Python+ITchart to realize wechat robot's automatic reply to specified friends and groups
Here I mainly use three robots, which can be switched.
1. Turing robot
http://www.tuling123.com
2. The Turing robot on showapi (feels the most intelligent, can recognize wechat expressions, English, Chinese, etc., but because I am an ordinary member, I call it 1000 times a day)
https://www.showapi.com/api/lookPoint/60
3. Molly r ...
Added by iBlizz on Fri, 06 Dec 2019 00:26:08 +0200
PHP+Ajax implementation of article mood voting function example
A PHP+Ajax implementation of article mood voting function example, you can learn to understand the basic process of voting: get mood icon and histogram related data through Ajax, when the user clicks one of the mood icons, send a request to Ajax.php, PHP verifies that the user cookie prevents repeated submission, then adds 1 to the correspondin ...
Added by bluebyyou on Thu, 05 Dec 2019 16:40:49 +0200
Sass / SCSS swiper iscoll REM agax elastic box
I. sass/scss
ruby language
1.scss variable
$w:300px;$h:235px;
.mm{width:$w;height:$h;}
2.sass Nested writing of:
.header{ height:200px;
h1{font-size:18px}
}
II. swiper.js
Wheel planting
1. Load the swiper.min.css style file on the page
2. Load the file swiper.min.js
3. Write html structure
<div class="swiper-contain ...
Added by Genesis730 on Thu, 05 Dec 2019 00:14:21 +0200
QQ authorized login based on php
Step one:
First log in QQ Internet Homepage https://connect.qq.com/ Conduct personal / business certification. The audit time is about one week.
Create an application after the certification:
The APP ID and APP Key parameters of the application are mainly used here.
To fill in the callback address is to request the qq interface to get the cod ...
Added by Phairest on Wed, 04 Dec 2019 22:45:23 +0200
LNMP architecture virtual host configuration, user authentication and domain name redirection
November 26 mission 12.6 Nginx installation
https://my.oschina.net/u/3964535/blog/2933878 12.7 default virtual host 12.8 Nginx user authentication 12.9 Nginx domain name redirection
Configure nginx virtual host
Modify nginx main configuration file
[root@localhost nginx-1.12.2]# vim /usr/local/nginx/conf/nginx.conf
# Delete the origi ...
Added by monotoko on Wed, 04 Dec 2019 21:50:45 +0200
Priority of and or query in MySQL
This may be a problem that is easy to be ignored. First, we need to be clear:In MySQL, AND takes precedence over OR. That is to say, without the limitation of parentheses (), the AND statement is always executed first AND then the OR statement.For example:
select * from table where condition1 and condition2 or condition3
Equivalent to
select ...
Added by Wright on Wed, 04 Dec 2019 03:17:23 +0200
The first step of html login and registration
On the road of web Security~~~
After learning C language and completing course design, HTML (Hypertext Markup Language) is studied. The purpose of learning html is to understand the structure of those web pages, how his head is, and body, etc. ~ ~ although it's very simple, HTML can't be ignored. The most basic syntax and some comm ...
Added by simon13 on Tue, 03 Dec 2019 21:10:51 +0200
Monkey data teaches you to detect whether wechat domain names are blocked in real time
By the end of 2018, the number of wechat users in China has reached 1.04 billion, and the number of wechat sent per day has reached 38 billion. Wechat has become one of the mobile traffic platforms in China. When you browse the links in wechat, you must have "stopped visiting the web page", which means that the promoted domain name ha ...
Added by umbra on Tue, 03 Dec 2019 03:03:49 +0200
TP5 implements Ajax to get the page and render it
It is easy to realize module segmentation of HTML page by using MVC mode of thinkph5, and asynchronous refresh of some pages can be realized by using Ajax technology, so that Web level APP -- main page frame, CSS style, Javascript file, etc. can be loaded only once; according to the actual needs of users, the required files can be ...
Added by mcclellanfsu on Mon, 02 Dec 2019 18:29:41 +0200
Safety design of php interface
Safety design of php interface
The security of the interface is mainly designed around the three mechanisms of Token, Timestamp and ign, which ensure that the data of the interface will not be tampered with and called repeatedly. The following is specific:
(1)Token authorization mechanism: (Token is the credential of the client to access the ...
Added by Opv on Mon, 02 Dec 2019 16:28:56 +0200