rewritecond rewrite rules), 3, now learn to use, learning regular expressions.
Recommend a cla
We can usually use iptables to set up some firewall rules in Linux systems.
Iptables-t nat-a output-p tcp-j REDIRECT * * * * * * * * * application, the rule is only saved in memory, and the next time it restarts, the/etc/sysconfig/iptables firewall configuration file is reloaded by default.1. If you want to use the currently added rule after restarting, you can save the current rule to a configuration file by/sbin/service Iptables Save, which will pe
First, two basic principles of nomenclature1, the meaning is clear, not easy to confuse;2, do not and other modules, the System API namespace conflict.Ii. general rules of nomenclature1. In all nomenclature, the standard English words or abbreviations shall be used; no phonetic or phonetic abbreviations shall be used unless the name describes the textSpecific content (such as Half-width, Full-width, initials, finals, etc.); Do not use numbers or stran
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.