• Mongodb user and permission management


    1、 Common permissions authority explain read Allow users to read the specified database readWrite Allow users to read and write to the specified database userAdmin Allow users to send messages to system Write to the users collection. Users can be created, deleted, and managed in the specified database dbAdmin Allows users to perform management functions […]

  • Uniapp development app summary


    Recently, the company needs to develop apps. As a front-end development, it chose uniapp because it combines Vue and small programs, so it is not difficult to get started. However, because it is the first time to develop apps, it also encountered many small problems in the middle. Here is a summary.First, you can return […]

  • Developed a platform based on thinkphp6 0’s rapid development background management system


    Gitee address:gitee.com/kankta/kankta-thinkphp-a… Function introduction Think PHP rapid development framework background back-end interface Developed functions Administrator module Project installation When the administrator logs in, changes the password and exits the login, the login token time limit can be set, and the administrator initializes the password Interface document address docs.apipost.cn/preview/4f573895ec… database The database file is in the […]

  • Let Android studio simulator (AVD) access the Internet


    By default, the simulator can not directly access the Internet. You need to configure DNS server for the simulator. (1) Find the location where the simulator is installed The simulator is installed under the Android SDK. Enter[SDK Path]/emulator。 (2) Open terminal input command Open the terminal (it is recommended to be run by the administrator) […]

  • Centos6 install and crack JIRA 7


    Centos6 install and crack JIRA 7 JIRA software is built for every member of your software team to plan, track and release excellent software. https://confluence.atlassian…. Minimum hardware requirements and software installation Minimum hardware dependency CPU: Quad core 2GHz+ CPU RAM: 6GB Minimum database space: 10GB Update the system and install the Java environment #Note: JIRA […]

  • Network security guarantee: Oracle database evaluation


    The following results take Oracle 11g as an example. It is managed through PL / SQL without any configuration. It is evaluated according to the requirements of ISO 2.0 standard, 2021 report template and three-level system. 1、 Identification a) The logged in users shall be identified and authenticated. The identity identification shall be unique, and […]

  • C # backend processing session expiration jump landing page


    1. Inherit the controller and override onactionexecuting protected override void OnActionExecuting(ActionExecutingContext filterContext) { //User does not exist,Test code //if (CurrentContext.CurrentUser == null) //{ // var currUser = new UserIdentity // { // Id = new Guid(“40F7ACB1-5BBF-46CC-A47D-A42EBFDD470D”),//Name = “Administrator”, // IsAdmin = true // }; // HttpContext.Session.Add(“CurrentUser”, currUser); // return; //} var theme = Request.QueryString[“theme”]; if […]

  • Mysql database authorization (III)


    In the first part:https://www.cnblogs.com/zhaoyunxiang/p/15357057.html, describes the authorization of MySQL UDF. In the second part:https://www.cnblogs.com/zhaoyunxiang/p/15357630.html, describes the MOF authorization of MySQL. The last one is about the startup authorization of MySQL database, The core condition of this kind of authorization is that the current identity is administrator, and webshell is also administrator. Otherwise, the authorization is […]

  • 2. Basic DOS commands


    How to open CMD window Start + system + command prompt Press Win + R and enter CMD to open the console (recommended) Under any folder, hold down the shift key + right-click to open the command line window here Add CMD path in front of the address bar of the resource manager Run as […]

  • Random access to memory is also slower than sequential access, which will give you an in-depth understanding of the memory IO process


    We all know that memory access is very fast at ordinary times. Today, let’s give full play to the spirit of thorough inquiry and think about two problems Question 1:What is the memory access latency? Will you make a rough estimate?For example, the author’s memory moduleSpeedThe display is 1066MHz. Can you calculate that the memory […]

  • Solve the problem that sublime under Ubuntu cannot input Chinese


    System environment System:Ubuntu 16.04Youqilin (should be the majority)linuxAll systems (Trial)Input method: Little Penguin input methodfcitx Textedition:Sublime Text 3 Build 3114 terms of settlement 1. Save the following code to sublime imfix C (located in ~ directory) #include <gtk/gtkimcontext.h> void gtk_im_context_set_client_window (GtkIMContext *context, GdkWindow *window) { GtkIMContextClass *klass; g_return_if_fail (GTK_IS_IM_CONTEXT (context)); klass = GTK_IM_CONTEXT_GET_CLASS (context); […]

  • Use of laravel policy


    Laravel provides a simpler way to handle user authorization actions. Similar to user authentication, there are two main ways to realize user authorization: Gates and policies. I will mainly explain the use of policies here. fileThere are detailed instructions above. I only make a simple note here according to my own use process. Example: I’m […]