JS learning notes (Chapter 9) (client detection)

1. Capability test The goal of capability testing is not to identify a specific browser, but to identify the capability of the browser. When possible, try to use typeof for capability testing. To test whether a property of any object exists in the browser environment, use the following function: function isHostMethod(object,property) { var ...

Posted by enterume on Wed, 16 Oct 2019 13:39:07 -0700

02-python Study Day 2

Today, I learned the following aspects, although some of them are not comprehensible, I followed the teacher to write the code. List, tuple operation String operation Dictionary operation Set operation File operation Character Coding and Transcoding Programming exercises Please close your eyes and write the following program. Procedu ...

Posted by buildernaut1 on Thu, 10 Oct 2019 06:48:32 -0700

Bit field-isa pointer

I. isa pointer structure union isa_t { isa_t() { } isa_t(uintptr_t value) : bits(value) { } Class cls; uintptr_t bits; #if SUPPORT_PACKED_ISA // extra_rc must be the MSB-most field (so it matches carry/overflow flags) // nonpointer must be the LSB (fixme or get rid of it) // shiftcls must occupy th ...

Posted by robinhood on Wed, 09 Oct 2019 15:36:21 -0700

Share a git abbreviation script

Share a git abbreviation script git shorthand command, add linux,mac aliasUsage method: . / gsh [command name] [parameter, optional] set sets user name and mailbox, 1: name, 2: mailboxinit Sets git Concise Commandgst: Code change status, git statusgd: View current code changes, git diff, git diff Branch 1 branch 2Gam: [gam comment] code submitt ...

Posted by DaveM on Wed, 02 Oct 2019 07:07:21 -0700

Implementing VPC-PEERING with Route Leakage

Experimental topology Topological specification The experimental environment is a 16G memory host. The above three virtual machines are run using vmware, and the running system is ubuntu-19.04. The three virtual machines are connected in host-only mode. spine, leaf1 and leaf2 are all ubuntu-19.04. The FRR program is running on them. host1, ho ...

Posted by Dodon on Tue, 01 Oct 2019 19:53:33 -0700

MacOS configuration iTerm2,oh-my-zsh,zsh_028

MacOS configuration iTerm2,oh-my-zsh,'zsh' zsh Mac Self contained zshterminal cat /etc/shells Modify the default terminal of the system to zsh # Change terminal chsh -s /bin/zsh # Verify that the change was successful echo $SHELL # /bin/zsh Install oh-my-zsh https://github.com/robbyrusse... install sh -c "$(curl -fsSL https://raw.githubuse ...

Posted by 0p3n_p0rT on Mon, 30 Sep 2019 07:45:15 -0700

What is Browser Object BOM?

What is BOM? BOM (Browser Object Model) is a browser object model that provides content-independent objects that interact with browser windows. Because BOM is mainly used to manage the communication between windows, the core object of BOM is window. Relevant methods (attributes) Popup window.alert() Properties of URL s // Current HTML URL locat ...

Posted by bimo on Tue, 24 Sep 2019 03:25:15 -0700

How did I go from analysis to handwriting a Wechat Robot--Login Chapter

I believe you all use Wechat, and also know the existence of the web version of Wechat. Today we are going to talk about how to make a fully automated micro-communication robot by simulating the web version of the micro-communication interface. This is the first part of this practical project, which focuses on how to realize a landing process. ...

Posted by bl00dshooter on Thu, 19 Sep 2019 23:14:46 -0700

[Project Practice] How did I go from analysis to handwriting the login page of a Wechat Robot?

I believe you all use Wechat, and also know the existence of the web version of Wechat. Today we are going to talk about how to make a fully automated micro-communication robot by simulating the web version of the micro-communication interface. This is the first part of the actual combat project, which ...

Posted by porto88 on Thu, 19 Sep 2019 07:03:36 -0700

OVS DPDK VXLAN Tunnel Treatment

Before learning about the implementation of OVS VXLAN, let's review how traditional VTEP devices handle VXLAN messages. As shown in the following figure: After the vxlan message enters the switch port, the vxlan tunnel is terminated according to the message header information. After the end of the tunnel, overlay mapping is carried out accordi ...

Posted by neilybod on Mon, 09 Sep 2019 21:31:56 -0700