Words written in the front
It's still a process of learning from the past and learning from the past. In addition, I hope I can finish the problem of more than 100 people in the advanced area earlier. Come on! (2020.6.2).
Ah, the questions in the advanced area often change. The previous questions may ...
Posted on Thu, 25 Jun 2020 00:18:12 -0400 by knnakai
First of all, I'm not a professional in cryptography. I don't have the knowledge base in this area. This blog and the next blog are all based on the materials and blogs I can find on the Internet. I've explored and summed them up a little bit. I asked many predecessors and bloggers, but I didn't see ...
Posted on Wed, 24 Jun 2020 00:00:29 -0400 by Xyox
A brief introduction to the algorithm
The algorithm is also called hash algorithm and hash algorithm. It uses a function to convert any length of data into a fixed length data string (usually represented by a hexadecimal string). Python's hashlib provides common summary algorithms, such as MD5, SHA1, SHA512, and so on.
Tips: It should be n ...
Posted on Mon, 08 Jun 2020 00:36:46 -0400 by Phpdiot
Recently, I found it interesting to see the development documentation of WeChat Public Number. You can customize the development of some functions, such as making a slightly more complex response after someone has paid attention to the Public Number (simple replies are configurable in the Public Number background). For example, if a follower se ...
Posted on Sat, 06 Jun 2020 12:26:11 -0400 by ry4n0wnz
A new WeChat official account has been applied for.
1. Apply for the account of wechat public platform, and then apply for Tencent cloud recommended by him to do demo
2. After applying for centos host, get the public ip and password. After ssh login, follow the demo prompt
3. Install web.py.
wget -c http://webpy.o ...
Posted on Mon, 27 Apr 2020 11:35:03 -0400 by Shaudh
1, Bind domain name
First login WeChat public platform into the "official account settings" function settings to fill in the "JS interface security domain name".
2, Import JS file
3, Inject permission validation configuration through config interface
Put all the interfaces of JS ...
Posted on Wed, 22 Apr 2020 10:20:40 -0400 by grimz
First look at the effect picture: first record, after the recording is successful, add the recording to the list, click the list to play; after the recording is completed, upload the recording, and then voice recognition.
Official wechat documents https://developers.weixin.qq.com/doc/offiaccount/OA_Web_Apps/JS-SDK.html
Implementation process ...
Posted on Fri, 17 Apr 2020 11:41:22 -0400 by broomstick
xml: Introduction: contains functions about extensible markup language xml Use: python has three methods to parse XML--SAX,dom, and ElementTree. Because xml technology is backward, we will not introduce sax and DOM here:
xml text: <?xml version="1.0"?>
Posted on Wed, 15 Apr 2020 14:47:25 -0400 by btrsrinivasarao
[10. SHA1 encryption of hash]
SHA1 (English: Secure Hash Algorithm 1, Chinese Name: Secure Hash Algorithm 1) is a cryptographic hash function designed by the national security administration of the United States and published as the federal data processing standard (FIPS) by the National Institute of standards and Technology (NIST).SHA-1 ...
Posted on Sun, 05 Apr 2020 18:57:26 -0400 by Lol5916
Whether it's a Windows computer or a Linux computer, there will be more or less many duplicate files left in the process of using. These files will not only occupy our disk, but also drag down our system, so it is necessary to kill these duplicate files.
This article will introduce 6 ways to find duplicate files in the system, so that you can q ...
Posted on Tue, 10 Mar 2020 01:08:03 -0400 by cavendano