WeChat official account development study (1) -- official account number and server configuration

A new WeChat official account has been applied for. 1. Apply for the account of wechat public platform, and then apply for Tencent cloud recommended by him to do demo 2. After applying for centos host, get the public ip and password. After ssh login, follow the demo prompt 3. Install web.py. wget -c http://webpy.o ...

Posted on Mon, 27 Apr 2020 11:35:03 -0400 by Shaudh

JS SDK + PHP for wechat development to share friends / circle of friends, QQ/QQ space

1, Bind domain name First login WeChat public platform into the "official account settings" function settings to fill in the "JS interface security domain name". 2, Import JS file http://res2.wx.qq.com/open/js/jweixin-1.6.0.js 3, Inject permission validation configuration through config interface Put all the interfaces of JS ...

Posted on Wed, 22 Apr 2020 10:20:40 -0400 by grimz

JS-SDK + PHP developed by WeChat to realize recording, uploading and speech recognition

First look at the effect picture: first record, after the recording is successful, add the recording to the list, click the list to play; after the recording is completed, upload the recording, and then voice recognition.   Official wechat documents https://developers.weixin.qq.com/doc/offiaccount/OA_Web_Apps/JS-SDK.html Implementation process ...

Posted on Fri, 17 Apr 2020 11:41:22 -0400 by broomstick

8.2 introduction to common modules 2: xml,configparser,hashlib

xml: Introduction: contains functions about extensible markup language xml Use: python has three methods to parse XML--SAX,dom, and ElementTree. Because xml technology is backward, we will not introduce sax and DOM here:   xml text: <?xml version="1.0"?> <data> <fruit name="apple"> <color>red</color> ...

Posted on Wed, 15 Apr 2020 14:47:25 -0400 by btrsrinivasarao

13 encryption and decryption algorithms [4]

[10. SHA1 encryption of hash] SHA1 (English: Secure Hash Algorithm 1, Chinese Name: Secure Hash Algorithm 1) is a cryptographic hash function designed by the national security administration of the United States and published as the federal data processing standard (FIPS) by the National Institute of standards and Technology (NIST).SHA-1 ...

Posted on Sun, 05 Apr 2020 18:57:26 -0400 by Lol5916

How to find duplicate files in the system and quickly free disk space?

Whether it's a Windows computer or a Linux computer, there will be more or less many duplicate files left in the process of using. These files will not only occupy our disk, but also drag down our system, so it is necessary to kill these duplicate files. This article will introduce 6 ways to find duplicate files in the system, so that you can q ...

Posted on Tue, 10 Mar 2020 01:08:03 -0400 by cavendano

Python 3 standard library: time clock time

1. Time clock time The time module allows access to multiple types of clocks for different purposes. Standard system calls, such as time (), report the system wall clock time. The monotonic() clock can be used to measure the elapsed time of a long-running process, because even if the system time changes, the clock can not be reversed. For perfo ...

Posted on Mon, 02 Mar 2020 01:53:08 -0500 by jakem

Experiment bar: WEB Writeup of CTF topics

Article directory Let me in. Equivocate Forms Skynet management system Forgot the password Once More Guess Next Session FALSE Experiment bar Web Topic series 3 Let me in. Title Link http://shiyanbar.com/ctf/1848Title Description I believe you can get what you want Hint: you may want to know wha ...

Posted on Mon, 24 Feb 2020 07:22:30 -0500 by vinaip

[redis source code day reading] compressed list (ziplist)

Compressed list Like the author: redis source code, many comments and very detailed. Before looking at the source code of the compressed list, you can first look at the comments at the top of the ziplist.c file to basically understand the data structure design. The compressed list ziplist is a two-wa ...

Posted on Thu, 30 Jan 2020 00:22:05 -0500 by markmax33

Jupyter Notebook remote access configuration

problem Jupyter Notebook is a very easy-to-use gadget, but it can only be accessed locally without configuration. This article references[ Brief book ]The jupyter notebook is configured to realize cross host browser access. Install jupyter notebook conda install jupyter notebook The. Jupyte ...

Posted on Mon, 27 Jan 2020 04:52:52 -0500 by solaris77