The construction of virtual host -- Based on domain name, port and IP

Building a virtual host 1. Introduction to virtual host There are three types of virtual hosts commonly used in Enterprises: (1) based on domain name(2) port based(3) IP based Virtual web host Running multiple web sites in the same physical server, each of which does not occupy a real computer independently Types of virtual hosts supported by ...

Posted by wildncrazyath3rt on Wed, 23 Oct 2019 12:29:06 -0700

A record of the experience of writing shell script -- the disaster caused by special characters

This article first appeared in wechat public account "my little bowl soup". You can pay attention to it by scanning the QR code at the end of the article. Welcome to exchange! In the process of redis containerization, it involves extending the cpu, memory and maxmemory value of redis instance vertically. The pod managed by statefull ...

Posted by ORiGIN on Wed, 23 Oct 2019 12:01:05 -0700

Smart file name sorting

Default sorting problem windows sorting In the resource management of Windows, the intelligent sorting function of file names is provided, which can identify the numbers in file names (the number of digits is different), and then compare the number sizes for sorting, as shown in the following figure: Code default sort But in the list sort ...

Posted by lizzardnub on Wed, 23 Oct 2019 10:20:39 -0700

Simple use of Scrapy framework

I. installation dependency #Windows platform 1,pip3 install wheel 3,pip3 install lxml 4,pip3 install pyopenssl 5,pip3 install pywin32 #If not, go to the official website https://sourceforge.net/projects/pywin32/files/pywin32/ 6,pip3 install twisted #If you can't go to the official website: http://www.lfd.uci.edu/~gohlke/pyt ...

Posted by ddrudik on Tue, 22 Oct 2019 09:32:37 -0700

Server out of band management

In daily operation and maintenance, we may receive the equipment handed over by others, but for many reasons, the previous people did not record the relevant server serial number, unset out of band address and user password of out of band management, etc., and the server cannot be shut down for maintenance. Is there any way to obtain relevant ...

Posted by sunnyvatsal on Tue, 22 Oct 2019 00:27:24 -0700

Vuex source reading and analysis

I. how Vuex is injected into Vue Mount $store to the prototype chain of vue when beforeCreate is executed. let Vue; function install(vm,storeName='$store'){ Vue = vm; Vue.mixin({ beforeCreate() { if(this.$options.store){ //Mount $store to Vue's prototype Vue.prototype[storeName] = thi ...

Posted by igoy on Mon, 21 Oct 2019 21:44:32 -0700

Reptile crack know how login (do not use Selenium module)

I. analysis. Zhihu completes the steps of login Get cookies first (if you don't get the subsequent verification code, you can't get them) Get verification code Submit login related content The first two steps are simple and a little careful. The most difficult part is the third step. The front-end is js encrypted. There's no trick because the ...

Posted by kaveman50 on Mon, 21 Oct 2019 02:01:40 -0700

GUI - Notepad project

Notepad project development """ Developing Notepad software """ # -*- coding: utf-8 -*- from tkinter import * from tkinter.colorchooser import * from tkinter.filedialog import * from tkinter.messagebox import * class Application(Frame): def __init__(self,master=None): super().__init__(mas ...

Posted by phphunger on Sat, 19 Oct 2019 10:35:09 -0700

c++ pipe for parent-child process communication

1. pipe programming process of parent-child process communication -Create pipe -Set the output of the process to the pipeline -Create process -Close pipeline write handle -Read the pipeline read handle, read the data into a buffer 2. Precautions -When reading the pipeline data, be sure to close the write handle; -When a parent-child pro ...

Posted by GoNz0 on Sat, 19 Oct 2019 07:30:30 -0700

WebStorm permanent solution

WebStorm permanent solution Recently, jetbrains company has been updating its software very fast, and many private built server services have also failed. Now a method that can be cracked permanently is very simple, which only needs 2 steps to complete. Step 1: copy the activation code below and pas ...

Posted by VooDooRT on Fri, 18 Oct 2019 14:24:29 -0700