Refuse idle work, encapsulate a generic opupWindow
https://juejin.im/post/5961e03e51882568b13c3308
In order to avoid repeating wheels, we usually encapsulate a common control. For example, this time, we need to use more popup windows in the project. If we need to write one by one, it will still be exhausting, and it is useless and meaningless. So, encapsulating a universal control saves u ...
Posted by SN1P3R_85 on Fri, 14 Jun 2019 13:10:55 -0700
Bridge Mode of Design Patterns
Functional Hierarchy of Classes
Class Implementation Level
Specific examples of bridging modes
Summary
Bridge means bridge. Its function is to connect two sides. The function of bridge mode is also the same. Bridge mode is connected by function level and implementation level of each class.
There are two words that may be a little strange, the ...
Posted by desmond_ckl on Thu, 13 Jun 2019 16:24:20 -0700
Summary of the Use of Android Display Time and Date Controls
Cognition of related categories
Picker(DatePicker,TimerPicker,NumberPicker)
DatePicker and TimerPicker both display dates and times in the form of windows, and then return data.
The following sections introduce the use of these time classes.
I. Use of DatePicker Date Selection Class
Common XML attributes of DatePicker
XML attributes
...
Posted by jemrys on Thu, 13 Jun 2019 14:42:10 -0700
Tengine 2.2.0 Compilation, Installation, Boot-up, Reverse Agent Configuration and Health Check
Tengine 2.2.0 Compilation, Installation, Boot-up, Reverse Agent Configuration and Health Check
tengine is an open source project based on nginx initiated by taobao. nginx throughput is relatively high, fast and stable, and reverse proxy and load balancing using nginx is the most common. This article describes how to compile and install under ...
Posted by LoganK on Thu, 13 Jun 2019 13:42:14 -0700
Summary of python standard library Beautiful Soup and MongoDb crawling Himalayan radio stations
The Beautiful Soup Standard Library is a Python library that extracts data from HTML/XML files. It enables you to navigate, find, and modify documents in your favorite converter, saving hours of work.The pymongo standard library is the bridge between the MongoDb NoSql database and the python language, through which data is saved to MongoDb.Use ...
Posted by daveyc on Thu, 13 Jun 2019 09:02:35 -0700
Configuration of Lightweight c Language Development Environment under win: vsc + gcc
Explain
VSCode is an editor. By default, it does not have a compiler and debugging environment. It needs to install the compiler by itself. Debugging can be done with its plug-in.
The compiler suite is based on TDM-GCC, which is easy to use. (Codeblocks, Dev-Cpp and other default bands are this one). Paths are automatically added to the environ ...
Posted by realtek on Wed, 12 Jun 2019 16:58:22 -0700
java HttpClient+Jsoup Build Irrigation Utilities No longer Afraid Fire
Why can't 80% of yard farmers be architects? >
I don't know how long ago, there was a small software that wrote an automatic rep ...
Posted by justbane on Wed, 12 Jun 2019 15:47:18 -0700
this of javaScript points to summary (original)
In javascript, the direction of this has always been the headache of front-end colleagues and the first choice of interview questions. Now let's summarize the direction of this in js. First, we need to understand several concepts:
1: Global variables are mounted by default under Windows objects2: In general, this points to its callerIn the arro ...
Posted by miracle_potential on Tue, 11 Jun 2019 14:27:49 -0700
Python Reptiles
Yesterday, a student asked me about the crawler and said that the xpath grammar had no data. It may be that something else is wrong, not the xpath grammar. We need to learn to find the cause of the error.
Print the content of the request to see if there is any data you want.
If not, is the request wrong?
Does the request succeed with asynchron ...
Posted by Vince889 on Mon, 10 Jun 2019 12:26:04 -0700
LNK File (Shortcut) Remote Code Execution Vulnerability Reproduction Process (CVE-2017-8464)
Vulnerability number: CVE-2017-8464
Vulnerability Level: Serious
Vulnerability profile: If a user opens a malicious LNK file carefully constructed by an attacker, it will cause remote code execution. An attacker who successfully exploits this vulnerability can gain the same user privileges as a local user.
Attackers can spread malicious LNK fil ...
Posted by bogdan on Sun, 09 Jun 2019 16:24:29 -0700