Author: Hu ChengqingMember of aikesheng DBA team, good at fault analysis and performance optimization, personal blog: https://www.jianshu.com/u/a95... , welcome to the discussion.Source: original contribution*It is produced by aikesheng open source community. The original content cannot be used without authorization. For reprint, please contact ...
Added by supergrover1981 on Wed, 09 Mar 2022 09:33:36 +0200
1. What is web API
2. Basic concepts in DOM
2.1 DOM tree (document object type)
3. Get elements and events
3.1. Get elements
? 3.2 events
4. Operation element
4.1. Get / modify the content in the element
4.2. Get / modify attributes in elements
4.3. Get / modify attributes in form elements
4.4. Get and modify style attribut ...
Added by Pudgemeister on Thu, 03 Mar 2022 09:43:42 +0200
This paper mainly uses Wireshark to analyze the process of receiving e-mail by using POP3 protocol, and uses telnet command for simple operation.
1. POP3 introduction
Post Office Protocol (English: Post Office Protocol, abbreviation: pop) is a member of TCP/IP protocol family and is defined by RFC 1939. This protocol is mainly used to suppo ...
Added by benzrf on Fri, 25 Feb 2022 11:35:18 +0200
What is the urllib library
urllib library is Python's built-in HTTP request library, which does not need additional download. It mainly includes the following four modules
urllib.request Request module
urllib.error Exception handling module
urllib.parse url Analysis module
urllib.robotparser robots.txt Analysis module
Added by dmayo2 on Thu, 10 Feb 2022 23:35:27 +0200
In the website, the http request is stateless, that is, when user 1 connects to the server and logs in successfully, when refreshing the website and reconnecting, it still needs to log in again. Different users cannot be identified only through general information. The emergence of cookies is to solve this problem and realize the function of re ...
Added by hyperyoga on Mon, 31 Jan 2022 00:07:11 +0200
https reverse proxy configuration
● the fixed port number of HTTPS is 443, which is different from port 80 of HTTP ● the SSL standard requires the introduction of security certificates, so in nginx In conf, you need to specify the certificate and its corresponding key Others are basically the same as http reverse proxy, but the configuration i ...
Added by elfeste on Thu, 27 Jan 2022 21:05:13 +0200
1 configure SSL
1.1 introduction to SSL
SSL configuration is a scenario we often see in practical applications SSL(Secure Sockets Layer) is a security protocol that provides security and data integrity for forgotten communication. SSL encrypts the network connection in the network transmission layer. SSL protocol is located between TCP/IP ...
Problem solving ideas:
First, we ignore the title of the topic (tree array template), and let's try a new algorithm - blocking.
Blocking is a beautiful violence (by DFT). His core idea is to maintain an interval (length:
Added by tsabar on Thu, 27 Jan 2022 12:41:35 +0200
Nginx reverse proxy service can receive requests on behalf and forward them to other servers set up.
For example, the Nginx server is 100.101.102.103 and the A service is 100.101.102.104. Through the Nginx configuration file, the Nginx server agent can receive the request of A service and then forward it to the A service.
Through SSL certificat ...
Keytool+Tomcat for two-way SSL authentication
1. Introduction to SSL
Reference Blog: Https One-way Authentication and Two-way Authentication SSL(Secure Sockets Layer Secure Sockets Layer) is a protocol (specification) that ensures the security of client-side and server-side communications so that information transmitted during communication i ...
Added by glowball on Wed, 26 Jan 2022 09:50:22 +0200