/* applies only to elements clicked in the content. For elements such as dragging, you need to work on the page yourself.* Mainly binds Touchstart and touchmove events, and determines how many pixels the finger moves after the user presses it.* If your finger moves less than 10 pixels, you still think the user is doing a click. If the moving distance exceeds 10 pixels, the execution of subsequent event listener functions is canceled. */Mobile Touchsta
and which are private.
Install ZINKMO will allow you to choose whether to automatically sync ie and Firefox sync settings, after the completion of the IE "Tools" menu to increase the "Zinkmo Favorites" item, and in the Toolbar Add button, click can be synchronized.
The ZINKMO feature also helps you check for dead links and duplicate links in your bookmarks.
Error behavior:
Microsoft OLE DB Provider for SQL Server error ' 80040e2f ' cannot insert value NULL into column ' id ', table ' Web.dbo.dingdan '; column does not allow null values. INSERT failed.
/untitled-2.asp, line 115
Reason Analysis:
SQL database, the ID column identification specification is not set to Yes when the table is established. So when you create a table, you must set the ID to automatically increase the ID, identity and so on.
MVC, using EF to build entities. The data is stored in the database and executed to _db. SaveChange (), the following error is reported:In the database data storage, often encounter this problem, the cause of this error is a variety of Internet search solutions, as follows:1. There is said to set the null option to "can be empty", but I This "ID" field is the primary key, how can be set to be empty? Veto2. Say that the identity specification is set to "yes", such as, however, that the identity
So, the most common is:
Order Deny,allow
Allow from all
Note that there is only one comma in the middle of "Deny,allow", and there can be only one comma, and there will be errors in the spaces.
The meaning set above is to set "first check prohibit set, no prohibition of all allow", and the second sentence without den
Disable page swipeNormally stationary slide scheme: (Block sliding events)window.ontouchmove=function(e) { e.preventdefault (); E.returnvalue=false; e.stoppropagation (); return false ;};Some models do not support the above static sliding scheme, can be used: (click on the page floating to the specified position does not move the body of the position set to fixed)$ ("#btn"). Click (function(
1, open IE browser, in the "Tools" select "Internet Options", pop-up dialog box select the "Security" tab. Click the "Custom Level ..." button at the bottom (pictured).
2. In the Custom Level dialog box, make "Security settings", find "allow programmatic access to the Clipboard", and modify the default "prompt" to "enabled."
3, click "OK" button, will pop-up pr
1, first in the Win7 pure version of the 32-bit system desktop, the mouse right click the "Computer" icon, and then select the "Properties" option;
2, then in the Pop-up Computer Properties window, click on the left of the "Remote Settings" item;
3. After opening the remote system Properties, switch to the "Remote" tab, you can then see "Allow com
" into the local computer system. To do this, in order for the device driver to successfully root "settle" into a Windows Server 2008 system, we must first attempt to modify the compatibility properties of the target device driver to maintain good compatibility with the Windows Server 2008 system. The following are the specific steps to remove system compatibility:
First in the Windows Server 2008 system, click Start/Programs/attachments/Explorer com
This thing is really easy to confuse us. In fact, it is not difficult, as long as you master such a rule can:Let's start with an example:Order Deny,allowDeny from allAllow from 127.0.0.1The basis of our judgment is this:1. Look at the back of the order, which is in front, which is behind2. If deny is in front, then you need to see the deny from this sentence, and then see the3. The rule is a matching one, whether deny before or allow before, will be e
Client access control is done before the apache2.4 version, which is accessed with the Allow Deny Order directive, and the usage in version 2.4 is different from the previous version, as follows
################################################
Configuration on the 2.2
Order Deny,allow
Deny from all
Configuration on the 2.4
Require all denied
#######################
Method One, only allow SSH to specify settings for user logon rights
The permissions of the SSH telnet directly affect the security of the server, and it is necessary to set reasonable user permissions for SSH.
To view an SSH version of the command:
Ssh-v
To set the method for SSH to allow only specified users to log on
Add the following statement to the/etc/ssh/sshd_config file
Today in the company configuration Zend Local Apache environment, found in the zend.conf in the rights control of a few sentences, as follows:
Copy Code code as follows:
SetHandler Server-status
Order Deny,allow
Deny from all
Allow from 127.0.0.1
I need to configure virtualhost when I configure the virtual host.
Copy Code code as follows:
ServerName Backend
Doc
Ajax cross-domain access is an old problem, a lot of solutions, more commonly used is the Jsonp method, the Jsonp method is an unofficial method, and this method only supports get mode, not as secure as post. Even if you use the Jsonp method of jquery, type is set to post and is automatically changed to get.Official Question Description:"Script": evaluates the response as JavaScript and returns it as plain text. Disables caching by appending a query string parameter, "_=[timestamp]", to the URL
Remote Web servers are usually configured with dedicated personnel, which is usually used directly. Sometimes, if you want to use a machine in the LAN as a server to place a site for access by users in the LAN, problems such as "inaccessible" and "unable to display" may occur, the following solutions are provided for the win2003 operating system:
1. Enable Asp.net in Web Service ExtensionSelect Web Service extension in IIS to allow Asp.net
2.
A Windows 7 client added to ActiveDirectory (Active Directory-AD, note: WinSRV2008) can use saved creden。 for automatic verification when logging on to a computer in the Active Directory Using Remote Desktop. However, even if the computer outside the Active Directory saves the logon creden, the system still prompts you to enter the password during connection, as shown in:
Remote Desktop prompts "the system administrator is not allowed to log on to the Remote computer with the saved credendesk
Audit page (auditing.aspx).
The problem is finally coming to the surface, when you do register.aspx, want to visit it suddenly feel wrong, how to return to the login page? You look closely at the Web site, is not become: Login.aspx? Returnurl=register.aspx. How to do, the user is because there is no account to access the registration page AH? (This is pure nonsense, there are accounts who still run to register.) I often say to my colleagues: "The way is to come out!!" ”
1, create a new director
Every time you use IE7 into 51CTO forums and other websites or blogs, when you copy and paste the post, a dialog box will pop up. Do you really want to allow this web page to access the clipboard? Annoying. Now we're going to take care of the problem and the solution is simple.
This is because IE7.0 enhances the security settings. If the security level of IE is set to the default or higher security level, it will pop up when posting posts or post p
: This article mainly introduces how to set Access-Control-Allow-Origin in ajax to implement cross-Origin Access. if you are interested in PHP tutorials, refer to it. Cross-origin access through ajax is an old problem. There are many solutions, and the JSONP method is commonly used. the JSONP method is an unofficial method and only supports the GET method, it is not as secure as POST.
Even if jquery's jsonp method is used and type is set to POST, it
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.