Python 3 uses in to read the text from the file after opening the file

  First, under python, open the file, which is an iterator object, so you can get it through in <class '_io.TextIOWrapper'> Note: the txt file I use here is a json file Here you can view it through the following code: import json path= r"E:\tf_project\utilize python Conduct data analysis--data\ch02\usagov_bitly_data ...

Added by disconne on Mon, 23 Dec 2019 00:44:08 +0200

Install and configure Nginx under CentOS 7 to support pseudo static (including all codes)

Install and configure Nginx under CentOS 7 to support pseudo static It is a difficult problem for novices to install and configure Nginx under Linux to support pseudo-static state. They often encounter 404 and other errors. Configuration and debugging is a waste of time. Sometimes they feel that they can't start. Online materi ...

Added by fragger on Sun, 22 Dec 2019 17:31:22 +0200

docker deployment LNMP environment

The first step is to confirm that there are tar packages needed in your environment, and you can use [docker pull]() to download these images Now we're using a downloaded image, so we need to import it [root@docker01 ~]# docker load -i nginx.tar && docker load -i wordpress.tar && docker load -i mysql-5.7.tar && docke ...

Added by Havery Jay on Fri, 20 Dec 2019 22:21:35 +0200

WordPress is unable to update the solution

When WordPress installs plug-ins or updates, it will prompt that the directory creation fails Enter the WordPress working directory, use the ls-l command to view the file details in the WordPress working directory, and you can see the working group. [root@host wordpress]# ls -l total 196 -rw-r--r-- 1 root root 418 Oct 9 10:3 ...

Added by forzatio on Wed, 18 Dec 2019 17:28:28 +0200

Display the system logs in the database through the log analyzer

catalog Displaying logs in database through log analyzer Environmental preparation Prepare server: Log server: Database server: Test whether the log server and database are connected: websrv server: Displaying logs in database through log analyzer Environmental ...

Added by blkrt10 on Tue, 17 Dec 2019 15:43:39 +0200

PHP for a simple data collection

Introduction When it comes to data collection, python comes to mind first. The code is simple, efficient and easy to implement. How does PHP implement data collection?It's simple. concept What is data collection?Below is the introduction of Baidu Encyclopedia: Data collection, also known as Data Acquisition Is an interface that uses a device to ...

Added by agnalleo on Sun, 15 Dec 2019 08:00:42 +0200

How to solve the problem of OpenSSL? Pkey? Export(): cannot get key from parameter 1 in windows system

In order to solve this problem, I Baidu many methods, but many methods have no effect. Method 1: If you are installing phpstudy, then 1. You need to go to php extension to open the extension. 2. Go to php.ini and remove the ";" before "extension=php_openssl.dll". If not, add extension=php_openssl.dll. 3. Copy libeay32.dll ...

Added by Aretai on Sat, 14 Dec 2019 17:33:49 +0200

Laravel Composer automatic loading mechanism

outline PHP autoloading function 1.1 Origin of PHP autoloading function 1.2 PHP autoload function u autoload() Problems with 1.3 u autoload() Function 1.4 SPL Autoload PSR Specification The automatic loading process of comoposer composer source analysis 4.1 Startup 4.2 Composer autoload file 1, PHP autoloading function 1.1 Origin o ...

Added by Dolemite50 on Sat, 14 Dec 2019 10:54:58 +0200

Challenge the routine -- why shouldn't Jsonp be used for cross domain

General cross domain approach Common cross domain methods include: Add access control allow origin Background server agent Jsonp 1. 2. Both methods are safe and reliable. 3. They are not safe and reliable The essence of Json The essence of Json is to reference and execute external JavaScript script. The principle is that the < script > ...

Added by txhoyt on Thu, 12 Dec 2019 21:37:27 +0200

PHP DES-ECB encryption docking Java decryption

Recently, the company has a business that needs to connect to the third-party interface, but the parameters need to be encrypted. The other side only provides a java demo and searches all over the Internet. No direct method can be found. Later, it was connected with the company's Android Engineer. Here's a record of the general process. First, ...

Added by tcorbeil on Wed, 11 Dec 2019 23:00:29 +0200