Refuse idle work, encapsulate a generic opupWindow

https://juejin.im/post/5961e03e51882568b13c3308 In order to avoid repeating wheels, we usually encapsulate a common control. For example, this time, we need to use more popup windows in the project. If we need to write one by one, it will still be exhausting, and it is useless and meaningless. So, encapsulating a universal control saves u ...

Posted by SN1P3R_85 on Fri, 14 Jun 2019 13:10:55 -0700

Bridge Mode of Design Patterns

Functional Hierarchy of Classes Class Implementation Level Specific examples of bridging modes Summary Bridge means bridge. Its function is to connect two sides. The function of bridge mode is also the same. Bridge mode is connected by function level and implementation level of each class. There are two words that may be a little strange, the ...

Posted by desmond_ckl on Thu, 13 Jun 2019 16:24:20 -0700

Summary of the Use of Android Display Time and Date Controls

Cognition of related categories Picker(DatePicker,TimerPicker,NumberPicker) DatePicker and TimerPicker both display dates and times in the form of windows, and then return data. The following sections introduce the use of these time classes. I. Use of DatePicker Date Selection Class Common XML attributes of DatePicker XML attributes ...

Posted by jemrys on Thu, 13 Jun 2019 14:42:10 -0700

Tengine 2.2.0 Compilation, Installation, Boot-up, Reverse Agent Configuration and Health Check

Tengine 2.2.0 Compilation, Installation, Boot-up, Reverse Agent Configuration and Health Check tengine is an open source project based on nginx initiated by taobao. nginx throughput is relatively high, fast and stable, and reverse proxy and load balancing using nginx is the most common. This article describes how to compile and install under ...

Posted by LoganK on Thu, 13 Jun 2019 13:42:14 -0700

Summary of python standard library Beautiful Soup and MongoDb crawling Himalayan radio stations

The Beautiful Soup Standard Library is a Python library that extracts data from HTML/XML files. It enables you to navigate, find, and modify documents in your favorite converter, saving hours of work.The pymongo standard library is the bridge between the MongoDb NoSql database and the python language, through which data is saved to MongoDb.Use ...

Posted by daveyc on Thu, 13 Jun 2019 09:02:35 -0700

Configuration of Lightweight c Language Development Environment under win: vsc + gcc

Explain VSCode is an editor. By default, it does not have a compiler and debugging environment. It needs to install the compiler by itself. Debugging can be done with its plug-in. The compiler suite is based on TDM-GCC, which is easy to use. (Codeblocks, Dev-Cpp and other default bands are this one). Paths are automatically added to the environ ...

Posted by realtek on Wed, 12 Jun 2019 16:58:22 -0700

java HttpClient+Jsoup Build Irrigation Utilities No longer Afraid Fire

Why can't 80% of yard farmers be architects? >    I don't know how long ago, there was a small software that wrote an automatic rep ...

Posted by justbane on Wed, 12 Jun 2019 15:47:18 -0700

this of javaScript points to summary (original)

In javascript, the direction of this has always been the headache of front-end colleagues and the first choice of interview questions. Now let's summarize the direction of this in js. First, we need to understand several concepts: 1: Global variables are mounted by default under Windows objects2: In general, this points to its callerIn the arro ...

Posted by miracle_potential on Tue, 11 Jun 2019 14:27:49 -0700

Python Reptiles

Yesterday, a student asked me about the crawler and said that the xpath grammar had no data. It may be that something else is wrong, not the xpath grammar. We need to learn to find the cause of the error. Print the content of the request to see if there is any data you want. If not, is the request wrong? Does the request succeed with asynchron ...

Posted by Vince889 on Mon, 10 Jun 2019 12:26:04 -0700

LNK File (Shortcut) Remote Code Execution Vulnerability Reproduction Process (CVE-2017-8464)

Vulnerability number: CVE-2017-8464 Vulnerability Level: Serious Vulnerability profile: If a user opens a malicious LNK file carefully constructed by an attacker, it will cause remote code execution. An attacker who successfully exploits this vulnerability can gain the same user privileges as a local user. Attackers can spread malicious LNK fil ...

Posted by bogdan on Sun, 09 Jun 2019 16:24:29 -0700