A small program that uses PHP to open the socket port directly for a letterThe feature is the use of SMTP authentication, can better use to meet the needs of general users to build stations.The entire source code attached to this article, the same
With the popularity of a variety of smartphones, tablets, more and more people find that a variety of digital products, especially the mobile phone itself has been unable to meet the needs of life in the day-to-day use of the time, and the emergence
Recently wrote a lot of PHP, but also in touch with a lot of commonly used functions, most of them took notes, send a blog out to learn together. In fact, the feeling of learning a language, grammatical logic is soft quality, and the degree of
By using the + operator, append the array elements on the right (excluding those elements that have the same key value as the array element on the left) to the left array, but the duplicate key values are not overwritten.
Cases:
$a =array ("a" =>
Chinese string manipulation function
The string manipulation functions in PHP3.0 are more important, as follows:
(1) echo,print,printf,sprintf
Used for output strings. If a variable name is substituted in the string, it is replaced with its value.
Shell output of Chinese, then the Chinese returned PHP results for garbled, there is a good solution, we can refer to the followingIf you need PHP to execute some shell commands to see the results of the display, if the shell output has Chinese,
PHP Example profiling: Counters
Author: Sucre_tiger
This section of the counter with a text count, not used in the database, you can achieve the following functions:
Using a text file to implement multiple page counts reduce server I/O occupancy
1. Definition and display of stringsDefinition: By "", "" to mark
Displays: Echo () and print (), but print () has a return value of 1, and Echo () does not, but Echo is faster than print () and print () can be used in compound statements.
2.
This article mainly introduces the thinkphp routing rules using examples of detailed understanding and pseudo static function implementation (Apache rewrite), need friends can refer to the following Code is as follows:
This is my recently developed a set of upload voting integration System, a total of 4 PHP and a number of record files, this is the first view.php, mainly responsible for the display of file lists and uploaded file forms and file names of the test.
The example in this article describes how the PHP implementation splits the value of the textarea to an array based on the carriage return line break. Share to everyone for your reference. The specific analysis is as follows:
TEXTAREA return
Data | structure
"Basic Algorithm"
Suppose you have an array, you need to find out where the value is in the array.
Binary lookup Function Bin_sch ($array, $low, $high, $k) { if ($low $mid = Intval (($low + $high)/2); if
check box PHP receives multiple checkbox information that is not automatically converted to an array as an ASP, which is inconvenient to use. But there is a solution, is to use JavaScript to do the preprocessing. Multiple check boxes with the same
At present, there are many people who learn PHP, many of the friends who do PHP training always ask such a question: What is the PHP connection function implode?PHP can split the string into a group, but also can be connected to the array of strings,
Use the function date () to implement the displayed in the format: year-month-day hours: minutes: secRelated Time parameters:A-"AM" or "PM"A-"AM" or "PM"D-A few days, two digits, if less than two digits before the 0; such as: "01" to "31"D-Days of
Originally wrote a few functions, IP blacklist is recorded in the library, in order to facilitate understanding, changed to a class of IP blacklist written out.
192.168.1.1 Single IP
192.168.1.* acting like this 192.168.1.1-192.168.1-255
192.158.1.2
Interview Summary
Today, I went to a famous Beijing IT company for a PHP programmer interview. This is the first time in life, why not nervous? I'm not sick. No, it's called confidence, huh?The first is to do some writing questions.
The data
Based on the conversion of the systemMade by Huyang @2005-01-20| | 11-04-06# #用n进位制到m进位制# #0 ~9a-z, up to 36 in rangeprint ' encryption decryption method ';Class carry{function Carry ($n, $m){$this->n= $n;$this->m= $m;$this->chn[' 0
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.