Basic learning of Python [python programming from introduction to practice reading notes (three in a row)]: django learning notes web project

The website deployed by oneself still has a small sense of achievement. After all, it has stepped on many pits, and its actual combat skills have made some progress. Website (customized later): https://murmuring-escarpment-91471.herokuapp.com/ Django project: learning notes web page Establish virtual environment To use Django, you fi ...

Added by Monadoxin on Mon, 07 Mar 2022 19:12:15 +0200

Front end frame - Vue3

Vue3 quick start 1.Vue3 introduction September 18, 2020, Vue JS release version 3.0, code: One Piece (pirate king)It took more than 2 years 2600 + submissions,30 + RFC s,600 + PR times,99 contributorstags address on github: https://github.com/vuejs/vue-next/releases/tag/v3.0.0 2. What does vue3 bring 1. Performance improvement Packa ...

Added by cschotch on Mon, 07 Mar 2022 19:03:53 +0200

Development of WEB template printing program

Transferred from: https://www.cnblogs.com/gzggyy/p/3167208.html This paper uses the free control Lodop+JavaScript to realize accurate template printing. The client needs to install Lodop printing application. In fact, this scheme is relatively simple. The template design process can be realized by using an htm file, but it still takes some t ...

Added by alexweb on Mon, 07 Mar 2022 19:02:33 +0200

Freemaker generates word templates

Freemaker generates word templates 1, Introduce dependency <dependency> <groupId>org.freemarker</groupId> <artifactId>freemarker</artifactId> <version>2.3.28</version> </dependency> 2, Tool class Note: for the attribute of Configuration configuration, in some cases, the file grammar wil ...

Added by mesh2005 on Mon, 07 Mar 2022 18:53:14 +0200

How to use pfring to accelerate Zeek traffic analysis

brief introduction zeek Zeek is an open source network traffic analyzer. Many users use Zeek as a network security monitor (NSM) to support the investigation of suspicious or malicious activities. Zeek also supports various traffic analysis tasks outside the security domain, including performance evaluation and troubleshooting. pfring PF_RING ...

Added by dixondwayne on Mon, 07 Mar 2022 18:42:28 +0200

Shiro study notes

Shiro takes notes, Xiaobai records the learning process, and the boss takes a detour I What is Shiro Shiro, like Security, is a Security framework. It can help us realize authentication, authorization, MD5 encryption, caching and other functions. Shiro has three elements: Subject, Security Manager and Realm. Subject: the current subject ...

Added by crispytown on Mon, 07 Mar 2022 18:40:45 +0200

[Hbu database] week 6-2 database security grant and recovery

Authorization: Grant and withdrawal grant GRANT <jurisdiction>[,<jurisdiction>]... ON <object type> <Object name>[,<object type> <Object name>]... TO <user>[,<user>]... [WITH GRANT OPTION]; The with grant option clause is used to: Users with grant option can continue ...

Added by something on Mon, 07 Mar 2022 18:30:42 +0200

Docker basic management 1

catalogue 1, Docker overview 1.1 introduction to docke 1.2 # reasons for Docker's popularity 1.3. Usage scenarios of Docker 2, The difference between Docker and virtual machine and Openstack 2.1 # the difference between Docker and virtual machine 2.2 # the difference between Docker and Openstack 2.3 the container supports two important ...

Added by andychamberlainuk on Mon, 07 Mar 2022 18:23:28 +0200

Some problems encountered by Java using RXTX

Make your own development and use some packages of rxtx in java to call the c library to communicate with the device. A little experience: For operations such as library files that need to be imported, a lot of information can be found on the network: introduce: https://blog.csdn.net/weixin_44613063/article/details/98593433 Adopt rxtxcomm pa ...

Added by adrianl on Mon, 07 Mar 2022 18:16:04 +0200

How to make recv have a little temper?

Hello, I'm brother Tao. Today, let's talk about the recv function in TCP network programming. As we know, recv is a blocking function. When no data is received, it will wait for the data foolishly. So, how to make the recv function have a little temper instead of waiting foolishly? The select function can be on top. Next, let's practice and d ...

Added by QuietWhistler on Mon, 07 Mar 2022 18:11:56 +0200