Basic learning of Python [python programming from introduction to practice reading notes (three in a row)]: django learning notes web project
The website deployed by oneself still has a small sense of achievement. After all, it has stepped on many pits, and its actual combat skills have made some progress.
Website (customized later): https://murmuring-escarpment-91471.herokuapp.com/
Django project: learning notes web page
Establish virtual environment
To use Django, you fi ...
Added by Monadoxin on Mon, 07 Mar 2022 19:12:15 +0200
Front end frame - Vue3
Vue3 quick start
1.Vue3 introduction
September 18, 2020, Vue JS release version 3.0, code: One Piece (pirate king)It took more than 2 years 2600 + submissions,30 + RFC s,600 + PR times,99 contributorstags address on github: https://github.com/vuejs/vue-next/releases/tag/v3.0.0
2. What does vue3 bring
1. Performance improvement
Packa ...
Added by cschotch on Mon, 07 Mar 2022 19:03:53 +0200
Development of WEB template printing program
Transferred from: https://www.cnblogs.com/gzggyy/p/3167208.html
This paper uses the free control Lodop+JavaScript to realize accurate template printing. The client needs to install Lodop printing application. In fact, this scheme is relatively simple. The template design process can be realized by using an htm file, but it still takes some t ...
Added by alexweb on Mon, 07 Mar 2022 19:02:33 +0200
Freemaker generates word templates
Freemaker generates word templates
1, Introduce dependency
<dependency>
<groupId>org.freemarker</groupId>
<artifactId>freemarker</artifactId>
<version>2.3.28</version>
</dependency>
2, Tool class
Note: for the attribute of Configuration configuration, in some cases, the file grammar wil ...
Added by mesh2005 on Mon, 07 Mar 2022 18:53:14 +0200
How to use pfring to accelerate Zeek traffic analysis
brief introduction
zeek
Zeek is an open source network traffic analyzer. Many users use Zeek as a network security monitor (NSM) to support the investigation of suspicious or malicious activities. Zeek also supports various traffic analysis tasks outside the security domain, including performance evaluation and troubleshooting. pfring PF_RING ...
Added by dixondwayne on Mon, 07 Mar 2022 18:42:28 +0200
Shiro study notes
Shiro takes notes, Xiaobai records the learning process, and the boss takes a detour
I What is Shiro
Shiro, like Security, is a Security framework. It can help us realize authentication, authorization, MD5 encryption, caching and other functions.
Shiro has three elements: Subject, Security Manager and Realm.
Subject: the current subject ...
Added by crispytown on Mon, 07 Mar 2022 18:40:45 +0200
[Hbu database] week 6-2 database security grant and recovery
Authorization: Grant and withdrawal
grant
GRANT <jurisdiction>[,<jurisdiction>]...
ON <object type> <Object name>[,<object type> <Object name>]...
TO <user>[,<user>]...
[WITH GRANT OPTION];
The with grant option clause is used to: Users with grant option can continue ...
Added by something on Mon, 07 Mar 2022 18:30:42 +0200
Docker basic management 1
catalogue
1, Docker overview
1.1 introduction to docke
1.2 # reasons for Docker's popularity
1.3. Usage scenarios of Docker
2, The difference between Docker and virtual machine and Openstack
2.1 # the difference between Docker and virtual machine
2.2 # the difference between Docker and Openstack
2.3 the container supports two important ...
Added by andychamberlainuk on Mon, 07 Mar 2022 18:23:28 +0200
Some problems encountered by Java using RXTX
Make your own development and use some packages of rxtx in java to call the c library to communicate with the device. A little experience:
For operations such as library files that need to be imported, a lot of information can be found on the network:
introduce: https://blog.csdn.net/weixin_44613063/article/details/98593433
Adopt rxtxcomm pa ...
Added by adrianl on Mon, 07 Mar 2022 18:16:04 +0200
How to make recv have a little temper?
Hello, I'm brother Tao.
Today, let's talk about the recv function in TCP network programming. As we know, recv is a blocking function. When no data is received, it will wait for the data foolishly.
So, how to make the recv function have a little temper instead of waiting foolishly? The select function can be on top. Next, let's practice and d ...
Added by QuietWhistler on Mon, 07 Mar 2022 18:11:56 +0200