[Phpagi. conf]
[Asmanager]
Server = localhost; server to connect
Port = 5038; default manager Port
Username = phpagi; username for login
Secret = phpagi; password for login
[Festival]Text2wave =/usr/bin/text2waveTempdir =/tmp/[Phpagi]# Error_handler = true# DEBUG = tru
Manager. conf: W;; Ami-the asterisk Manager interface;; Third party application call management support and PBX event Supervision;; This configuration file is read every time someone l
Identifier dictionary, the method of calling the function needs to take the form of arg1=value1,arg2=value2.>>> def A (**x):If Len (x) ==0:print ' None 'ElsePrint X>>> A ()None>>> A (x=1,y=2){' Y ': 2, ' X ': 1} #存放在字典中>>> A (#这种调用则报错)Traceback (most recent):File "A (+)Typeerror:a () takes exactly 0 arguments (2 given)Described above four kinds of definitions, then see how the function parameters in the call process is resolved, in fact, as long as the above four methods to remember the priorit
The example in this article describes the two-bit method of displaying an asterisk after PHP hides the IP address. Share to everyone for your reference. The implementation methods are as follows:
We are in a lot of public websites will encounter the user's IP when the next few IP segments appear as asterisks, so good protection of the user's privacy, interested friends can take a look.
PHP is formatted with the IP address, hiding the next bit.Exampl
Label:Recently studied asterisk configuration, before the SIP account is configured in the sip.conf file, manual writing dead, the current demand, is the dynamic new SIP account, saved in the database.After adding data to the database, use the command SIP show users to not load the SIP account to the database.1. Download X-lite soft phone client, login SIP account, can login successfully.2. Modify the res_config_mysql.conf file, configure the database
If you need to write a section to interact with the user, and need to input some sensitive information (for example: User password, license, etc.), the direct use of printf+read, the user input information will be displayed on the screen, which is
. h file/** * turn into an asterisk tool */@interface asterisktool:nsobject//Turn the phone number 第4-7位 into an asterisk + (NSString *) Phonenumtoasterisk: (nsstring*) phonenum;//mobile phone number 第5-14位 to Asterisk + (NSString *)
The use of function parameters has two important aspects to note:
1. How the function parameters are defined
2. How parameters are parsed in the process of calling a function
First of all, there are four main ways to define function parameters in
This article uses php to hide the middle digit of a mobile phone number. the ID card number only shows the last four digits. For more information, see the latest project, you may need to hide the middle digit of a person's mobile phone number. the
Use ereg to determine whether a string contains asterisks. use ereg to determine whether a string contains asterisks.
Reply to discussion (solution)
Strpos can be completed.
Var_dump (@ ereg ('\ *', 'ABC'); // bool (false)Var_dump (@ ereg ('\ *'
The final obtaining of the agent status is to call devicestate. in C, the ast_device_state is obtained. When the queue module is initialized, it registers the callback function for device status change, devicestate. c starts the thread
/** Copyright (c) 2012, School of Computer Science, Yantai University * All Rights Reserved. * Prepared by: Zhao guanzhe * Completion Date: July 15, October 13, 2012 * version number: V1.0 ** input Description: asterisks * Problem description:
The recent work has been done to pay the related work, encountered a quick payment, binding bank card when the user input 4 element "name, mobile number, ID card, bank card number", show the user card history, to do mask processing,To prevent a
Regular Expression method
1, the string contains more than one mobile phone number
The code is as follows
Copy Code
$s = ' manager Wang: 13999312365 manager li: 13588958741 ';$s =preg_replace (' # (D{3}) d{5} (D{3}) # ',
[HTML]View plain copy
The full type of expression, as follows:Execution (Modifiers-pattern ret-type-pattern declaring-type-pattern? Name-pattern (Param-pattern) Throws-pattern?)
Modifiers-pattern representative modifier (public/protect, etc.)
Ret-
This is just what I suddenly thought of when I was learning javascript. I tried it today and it was successful. This is a test: This case cannot be reflected, because it is a direct login. I did not add the "Remember password option", but some
// Simulate Password Logon Mode// Assume that the password must be at least eight to 12 characters long.# Include # Include # Include # Include # Include # Define Len 12
Int main (){Printf ("input password, length between 8 ~ 12, if longer than 12,
First: Use the string SEARCH method method of replacing the fourth segment of the IP address with an asterisk [Ctrl + A select all Note: If you need to introduce external Js, You need to refresh it to execute]Method 2: Array method of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.