DHCP for network services
principle
1. Dynamic Host Configuration Protocol, application layer protocol, using udp ports 67 and 68, 2. Advantages: reduce the work of administrators, avoid errors and avoid ip conflicts. When changing the ip address segment, there is no need to reconfigure each user's ip address and improve ip utilization 3. Allocation method: automatic a ...
Added by rowman on Thu, 10 Feb 2022 23:53:48 +0200
How to use Spring and rabbit MQ to create a simple publish and subscribe application?
Original title: Spring certified China Education Management Center - learn how to use spring and rabbit MQ to create a simple publish and subscribe application. (content source: Spring China Education Management Center)This guide will guide you through the process of setting up a RabbitMQ AMQP server that publishes and subscribes to messages an ...
Added by ScotDiddle on Thu, 10 Feb 2022 23:47:48 +0200
03 Linux file management (directory)
1. Overview of document management
1.Bash Shell manages files
When it comes to Linux file management, the first thing we need to know is, what should we do with files? In fact, it is nothing more than to, create, copy, move, view, edit, compress, find, delete, and so on For example, when we want to modify the host name of the system, should w ...
Added by codeDV on Thu, 10 Feb 2022 23:43:59 +0200
Vue note 2: basic grammar
Vue note 2: basic grammar
1. Interpolation (dynamic content)
Mustache syntax (double braces)
Insert the text data in data into HTML. At this time, the data is responsive.
<span>Message: {{ msg }}</span>
<span>{{firstName}}{{lastName}}</span>
<span>{{firstName+lastName}}</span>
<span>{{firstName+ ...
Added by ckehrer on Thu, 10 Feb 2022 23:41:24 +0200
python redis tutorial
1. Install redis module package in Python
pip install redis
2. Connect Python to redis
Redis provides two classes: redis and StrictRedis. StrictRedis is used to implement most official commands. Redis is a subclass of StrictRedis, which is used to use the old version backward. The result retrieved by redis defaults to bytes. We can set deco ...
Added by landung on Thu, 10 Feb 2022 23:37:20 +0200
Detailed explanation of 10000 words in urllib Library
What is the urllib library
urllib library is Python's built-in HTTP request library, which does not need additional download. It mainly includes the following four modules
urllib.request Request module
urllib.error Exception handling module
urllib.parse url Analysis module
urllib.robotparser robots.txt Analysis module
urlli ...
Added by dmayo2 on Thu, 10 Feb 2022 23:35:27 +0200
Wechat applet supports Google statistics
use:
Add ga.js file in wechat applet project.In the background of wechat applet, put www.google-analytics COM is added to the request legal domain name.Modify app js. var ga = require('./ga.js')
var GoogleAnalytics = ga.GoogleAnalytics;
APP({
// tracker
tracker: null,
// Create tracker
getTracker: function () {
if (!this.t ...
Added by JeBu on Thu, 10 Feb 2022 23:35:33 +0200
springbootCache and Redis caching mechanism
brief introduction
I want to develop a social networking site. Storing friends list on social networking sites has become a big problem in the development process.
If I want to save every user's friend information, how should I save it?
The user's id corresponds to the friend's id. such a message is a friend relationship map. This relati ...
Added by Magena Cadmar on Thu, 10 Feb 2022 23:32:20 +0200
[note] don't bother PYTHON | Tensorflow tutorial - high level content (Chapter 5)
5.1 Classification learning
The qualitative output of Classification problem is Classification, or discrete variable prediction. Regression problem, the quantitative output is regression, or continuous variable prediction.
"""
Please note, this code is only for python 3+. If you are using python 2+, please modify the code accordingly.
"""
f ...
Added by sdyates2001 on Thu, 10 Feb 2022 23:21:41 +0200
[npuctf2020] ezlogin XPath injection learning
[npuctf2020] ezlogin XPath injection learning After entering this question, there is a simple login page. I took the imperial sword and didn't sweep out anything else. I tried a simple sql injection and didn't show any echo. If it exploded, he had a token that was refreshing all the time, so it would be a little troublesome. I shouldn't take t ...
Added by Nexy on Thu, 10 Feb 2022 23:17:39 +0200