My personal php Blog remembers my youth when I lost my mouse. When I was idle, I casually wrote something in my blog. My personal life, my studies, and my thoughts may have everything, but more about computers, since a personal blog is set up, you have to work hard to change the wp domain name.
My personal php Blog remembers my youth when I lost my mouse. When I was idle, I casually wrote something in my blog. My personal life, my studies, and my thoughts may have everything, but more about computers, since a personal blog is set up, you have to work hard to change the wp domain name.
My personal php Blog remembers my youth when I lost my mouse. When I was idle, I casually wrote something in my blog. My personal life, my studies, and my thoughts may have everything, but more about computers, since a personal blog is set up, you need to operate it with care.
For wp for domain name, wordpress for Domain NameLove Ming Tian published on 04:37:36
Change the domain name from AAA.com to BBB.com manually. Method 1: Add code to the PHP file. Open your wp-config.php and add the following code to it, which means to set up a new Wordpress blog URL. Define ('wp _ siteurl', 'HTTP: // BBB.com '); define ('wp _ home', 'HTTP: // BBB.com'); method 2 of Manually changing the Domain Name: database modification method. UPDAT... Read the full text
Tar command detailsLove Ming Tian published on 05:33:52
Linux
Tar command [root @ linux ~] # Tar [-cxtzjvfpPN] file and directory .... parameter:-c: create a compressed file parameter command (create);-x: unlock a compressed file parameter command! -T: view the files in the tarfile! Note that c/x/t can only exist under the parameter! Cannot exist at the same time! Because it is impossible to simultaneously compress and decompress. -Z: does it have the gzip attribute at the same time? That is... Read the full text
Solution to svn .. is not a working copy directoryLove Ming Tian published on 03:35:48
Linux
Svn .. is not a working copy directory solution 1. Show Hidden Files 2. Open. svn folder 2.1 Delete content in the tmp folder 2.2 Open the entries file and find the name of the folder with the error. For example, if an error occurs in my images folder, delete images (if dir or add cannot be deleted) 3. clean up... Read the full text
Impact of severe Linux Bash vulnerabilities and SolutionsLove Ming Tian published on 01:58:02
Recently Linux official built-in Bash detected a very serious security vulnerability (vulnerability reference https://access.redhat.com/security/cve/CVE-2014-6271), hackers can take advantage of this Bash vulnerability completely control the target system and launch attacks, in order to avoid your Linux server affected, we recommend that you fix the vulnerability as soon as possible. The solution is as follows: [software and systems that have been successfully used] install Linu with GNU bash version less than or equal to 4.3... Read the full text
Php hides the last two IP addresses and replaces the phone number with the "*" number.Love Ming Tian published on 05:17:54
1. Hide the last two IP addresses. [Code snippet] 2. php regular format IP address, hide the last one. [Code snippet] 3. Replace the number in the middle of the mobile phone number with "*" [code snippet] 4. Use php to hide the last or last two segments of the IP address. [code snippet]… Read the full text
Yii CDbCriteria common methodsLove Ming Tian published on 03:13:00
Note: $ c = new CDbCriteria (); is a way of writing ActiveRecord, making ActiveRecord more flexible, rather than DAO (PDO) and Query Builder in the manual. This is some notes and common usage of Yii CDbCriteria: 1. When an SQL statement is assembled, the [code snippet] instance: [code snippet] annotation: 1. The result differs from the DAO method: each element in the DAO method array is still an array. And Tong... Read the full text
Mysql function: pinyin QueryLove Ming Tian published on 06:15:16
Database
Mysql functions implement pinyin query: function: Enter the first letter of each character in a Chinese string to retrieve the corresponding data. Usage: directly use py (field name) = 'keyword', you can. [Table]… Read the full text
Mysql: This function has none of DETERMINISTIC, NOLove Ming Tian published on 06:04:52
Database
When creating a mysql function: ERROR message: ERROR 1418 (HY000): This function has none of DETERMINISTIC, no SQL, or reads SQL DATA in its declaration and binary logging is enabled (you * might * want to use the less saf... Read the full text
Magic methods for php surface objectsLove Ming Tian published on 04:27:23
/** What are PHP's object-oriented magic methods and how each magic method works? Please write a test class and run ** _ construct ($ argv1, $ argv2 ,...) * function: Class constructor. The function is to initialize the object * parameter: any number of objects, any type * return value: No * _ destruct () * function: Class destructor, when an object is destroyed, it is called to release the memory * parameter: No * return value: No * _ get ($ name) * function: when the program tries to call... Read the full text
SVN each person accesses different filesLove Ming Tian published on 07:21:42
Modify the configuration file svnserve. conf [general] # anonymous access permission, which can be read, write, and none. The default value is readanon-access = none # authenticate the user's permission, which can be read, write, none, the default value is writeauth-access = write # password Database path. Remove the previous # password-db = passwd # user operation permission # authz-db =... Read the full text
Summary of MySQL if and case statementsLove Ming Tian published on 01:55:59
Mysql if can be used as an expression or a flow control statement in a stored procedure. The following is an expression: IF expression IF (expr1, expr2, expr3) IF expr1 is TRUE (expr1 0 and expr1 NULL), the return value of IF () is expr2; otherwise, the return value is expr3. The return value of IF () is a numeric or string value, depending on the context. Select *, if (sva... Read the full text
Events and behaviors in YiiLove Ming Tian published on 02:02:14
For the description of Yii events and behaviors, refer to the event model as "Observer mode" in the design mode: when the object state changes, this object can notify other objects of this event. To use the event model, perform the following three steps: 1. Define events; 2. Register event handles; 3. trigger events. Why are these three steps required? Because for PHP itself, its execution process... Read the full text