Linux system deployment ThinkPHP5+Workerman project

I wrote an article a while ago PHP obtains the K-line data of fire currency through URL and WebSocket , the development and debugging of this project are completed under the Windows platform, and have not been run under the linux platform, so today we will start from scratch to deploy the corresponding ...

Posted on Wed, 17 Jun 2020 23:39:32 -0400 by jmarcv

How to implement a composer package of your own

Preface For small development partners, code packages are a common part of the development process.For example, PHP has composer, Java has maven, front-end has npm, yarn, Mac has brew, Linux has yum.Using these packages, we can easily manage the external code components introduced by the code, help us to improve development efficiency, and help ...

Posted on Wed, 17 Jun 2020 12:44:53 -0400 by paul_20k

Implementation of JAVA Query Based on ipv6 Static Data File of zxinc Website

Recently there is a need to resolve ipv6 addresses. Because of the large amount of data, it is not possible to request a pre-used http query interface. This will certainly seriously affect use, so we found it when searching on the web zxinc This website provides offline files for query, and then downloads the latest offline ipv6 data. There are ...

Posted on Wed, 17 Jun 2020 12:29:31 -0400 by MasumX

How to create your own composer code package

Preface For small development partners, code packages are a common part of the development process.For example, PHP has composer, Java has maven, front-end has npm, yarn, Mac has brew, Linux has yum.Using these packages, we can easily manage the external code components introduced by the code, help us to improve development efficiency, and help ...

Posted on Wed, 17 Jun 2020 12:08:05 -0400 by mark_nsx

Inversion of control (IOC) and dependency injection (DI)

concept I understand that IOC and DI are JAVA concepts in the early stage, which are not accepted by the PHP industry for a long time, because the concept of PHP is simple and efficient, but the long-term development makes PHP have to go this way for engineering specifications and development decoupling. Laraval framework brings the concept of ...

Posted on Wed, 17 Jun 2020 00:46:27 -0400 by david212

Graphviz installation and introduction under windows

Download installation configuration environment variable intall Configure environment variables verification Introduction to basic drawing graph digraph A complex example Interact with python Finding good tools is like finding a new continent. Sometimes, we will be curious about how to make ...

Posted on Tue, 16 Jun 2020 22:40:56 -0400 by kellydigital

Factory method pattern of PHP design pattern

Last time, the simple factory doesn't belong to the twenty-three design modes of GoF. This time, it's the real guy. The famous factory method mode comes to report! GoF class diagram explanation Compared with simple factories, the core of factory method pattern is to postpone the implementation to subc ...

Posted on Mon, 15 Jun 2020 02:36:33 -0400 by kucing

Scanning of Web Penetration

Detection Tool-httrack Reduce interaction with goals install apt-get install httrack Usage method httrack # Enter the usage page Enter project name : dvwa # Give the website a name to mirror Base path (return=/root/websites/) :/root/Desktop/image/dvwa # Enter a save address Enter URLs (sepa ...

Posted on Sun, 14 Jun 2020 22:05:11 -0400 by scoppc

C + + Course Design (address book program)

preface I'm only a general sophomore. I come here to write my opinions. I hope you can give me some advice. We sincerely invite people with lofty ideals from all over the world to join our code learning group exchange: 8713 Five 2155 (whether you can use C/C + + or Java, Python or PHP... If you are ...

Posted on Sun, 14 Jun 2020 05:06:10 -0400 by FrankHarley

Laravel uses laravel Google authenticator to develop a dynamic mobile token for your website through Google authenticator

Google authenticator, in combination with two-step authentication, can provide you with a second level of security when you log in to your Google account. After enabling two-step authentication, you need to provide a password and the authentication code generated by this app when you log in to your a ...

Posted on Fri, 12 Jun 2020 05:25:07 -0400 by gabeanderson