This article mainly introduces the usage instructions of $ _ SERVER in PHP. For more information, see
This article mainly introduces the usage instructions of $ _ SERVER in PHP. For more information, see
Some SERVER information is often used
1. Basic Knowledge Point 1.1The meaning of several status codes in http: 503500401403404200301302... 200: the request is successful, and the requested data is returned accordingly. 301: Permanent redirection. 302: Temporary row redirection. 401: the
$ _ SERVER array element description $ _ SERVER ['php _ SELF '] # File Name of the script being executed, which is related to document root. $ _ SERVER ['argv'] # parameters passed to the script. $ _ SERVER ['argc '] # contains the number of command
$ _ SERVER ['php _ SELF '] # File Name of the script being executed, which is related to document root.$ _ SERVER ['argv'] # parameters passed to the script.$ _ SERVER ['argc '] # contains the number of command line parameters passed to the Program (
Ec (2); multiple real IP address acquisition codes are an environment variable that comes with php to determine and then obtain the real IP address of the user. Let's take a look at the one that suits you. 1: & lt ;? Phpif (getenv (HTTP_CLIENT_IP) {&
In my previous article "the recently developed website anti-IP attack code, super useful", I wrote a complete solution to prevent malicious IP attacks on the network. It worked well for a month.
In my previous article "the recently developed website
Introduction: MySQL databaseThe optimization of MySQL database is a very important work link. The optimization of MySQL database is skillful. The following describes the top 10 optimization techniques of MySQL database, I hope this will help you.
1.
Ec (2); php simple online voting system source code download, the last time you want to work with a public they said they want me to write a simple voting system, but each IP can only vote once, well, the following is the simplest voting system I
Ec (2); well, css and js on the html & nbsp; page have been written. Let's take a look at how the database and php programs are implemented. Let's first look at the database structure. CREATETABLEIFNOTEXISTS 'su _ mon_vote '(& nbsp; 'id' int (11)
The security awareness of a convincing programmer is too low. You can directly execute any command with a single parameter $ args =$ _ REQUEST ['cmd']; /* something here */exec ("tsutil-proxy $ ip $ args", $ output, $ ret ); understand php exec
Recently, CC attacks on several websites continue to learn about the principle of CC, and then try to find a method to temporarily defend against CC attacks. It cannot be hurt.Attach the blocked attack
@ Session_start ();
$ Allow_sep = "1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.