function Dominant_color ($image)
{
$i = imagecreatefromjpeg ($image);
For ($x =0 $x
8. Whois query Use the following function to get the full details of any domain user
function Whois_query ($domain) {//fix the domain name: $domain = Strtolower (Trim ($domain));
$domain = preg_replace ('/^http:\/\//i ', ', ', $domain);
$domain = preg_replace ('/^www\./i ', ', ', $domain);
$domain = explode ('/', $domain);
$domain
One day, after posting a trade post on the Internet, selling its own website, and reaching an agreement with the buyer, I asked for an intermediary and everything was ready. So contact domain name agents (agents are good, thoughtful and timely, this does not say, but is a level two or three agent), asking for transfer matters, the need for both sides of the identity card duplication, does not matter! Need to transfer fee of 1000 yuan, and agent theory, the website only superscript 500, helpless,
(mainly used two string functions implode () and explode)
I made the domain name query source code, mainly used two string functions implode () and explode, using the two functions of the powerful cutting string, you can query. COM,.NET.,ORG.,CC.,TV under the domain name WHOIS.
Echo ' Echo ' Echo ' echo "if (Isset ($string))
{
$url = "http://networksolutions.com/cgi-bin/whois/
There is such a demand. A user wants to register a domain name. However, all users who want to do well are registered. At this time, the program automatically generates a certain number of domain names, assuming that 100 domain names are generated. Then, the system automatically queries whether these 100 domain names have been registered. From the very beginning of generation, the domain name has been displayed to the user. A user wants to register a domain name. However, all users who want to d
Every programmer and developer likes to discuss their favorite snippets of code, especially when PHP developers spend hours coding or creating apps for a Web page, and they know the importance of the code. In order to save the coding time, small series collected some more useful code snippets, to help developers improve productivity
1) Whois query using php--uses PHP to obtain WHOIS requests to use this cod
, consecteturadipiscing elit. Nunc ut elit id mi ultriciesadipiscing. Nulla Facilisi. Praesent pulvinar,sapien vel feugiat vestibulum, nulla dui pretium orci,non ultricies elit lacus quis ante. Lorem ipsum dolorsit amet, consectetur adipiscing elit. Aliquampretium ullamcorper Urna quis iaculis. Etiam ac massased turpis tempor luctus. Curabitur sed nibh eu elitmollis congue. Praesent ipsum diam, Consectetur vitaeornare A, aliquam a nunc. In ID magna pellentesquetellus posuere adipiscing. Sed non
There is such a demand. The user wants to register the domain name, but, usually wants the good, has been registered by the person.
At this point, the program automatically generates a certain number of domain names, assuming that 100 are generated. Then in the automatic query
Whether these 100 domain names are registered, from the start, the domain name has been displayed to the user, and then
Ajax to update the status of whether each domain name is registered in real time.
At this time, a use
For Port 43 connected to the fsockopen function, I am now working on a program for querying the whois information of the domain name. now some domain names can be queried, such as com and net domain names. Some types cannot be found. for example, if I want to query the whois information of the cn domain name, the code always fails: PHPcode $ query quot; www.net.cn quot ;; domain name $ server quot; whoi
channel number of 20;CTRL + N/P switch the previous/next IRC channel;Pageup/pagedn switches the up/down page message.8. transcoding: /Recode add # fedora utf8
Add the channel encoding format and/recode to view the added encoding list.
9. connect multiple IRC servers: /Connect irc_server
You can connect to a new IRC server. Alt + 1 switches to the First Special channel, and then Ctrl + x switches to the current irc_server.
10. view the channel owner:/WHO
11. View someone's basic informat
;② Determine the maximum number of computers in each subnet and consider future development;Who needs to use a separate host ID?▲Each TCP/IP computer Nic;▲Each TCP/IP printer Nic;▲Route interfaces on each subnet;③ Consider the necessity of the growth plan:Assume that you have applied for a network ID at InterNIC: 192.20.16.0, but you have two remote LANs that need to be interconnected, and each remote LAN has 60 hosts.If you do not divide subnets, you
.
The previous network number is automatically added to the definition of named. boot.
(3) obtain the db. cache file
In Linux, a named. ca is usually provided under/var/named. The file contains the Internet
The top-level domain name server, but this file usually changes, so it is recommended to download the latest version from Internic. This file can be
Use anonymous ftp to download data from ftp.rs.internic.net. In the domain directory, the file na
In recent years, the TCP/IP-based Internet has gradually developed into a super-large computer network with the largest number of users and the most resources in the world, therefore, TCP/IP has become a de facto industrial standard. IP networks are gradually becoming the mainstream of modern and future computer networks.
An IP network is composed of IP subnets connected by routing devices. These routing devices are responsible for finding routes between IP subnets and forwarding IP groups to th
connection;② Determine the maximum number of computers in each subnet and consider future development;Who needs to use a separate host ID?▲Each TCP/IP computer Nic;▲Each TCP/IP printer Nic;▲Route interfaces on each subnet;③ Consider the necessity of the growth plan:Assume that you have applied for a network ID at InterNIC: 192.20.16.0, but you have two remote LANs that need to be interconnected, and each remote LAN has 60 hosts.If you do not divide s
File pathbantime = 3600 findtime = 300 maxretry = 3Servicefail2ban start service
4. unbind the IP address bound to fail2ban
Query limit list # iptables-L -- line-numbersChainfail2ban-SSH (1 references) num
Target
Prot opt source
Destination1
DROP
All
--
118.152.158.61.ha.cnc
Anywhere2
RETURN
All
--
Anywhere
Remove restrictions from anywhere #
Iptables-D
Fail2ban-SSH
1
We mainly edit the configuration file jail. conf. Do not worry about it.
# Vi/etc/fail2ban. conf
SSH attack pr
Access to this is a mistake:
Read the log:
Reply content:
Access to this is a mistake:
Read the log:
The master gives the configuration is not complete, I follow the existing to tell the possibility of error:
The directory that is accessed in log is D:/nginx_project/whois/whois , maybe the main thing is actually want to access D:/nginx_project/who
;)
Define ('ipdata', 'ipdata. db ');
// Get ip
$ Ip = isset ($ _ GET ['IP'])? $ _ GET ['IP']: getenv ("REMOTE_ADDR ");
Echo "IP: ARIN ";
If (-1 = ($ ip = ip2long ($ ip) die ("Invalid IP ");
$ Ip = sprintf ("% u", $ ip );
$ Country = $ city = '';
Echo"
Record No: ". Whois ($ ip, $ country, $ city );
Echo"
Location: [] ";
Function Whois ($ ip, $ country, $ city)
{
// Open ip-database
If (NULL = ($ fp
For Port 43 connected to the fsockopen function, I am now working on a program for querying the whois information of the domain name. now some domain names can be queried, such as com and net domain names. Some types cannot be found. for example, if I want to query the whois information of the cn domain name, the code always fails: PHPcode $ query = quot; www. about port 43 of the fsockopen function connec
, consecteturadipiscing elit. Nunc ut elit id mi ultriciesadipiscing. Nulla Facilisi. Praesent pulvinar,sapien vel feugiat vestibulum, nulla dui pretium orci,non ultricies elit lacus quis ante. Lorem ipsum dolorsit amet, consectetur adipiscing elit. Aliquampretium ullamcorper Urna quis iaculis. Etiam ac massased turpis tempor luctus. Curabitur sed nibh eu elitmollis congue. Praesent ipsum diam, Consectetur vitaeornare A, aliquam a nunc. In ID magna pellentesquetellus posuere adipiscing. Sed non
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.