JS learning notes (Chapter 9) (client detection)
1. Capability test
The goal of capability testing is not to identify a specific browser, but to identify the capability of the browser. When possible, try to use typeof for capability testing. To test whether a property of any object exists in the browser environment, use the following function:
function isHostMethod(object,property) {
var ...
Posted by enterume on Wed, 16 Oct 2019 13:39:07 -0700
02-python Study Day 2
Today, I learned the following aspects, although some of them are not comprehensible, I followed the teacher to write the code.
List, tuple operation
String operation
Dictionary operation
Set operation
File operation
Character Coding and Transcoding
Programming exercises
Please close your eyes and write the following program.
Procedu ...
Posted by buildernaut1 on Thu, 10 Oct 2019 06:48:32 -0700
Bit field-isa pointer
I. isa pointer structure
union isa_t
{
isa_t() { }
isa_t(uintptr_t value) : bits(value) { }
Class cls;
uintptr_t bits;
#if SUPPORT_PACKED_ISA
// extra_rc must be the MSB-most field (so it matches carry/overflow flags)
// nonpointer must be the LSB (fixme or get rid of it)
// shiftcls must occupy th ...
Posted by robinhood on Wed, 09 Oct 2019 15:36:21 -0700
Share a git abbreviation script
Share a git abbreviation script
git shorthand command, add linux,mac aliasUsage method: . / gsh [command name] [parameter, optional]
set sets user name and mailbox, 1: name, 2: mailboxinit Sets git Concise Commandgst: Code change status, git statusgd: View current code changes, git diff, git diff Branch 1 branch 2Gam: [gam comment] code submitt ...
Posted by DaveM on Wed, 02 Oct 2019 07:07:21 -0700
Implementing VPC-PEERING with Route Leakage
Experimental topology
Topological specification
The experimental environment is a 16G memory host. The above three virtual machines are run using vmware, and the running system is ubuntu-19.04. The three virtual machines are connected in host-only mode.
spine, leaf1 and leaf2 are all ubuntu-19.04. The FRR program is running on them.
host1, ho ...
Posted by Dodon on Tue, 01 Oct 2019 19:53:33 -0700
MacOS configuration iTerm2,oh-my-zsh,zsh_028
MacOS configuration iTerm2,oh-my-zsh,'zsh'
zsh
Mac Self contained zshterminal
cat /etc/shells
Modify the default terminal of the system to zsh
# Change terminal
chsh -s /bin/zsh
# Verify that the change was successful
echo $SHELL
# /bin/zsh
Install oh-my-zsh
https://github.com/robbyrusse...
install
sh -c "$(curl -fsSL https://raw.githubuse ...
Posted by 0p3n_p0rT on Mon, 30 Sep 2019 07:45:15 -0700
What is Browser Object BOM?
What is BOM?
BOM (Browser Object Model) is a browser object model that provides content-independent objects that interact with browser windows. Because BOM is mainly used to manage the communication between windows, the core object of BOM is window.
Relevant methods (attributes)
Popup
window.alert()
Properties of URL s
// Current HTML URL
locat ...
Posted by bimo on Tue, 24 Sep 2019 03:25:15 -0700
How did I go from analysis to handwriting a Wechat Robot--Login Chapter
I believe you all use Wechat, and also know the existence of the web version of Wechat. Today we are going to talk about how to make a fully automated micro-communication robot by simulating the web version of the micro-communication interface. This is the first part of this practical project, which focuses on how to realize a landing process. ...
Posted by bl00dshooter on Thu, 19 Sep 2019 23:14:46 -0700
[Project Practice] How did I go from analysis to handwriting the login page of a Wechat Robot?
I believe you all use Wechat, and also know the existence of the web version of Wechat. Today we are going to talk about how to make a fully automated micro-communication robot by simulating the web version of the micro-communication interface. This is the first part of the actual combat project, which ...
Posted by porto88 on Thu, 19 Sep 2019 07:03:36 -0700
OVS DPDK VXLAN Tunnel Treatment
Before learning about the implementation of OVS VXLAN, let's review how traditional VTEP devices handle VXLAN messages. As shown in the following figure:
After the vxlan message enters the switch port, the vxlan tunnel is terminated according to the message header information. After the end of the tunnel, overlay mapping is carried out accordi ...
Posted by neilybod on Mon, 09 Sep 2019 21:31:56 -0700