Recently in a program, XP is running well, Win7 always open the file, enter the address to access \\192.168.0.254, found the need to enter the user name passwordLAN XP computer can access the WIN7 shared files, and WIN7 cannot access the XP share, the network neighbor can see XP, but after double-click asked to enter a user name and password, with the administrator and password login, how to solve this problem?Under Win7, follow these steps: Start-- c
GitThere are three states in existence: Working directory, index, and object library.There are two files in the directory and have been committed once, so it is now synchronized.To file1 Edit, change to quue . The status is as follows:The next step git add file1 is to add it into the index library.Submit:
After the virtual tree object is converted to a real tree object, it is SHA1 named and placed in the object library.
Create a new Commit ob
There are times when we need to look at all the directories and files created by an RPM, for the sake of understanding the structure of the program or for other purposes, but we are not familiar with this RPM package, which can be viewed by rpm-ql rpm name.However, the RPM name may be forgotten or unsure of the specific version number, available via Rpm-qa | Grep-i "Registration" received, as follows:[Email protected] rabbitmq]# Rpm-qa | grep RABBITMQ
Generally speaking, the file is divided into two major categories of text and binary files, text file editing is easy, Windows Notepad, UltraEdit are very useful, binary file editing under Windows also has a lot of tools, UltraEdit is good, but Linux? Today finally found a good way, but the final source can not find.First create a binary file:[Email protected] tmp]$ echo-n "abcdefghijklmnopqrstuvwxyz abcdefghijklmnopqrstuvwxyz" > Test.bin[email protec
1. On the Windows 7 desktop we Double-click "Computer" and then we click "Organize" on the menu in the computer interface as shown in the following image.
2. The Folder Options dialog box opens, as shown in the following figure.
3. Then we click on the "View" tab, then in the advanced settings, we put "hidden files and folders" Below "Show hidden folders, files
The MySQL database data file is stored by default: C:\Documents and Settings\All Users\Application Data\mysql\mysql Server 5.1\datal, where can I see it?Of course, from the MySQL configuration file, find the MySQL installation directory, find My.ini, and then through the search to find datadir=, the following is the MySQL database file storage location, to modify is very simple, the first to change the address of the back to their desired address, Then the original storage database
Web page source code protection (prohibit right-click, copy, save as, view source files), only some simple protection 1. prohibit right-click menu
The Code is as follows:
Article Title: view the total size of all files in a Linux folder. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic categories such as viewing the size of the home directory:
Du-s/home
You can also:
Du-sh/home
/Usr/local/apache/bin/htcacheclean-v-p/cacheroot-l500M
Stat
Concept:
The PHTML (sometimes called PHP) Web page is a Web page and ASP that contains PHP (a language similar to JavaScript or Microsoft VBScript), and PHP scripts are embedded in the HTML code of the Web page. Before the page is sent to the requesting user, the Web server invokes the PHP interpreter to interpret and execute the PHP script. Web pages that contain PHP scripts are usually suffixed with ". php", ". PhP3", or ". phtml". Like ASP, PHP can be considered a "Dynamic Web page".
Town Field Poem:Cheng listens to the Tathagata language, the world name and benefit of Dayton. Be willing to do the Tibetan apostles, the broad show is by Sanfu mention.I would like to do what I learned, to achieve a conscience blog. May all the Yimeimei, reproduce the wisdom of the body.——————————————————————————————————————————Code# OS operating system# Python cross-platform language import osprint (Os.listdir (Os.curdir))Result——————————————————————————————————————————The essence of the blog,
Android after generating the application signature file, if we want to see the signature file SHA1 and MD5, how to do it?? Now let's take a look.Open the Terminal terminal window in the lower left corner of the Android studio interface and go to the bin directory of the JDK, because the default path for terminal starts with the disk installed in Android Studio, so you have to do it manually, Go to the Bin folder under the JDK installation directory, where my Android studio installs the directory
Download Tool Web address
Place the Jad.exe under a path, such as D:/java/jad
Copy Net.sf.jadclipse_3.3.0.jar to eclipse's plugins directory and restart Eclipse
Set the start path for Jad650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/8A/56/wKiom1gtdu_CPAwPAAFhGvK160M501.png-wh_500x0-wm_3 -wmp_4-s_1271686182.png "title=" 333.png "alt=" Wkiom1gtdu_cpawpaafhgvk160m501.png-wh_50 "/>
Set how the *.class file opens650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/8A/53/wKi
Http://www.cnblogs.com/abeen/p/4517171.html
Nginx's 403 Forbidden errors indicates that you are requesting a resource file but Nginx does not allow you to view it.
403 Forbidden is just an HTTP status code, like 404,200 is not a technical error.Which scenes need to return a 403 status code scenario.
1. The website prohibits specific users from accessing all content, for example: the site masks an IP access.2. Access directory to prohibit director
Vim View header file, library function method:
1, the simplest way is to install the corresponding library of the man Manual, directly in the terminal man XXX (function) such as man printf will see PRINGF related information, this method is simple and display a lot of information, if your English must pass. This approach is not the point here.
Install one of the most basic documents sudo apt-get install Manpages-dev
2, this approach allows you to bett
In the development of the company, the development of the program in the local test is normal, but in the test environment is problematic. The first reaction is to look at the log file and see what the error message is in the log file. I carried out the Vim Log.txt, and then the direct card to die, can not open.What to do, I still have to check AH. Using the Cat command, although the card is not dead, but the display of the document is obviously wrong, how to do?Asked the company's predecessors
Q: whether outlook or IE is used, right-click and choose "View Source File" from the shortcut menu. It is strange that, the source file of the email or webpage cannot be displayed on my computer, although this does not affect the normal use of the software. Is this because I have installed an update version or patch of Microsoft?ProgramThis function is automatically blocked? Is there a way to restart this function? You must know that you cannot
As a web programmer, you may want to view the source code of the Web page often, but if it suddenly fails. The following excerpts from Zhongguancun:
first categoryThe situation is that the view Source feature will fail when the browser's cache is filled. If you want to determine whether your computer is in this category, click on the Internet Options "general" tab of IE on the "Tools" menu, and then click t
The file hiding technology is one of the most common techniques for spreading Trojans and viruses. It uses the unfamiliar features of most users on basic operations to escape users' discovery and inspection, the standard setting method for displaying hidden files is used by all users. Once hidden problems are combined with virus Trojans, such as typical autorun viruses, such simple settings may not be able to view
In the Web site program code security detection, Web site file Arbitrary view vulnerability in the entire site Security report is a relatively high-risk site vulnerability, the general website will contain this vulnerability, especially the platform, mall, interactive sites more, like the normal permissions bypass the vulnerability, The result is to be able to view any file on the site, and even
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.