UA pool and IP proxy pool use

UA pool: user agent pool -Function: disguise the requests in the project as different types of browser identity as much as possible. -Operation process: 1. Intercept requests in download Middleware 2. Disguise the UA in the intercepted request header information 3. Enable download Middleware in configuration file Code display #Guide b ...

Posted by zymosan on Thu, 31 Oct 2019 17:45:30 -0700

In the Windows security log, a large number of events ID 4625;

Recently, I found a large number of network login failure records (event ID is 4625) in the Windows security log (win10 ﹤ 64 bit), and a large number of Internet IP attempts to log in to my computer in the background. I feel that the company's network is no longer safe, so I can only try my best to protect my computer. Try operation 1: disabl ...

Posted by jana on Wed, 30 Oct 2019 21:42:00 -0700

selenium -- upload file

Foreplay In the process of web automation, the function of uploading files is often needed. selenium can upload files by using send_keys(), but there are great limitations in using send_keys(). Only input tags can be uploaded, and many tags can't be uploaded. Here we use the third-party module pywin32 to simulate uploading files.   actual co ...

Posted by DoD on Tue, 29 Oct 2019 12:52:26 -0700

Python 3 write 360 library crawler

Preface Requirements: search and save 360 Gallery picturesGallery address: 360 Gallery Basic thinking After a simple analysis, it is found that the 360 picture library uses dynamic rendering, and uses pull-down reverse loading of pictures, so there are three common methods to solve the problem, name ...

Posted by rashu.dr on Mon, 28 Oct 2019 09:15:12 -0700

Make way upstairs, RoarCTF2019 Writeup

The author's original Qftm release: https://xz.aliyun.com/t/6576 Misc Sign in problem RoarCTF {check in!!! } Six years of gold There is a section of base64 at the end of the file, which can be seen as a compressed package when decoded to hexadecimal. Password required to open compressed pack ...

Posted by cbesh2 on Sat, 26 Oct 2019 21:44:16 -0700

C language learning course, writing mine sweeping game in C language

The example of this paper shares the specific code of mine clearing game and its optimization in C language for your reference. The specific content is as follows About mine clearance optimization 1. Core idea: two two-dimensional arrays are used for design, one for display and one for layout of ba ...

Posted by DarrenL on Sat, 26 Oct 2019 08:34:26 -0700

The scrape framework crawls the data of the big lotto

github project address: https://github.com/v587xpt/lottery_spider# Last time I did a data crawling of dichroic sphere, in fact, the crawling of the big Lotto is also very simple. You can use request to crawl, but in order to make better progress, the crawling of the big Lotto uses the scratch framework. The operation mechanism of the summary ...

Posted by Cerberus_26 on Sat, 26 Oct 2019 08:31:19 -0700

[daily] basic concepts for beginners to install BIOS and hard disk partition

In the past two days, because of testing in linux, the system of linux was broken first, and then the boot was broken after reinstalling the linux system. In the process of repairing the boot, the win8 system of the machine was damaged. After repairing the boot and reinstalling linux again, linux can access it. After reinstalling the windows sy ...

Posted by dotbands on Sat, 26 Oct 2019 02:47:15 -0700

3D model bevel generation based on HTML5 WebGL

Preface There are not only horizontal faces in 3D scene, but also countless faces in space. So we may place objects on any face. How to determine the faces in space? We know that a face in space can be made up of a point and a normal. The left side of the Demo is the panel. Drag the object from the panel to the 3D scene on the right. Of course ...

Posted by keithh0427 on Thu, 24 Oct 2019 19:50:24 -0700

Requests: HTTP library designed for human

brief introduction Requests is an elegant and easy-to-use HTTP library, built specifically for humans This article focuses on requests 2.x The authors of requests are Kenneth Reitz , to focus on requests3 Development, Kenneth Reitz has requests2 Hand over to PSF (Python Software Foundation) Administration PyPI address: https://pypi.org/project ...

Posted by Chrysanthus on Wed, 23 Oct 2019 14:05:41 -0700