Network security is very important, especially to ensure data security. Many programmers who are writing interfaces transmit data directly in plaintext, which seems to me to be very unprofessional. I advocate that the data through the interface should be encrypted and decrypted before use.
This article mainly introduces the use of PHP developm ...
Posted by Jeller on Mon, 17 Jun 2019 16:23:03 -0700
Problems encountered in cryptographic encryption
Today we encounter the problem of md5 encryption. At that time, we used "thinkphp 5.0.9-> model - > data completion" to realize automatic encryption. But in the above "thinkphp 5.0.9-> model - > modifier", we found that the modifier and data completion function are ...
Posted by joePHP on Mon, 17 Jun 2019 15:20:51 -0700
Last blog we installed centos7 on a virtual machine, so let's start installing the lnmp environment.
As before, switch to root privileges using the su command after entering the command line.
Configure the firewall first
CentOS 7.0 uses firewall as a firewall by default
1. Turn off firewall:
systemctl stop firewalld.service #Stop firewall ...
Posted by saandel on Mon, 17 Jun 2019 11:48:29 -0700
Hydra's Violent Password Cracking Tool is quite powerful, supporting online password cracking for almost all protocols. Whether the password can be cracked or not depends on whether the dictionary is strong enough for social engineering penetration to sometimes achieve twice the result with half the effort.This article onl ...
Posted by zardiw on Mon, 17 Jun 2019 11:04:39 -0700
I got a Nginx service monitor the other day, and I'll try php service monitor again today.Operating System: CentOS 7.2 PHP Version: 5.6.30zabbix version: 2.2.5We found that php-fpm, like Nginx, has its own status page that can be viewed, so we can open it in the configuration file.First check if your php profile has enabled status page vie ...
Posted by reyes99 on Sun, 16 Jun 2019 15:48:38 -0700
Offline algorithm-CDQ divide and conquer
CDQ (SHY) is obviously a person's name, Chen Danqi (MM) (NOI 2008 gold medalist).
Start with merging (instead of reverse-order pairs, we want to introduce divide-and-conquer ideas directly instead of processing objects)
A very simple merge sort: a disorderly sequence, each time it is folded ...
Posted by Buglish on Sun, 16 Jun 2019 10:58:20 -0700
Large O Complexity Representation
Common ones are O(1), O(n), O(logn), O(n logn)
In addition to the large O representation, time complexity can be described in the following cases
Best case time complexity
Worst Case Time Complexity
Average case time complexity
Allocation time complexity
Code Execution Efficiency Analysis
Posted by fearfx on Sun, 16 Jun 2019 10:02:35 -0700
Last time I wrote Experience in the Use of Qiniu Picture Upload [PHP] The main point is how the back end generates Token for the front end
In fact, uploading pictures, the back-end is relatively simple, because the use of third-party is to reduce the pressure on the back-end, the front-end is relatively complex.
You may need to implement some ...
Posted by stuckwithcode on Sat, 15 Jun 2019 11:56:27 -0700
It's very late at night, so I'll make a long story short.
Links: https://ac.nowcoder.com/acm/contest/917/CSource: Niuke.com
The first row contains two integers n,QOne string per line in the last n rowsThe last Q line represents one operation per line:One operation: 1 sSecond operation: 2
Output description: ...
Posted by Incredinot on Fri, 14 Jun 2019 11:33:09 -0700
PHP Extension Development Articles, I have updated to< TIPI>
Before reading the following, let's assume that you are right. PHP 7 Basic Data Structure They all have a general understanding, which is the premise of reading the following content.We are divided into two parts:Firstly, it implements a custom file operation expansion of openin ...
Posted by hthighway on Thu, 13 Jun 2019 18:23:43 -0700