Alibabacloud.com offers a wide variety of articles about ip phone asterisk compatible, easily find your ip phone asterisk compatible information here online.
($ string );$ Tmpstr = ''; www.111cn. NetFor ($ I = 0; $ I {If ($ I >=$ start $ I {If (ord (substr ($ string, $ I, 1)> 129){$ Tmpstr. = substr ($ string, $ I, 2 );}Else{$ Tmpstr. = substr ($ string, $ I, 1 );}}If (ord (substr ($ string, $ I, 1)> 129) $ I ++;}// If (strlen ($ tmpstr) Return $ tmpstr;}}
Example
The Code is as follows:
$ Str = "aliyun.com ";Echo cut_str ($ str, 1, 0). '**'. cut_str ($ str, 1,-1 );// Output: for example, **
The following two
.*.*", $ip);//The above output is: 127.0.*.*?>ExampleCopy the Code code as follows: function Suohao ($phone) {$p = substr ($phone, 0, 3). " ". substr ($phone, 8, 3);return $p;}Of course there are like arrays with. After separating the array 2, 3 to replace it can be or combine 0,1 array.
I hope this article is helpful
The example in this article describes the two-bit method of displaying an asterisk after PHP hides the IP address. Share to everyone for your reference. The implementation methods are as follows:
We are in a lot of public websites will encounter the user's IP when the next few IP segments appear as asterisks, so good
shutdown asynchronous operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked
asynchronous operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked
, task start off asynchronous operation 16 . Database restore : Historical backup record, restore database or single table, statistics backup time and file size 17 . SQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, can export Excel 18 . Access records: Log each IP access time, source region, network operator, count the number of visits per IP a
operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked IP b
shutdown asynchronous operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked
operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked IP b
: Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked IP blocked access to website f
characters to replace.
Positive number-The length of the string being replaced
Negative numbers-the number of replaced characters starting at the end of the string
0-Insert rather than replace
Use instance:
Copy Code code as follows:
[Code]
echo strlen ($idcard) ==15?substr_replace ($idcard, "* * *", 8,4):(strlen ($idcard) ==18?substr_replace ($idcard, "* * *", 10,4): "ID number is not normal!" ");
[/code]
Third, replace the
This article mainly introduces PHP with asterisks to hide some of the user name, ID, IP, mobile phone number and other examples, the need for friends can refer to the following A, imitation Taobao comments purchase records hidden part of the user name, the following code is available. nbsp; nbsp; Code as follows: function Cut_str ($string, $sublen, $start = 0, $code = ' UTF-8 ') {nbsp; nbsp; if ($code = =
Cisco Unified CallManager is a call processing component in Cisco Unified Communication system. It is a scalable, distributed, and highly available enterprise IP voice call processing solution.
By supporting the enhanced features of the Session Initiation Protocol (SIP) SIP user line side and the SIP relay side, Cisco uniied CallManager version 5.0 enhances the functions provided by the application. These enhancement features improve interoperability
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.