Reverse proxy and load balancing in Apache 2.4

The content of the article is from the official document: http://httpd.apache.org/docs/2.4/howto/reverse_proxy.html Like nginx, Apache httpd provides reverse proxy and load balance. The following modules need to be enabled in the Apache httpd configuration: LoadModule proxy_module modules/mod_proxy.so LoadModule proxy_balancer_module modules/mo ...

Added by vund0 on Sat, 13 Jun 2020 11:05:30 +0300

LAMP builds forum and blog platform

Article catalog What is LAMP Build Forum Build a blog What is LAMP LAMP refers to Linux (operating system) + Apache (HTTP server) + MySQL/MariaDB (database) and PHP (network programming language), which are generally used to build a web application platform. Build Forum 1. First, make sure you ...

Added by V34 on Sat, 13 Jun 2020 08:39:11 +0300

Asynchronous requests in Guzzle

Use Guzzle to make asynchronous requests Guzzle is a PHP HTTP client. It can not only initiate HTTP requests synchronously, but also asynchronously. $client = new Client(); $request = new Request('GET', 'http://www.baidu.com'); $promise = $client->sendAsync($request)->then(function ($response) { echo $response->getBody(); }); // t ...

Added by estan on Thu, 11 Jun 2020 08:41:35 +0300

A summary of using thinkpphp voist multiple loop to output array key value as is

Recently, because of the project, I want to use voist. In this process, there are some small problems, mainly how to output key when voist outputs multiple data circularly. I read a lot of materials on the Internet, but I'm disappointed that most of them are the instructions for pasting and copying the voist label on the Thinkphp manual. In ord ...

Added by JayBlake on Mon, 01 Jun 2020 18:26:55 +0300

PHP and Thinkphp simulated message board to deal with XSS attack (super complete!)

XSS attack principle and protection brief introduction XSS(Cross Site Scripting) is a common way in Web attacks. Through this attack, users can be controlled to do a series of malicious operations, such as stealing, tampering, adding users' data or inducing to phishing sites. Attack principle A common way is to use unfiltered parameters to pass ...

Added by Nothsa on Thu, 28 May 2020 07:50:18 +0300

Eggjs learning notes day 34: eggjs post management login and background permission judgment

1, Login verification. You can't access other pages without login. Judge whether the user has logged in, and use the middleware in the egg. New middleware folder under app, new adminauth.js File, type: var url = require("url"); module.exports = options => { return async function adminauth(ctx, next) { // 1. The user does not log ...

Added by Far Cry on Wed, 20 May 2020 18:13:33 +0300

PHP7 production environment queue Beanstalkd correct use posture

Application scenario Why use it? What's the advantage? This should be put at the beginning to say that only when you know what it is and what it is suitable for, can you better integrate it with your own projects. Where to use it and where to learn it? Learning it doesn't mean learning it doesn't mean we won't. We should usually consider more s ...

Added by arfa on Tue, 19 May 2020 08:46:14 +0300

PHP uses Redis in seven common scenarios

Redis is an open source, network-enabled, memory-based and persistent log, Key-Value database written in the ANSI C language, and provides multilingual API s.   This article focuses on the main scenarios for using Redis with PHP. Simple String Cache Actual $redis->connect('127.0.0.1', 6379); $strCacheKey = 'Test_bihu'; //SET Application ...

Added by chadbobb on Tue, 12 May 2020 09:51:38 +0300

Take a quick look at Nginx

1, Basic knowledge of Nginx 1. What is Nginx? Nginx is an open source, lightweight, high-performance HTTP server and reverse proxy server.It is characterized by less memory and strong concurrency. 2. What does Nginx do? It can be used as an HTTP server to access and publish websites.It can also be used as a reverse proxy server to achieve load ...

Added by marian on Thu, 07 May 2020 14:43:36 +0300

De1ctf 2020 web [hard ﹣ pentest ﹣ 1] character free injection & SYSVOL restore group policy password

Open the source code directly, see that it is a file upload, check the file size and pass a Check() function judgment, and take a look at the Check() function function Check(){ $BlackExts = array("php"); $ext = explode(".", $_FILES["file"]["name"]); $exts = trim(end($ext)); $file_content = file_get_contents($_FILES["file"]["tmp ...

Added by mrjameer on Thu, 07 May 2020 10:23:40 +0300