Which platforms have Perl on? Where are we going to find them?
The standard release of Perl (maintained by the Perl Development Group) is distributed only in the original code form. You can obtain it at http://www.perl.com/cpan/src/latest.tar.gz.
I. Data Types(Data type):
Perl has four data types: Scalar (variable), Scalar Array (Array), Hash Array (Hash), and References (pointer ), it seems to be rare, but it is more than enough to use it. Especially when writing Perl programs, you do not
Perl + fastcgi + nginx Build
Nginx + fastcgi is the most popular environment in PHP, then Perl will also have fastcgi it, of course, Today to build the next Nginx Perl fastcgi. Performance is no less than PHP, but now the popularity of Web programs
Introduction to Perl Syntax Perl operators
1.Perl operator
1.1 Arithmetic operators
Perl is very different in variables and data paradigms and C. However, its operator and C are almost identical, except for the example conversion operator type of
Introduction to Perl Operators
1. Perl Operators
1.1 Arithmetic Operators
Perl is similar to C in both variables and data examples, but its operators and C are almost the same, except for C's example conversion operator type, pointer Reference
transferred from: http://perl.apache.org/docs/general/perl_reference/perl_reference.html
Use (), require (), do (),%inc and @INC explained
The @INC array
@INC is a special Perl variable which is the equivalent of the shell ' s PATH variable.
From: http://perl.apache.org/docs/general/perl_reference/perl_reference.html Use (), require (), Do (), % INC and @ INC explained
The @ INC Array
@ INCIs a special Perl variable which is the equivalent of the shell'sPathVariable.
'), System, and exec in Perl
In Perl, the check mark (''), system, and exec are used to execute the command order. This article will show us how they are used, approached, and differentiated.
I. utilization methods
1. check mark ('')
First of all,
First, user authenticationUser authentication is one of the most important technologies in network security, it is the first line of defense to protect network system resources. User authentication controls all logins and checks the legality of
Variable scope(a) package variables$x = 1Here, $x is a package variable. There are 2 important things to know about package variables:1) If there is no other declaration, the variable is the package variable;2) package variables are always
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.