Target
Now almost all sites will have verification code function, some are graphic, some are filled with characters. Have seen similar features on a website and want to do one. Now the company recently asked to use Discuz no way, ready to study its
1.createdb database nameGenerate Database2.DROPDB database nameDeleting a database3.CREATE User NameCreate user4.drop User NameDelete User5.SELECT usename from Pg_user;View System User Information\du7.SELECT version ();View version Information8.psql
Most of the company's table structure needs to be audited by the DBA, sometimes you will see the storage IP address is varchar (15), this is the traditional way, this method needs to occupy 15 bytes, then there is a more space-saving approach? There
1 Principles of Network applications
1.1 Application Architectures
Client-server
Peer-to-peer
Hybird of C/s and peer
--skype
Client-server:find the address of
[Document Introduction]TCP/IP is actually a complete set of network protocols on the physical network ......
I. Architecture and features of TCP/IP
1. TCP/IP architecture
TCP/IP is actually a complete set of network protocols on the physical network.
1. perform the following operations on the master and slave servers: 1.1, version 1.2, initialization table, mysql1.3 on the background, root Password modification, and master server master: # vietcmy. cnf [mysqld] log-binmysql-bin [required] Enable
I want to use the Oracle database to update data when I was building an ASP. NET Website. The fields in the table include int, string, and date. NET front-end controls always encounter problems when binding updates. I checked a lot of things online
A summary of public WiFiNow a lot of companies are doing free WiFi, stations, buses, subways, restaurants, as long as there is a dense flow of people have WiFi, free WiFi from the initial Web authentication method also gradually to the Client
For more information about VNC configuration in linux, see Linux Enterprise Application-Linux server application. 1. Start, stop, and restart VNC
# Service vncserver start/stop/restart
Command: vncserver-kill: 1 vncserver-kill: 2
2. Set the password
I. NetworkInterface conceptJava provides a NetworkInterface class. This class can get information about all the physical network interfaces of the machine and the logical network interfaces that the virtual machines and other software use to create
Linux can be controlled by using SSH remote connection, or the following command can be executed on the host for projection.
[Root @ localhost ~] # Export DISPLAY = ipaddress: 0
[Root @ localhost ~] # Xhost + this command requires that the
Ifconfig eth0 new ip
Then edit/etc/sysconfig/network-scripts/ifcfg-eth0 and modify the ip
1. Modify the IP address
[Aeolus @ db1 network-scripts] $ vi ifcfg-eth0
DEVICE = eth0
ONBOOT = yes
BOOTPROTO = static
IPADDR = 219.136.241.211
NETMASK = 255.2
In nginx reverse proxy, thinkphp and php cannot obtain the correct Internet ip address. nginxthinkphp
When a user needs to obtain the user's ip address to send a text message, tp always obtains the Intranet ip Address: 10.10.10.10.
Tp framework ip
1. Check whether the webshell Trojan is placed in the root directory of the site. check whether it is a PHP Trojan script based on the statement.# Find/storage/www/-name "*. php" | xargs grep-in -- color "eval ("# Grep-I -- include = '*. php'-r
Python string function, python string
1. uppercase letters
>>> s = 'ghostwu'>>> s.capitalize()'Ghostwu'
2, replace, replace
>>> s = 'my name is ghostwu, age is 20'>>> s'my name is ghostwu, age is 20'>>> s.replace( '20', '30' )'my name is ghostwu,
Complete the code below and have time to summarize the details:#coding =utf-8import xlrdimport xlwtfrom xlutils.copy import copyfrom copy import Deepcopyclass dataoutput_helper: "' It ' s a data structure about scenario. There is many methods
Below are some common regular expressions. If you think it is practical, add them to your favorites.Only numbers are allowed: "^ [0-9] * $ ".Only n digits can be entered: "^ d {n} $ ".You can only enter at least n digits: "^ d {n,} $ ".Only m ~ can
Configure the server
As a youth, without strength, do not make the server shown in the plotting.
As a student, can't afford to buy a server
As a child, can't afford a domain name
But don't forget.
As a civilian player,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.