Posts

  • 07 Nov 2016

    The second-generation ID card has an inherent factor algorithm, which is based on "citizen identity number" (GB11643-1999), we can build our identity verification algorithm to national standards People's Republic of China in accordance with this standard

  • How app secure communications 07 Nov 2016

                       ...

  • PHP-depth assignment behavior 27 Oct 2016

  • mysqli in php and mysql difference 27 Oct 2016

    First, the concept of mysql and mysqli Related:

  • Problems encountered in the process of configuration jekyll! 27 Oct 2016

           There have been some problems during yesterday jekyll configuration in Windows in this blog to write an article for the summary.

  • Id from session to session and the cookie 26 Oct 2015

    A, Session

  • Welcome to the strange transfiguration doctors! 26 Oct 2015

    You will find posts folder named _posts.

  • Welcome to the strange transfiguration doctors! 26 Oct 2015

  • Multi-user login restrictions 26 Oct 2015

    Download: login_limit Reference: java web project to prevent duplicate multi-user sign-on solutions recently got nothing to do, but it's that old idle mind is not practical, it will always find something to Dry ah, ah the good times can not be wasted, and thus be stroked stroke usually some common problems encountered in the work, first of all think of the multi-user login restrictions, the following will explain this issue to do a little thinking. 1, the design scene 1) more than the same time does not allow a user to log 2) A user is logged in, the log in from now at B is allowed, but will be squeezed out at A (taking into account the user is logged at A ran for certain cases at B, but would like to continue previous work, it is necessary to log into the system). 3) at the rear squeezed B a, a do other operations when the system will prompt the user logs elsewhere, I could not operate as a password leak, please change your password. 2, when the idea of ​​mapping each user login, usually we will store user information in session, so that when the user operates the system easy to get basic information about the user. But this session have privacy, only the current visible to the user (if you agree to get different users in different browsers login session will, which is why the root cause may be multi-user login lies). So then the question becomes, how, when a user logs on to know if they are online, I believe that smart you have thought, this is not a good half of the online user information is stored in a public place where the problem is not solved yet , a search online, solutions second to none, roughly two ...

  • Welcome to the strange transfiguration doctors! 26 Oct 2015

  • Automatic countdown Code 26 Oct 2015

    <div id="divdown1" class="time"></div> <script> ` var interval = 1; function...

  • PHP Array functions classified 26 Oct 2015

    First, the basic function array operation 1, keys and values ​​array array_values ​​($ arr); a value obtained array array_keys ($ arr); get an array of keys array_flip ($ arr); array values ​​and keys interchangeably (If there will be covered later repeating the previous) in_array ( "apple", $ arr); retrieving the array applearray_search ( "apple", $ arr); retrieving apple in the array, if present, returns the key array_key_exists ( " apple ", $ arr); retrieving a given key name exists array isset ($ arr [apple]): retrieving a given key name is present in the array 2, the internal pointer current array ($ ARR); returns an array pos in the current unit ($ arr); returns the current unit array key ($ arr); returns an array of keys currently prev ($ arr) units; internal array pointer in rewind the next ($ arr ); internal array pointer is moved forward one end ($ arr); internal array pointer pointing to the last cell in the reset ($ arr; the internal pointers point to the first array Yuan each ($ arr); ...

  • In-depth understanding of HTML5 tags 26 Oct 2015

    0. HTML5 most valued concept "semantic" HTML What is the difference compared to?

  • PHP optimization chowder 26 Oct 2015

  • memcached and redis difference of 26 Oct 2015

  • Internet company's technology system 26 Oct 2015

     The Internet is a more clear and limited range of concepts. Thus, Internet technology is relatively limited, the Internet company's technology system is also limited. Stand higher point of view, it will "then the point of technology." But, now we are still small. o ()︿)) o For Internet company's technology system, I have the following knowledge, for reference purposes only. This article just want to express a point of view: the Internet company's technology system is relatively clear, most companies would "draw a small circle big circle" in. First layer: a terminal device terminal device, the tool is directly operated by the user, including hardware, operating system, application of three parts. There are five common: 1, PC client hardware (desktop + notebook) + operating system (Windows, Linux, iOS) + local application (QQ, cool music box, the proper way cloud notes) 2, PC hardware browser (desktop + notebook) + operating system (Windows, Linux, iOS) + browser (IE, 360, QQ, Chrome) 3, mobile client hardware (phone + tablet) + operating system (Windows, Android, iOS) + local applications (micro-channel App, Jingdong financial App, Alipay App) 4, mobile browser ...

  • PHP core storage mechanism (separation / change) (switch) 26 is On Oct, 2015

  • Welcome to the strange transfiguration doctors! 26 Oct 2015

  • PHP-depth references 26 Oct 2015

  • PHP variable-depth storage structure (turn) 26 Oct 2015

  • MySQL database sql syntax from time to time update 20 Aug 2015

    // common query format

Original: Big Box  Posts


Guess you like

Origin www.cnblogs.com/petewell/p/11606975.html