• Analysis of Objective-C design pattern bridging


    The pattern of picture recognition Figure 1 Or so Figure 2 Asking questions Problem assumption: the remote control and TV series here are bound, one remote control corresponds to one TV set. There are the following problems: There are two production lines, one for remote control and the other for TV The structure of different […]

  • Open source general permission management platform based on. Net 5


    Hello everyone, I’m a heartbroken editor for the majority of programmers. I recommend a small tool / source code every day, fill your favorites, and share a little skill every day, so that you can easily save development efficiency, and achieve the goal of not working overtime, not staying up late and not losing your […]

  • Common commands and concepts of ad


    The common command set of active directory server is as follows: net accounts   View the role of the first domain controllernet accounts    View computer rolesnet share       View shareNetdom query FSMO verify operation host role get-ADforest|FL globalcatalogs   Query all global catalog servers in the current forestGet-ADDomaincontroller|FT name,ISglobalcatalog   Verify that the login […]

  • Mongodb — Security Authentication


    Brief introduction of user and role permissions of mongodb By default,MongoDBWhen an instance starts and runs, the user access control is not enabled. That is to say, the local server of the instance can connect to the instance at will for various operations,MongoDBNo user authentication is performed on the connected client. To enable user access […]

  • Do you know the role authorization and authentication of rights management?


    In authority management, role authorization and authentication belong to the key module of authority module. Role authorization is the act of assigning menu resources that a role can operate to a specified role. Role authentication is the operation of verifying the permissions of user operated resources after a user plays a specified role and logs […]

  • Super detailed, with source code! Using springboot + Shiro + mybatis + thymeleaf to login


    Recently, I am doing a final project, which is to use SSM + thymeleaf + Vue + Shiro to complete a project withAccess login, and user information can be added, deleted, checked and modifiedThe following is just the implementation of such a projectAuthority authentication and login. Why I choose Shiro instead of spring security is […]

  • Install mongodb and configure permissions for centos7


    1. Download 1. Choose the storage path of mongodb. I choose to store it in / usr cd /usr wget https://fastdl.mongodb.org/linux/mongodb-linux-x86_64-4.0.0.tgz tar zxvf mongodb-linux-x86_64-4.0.0.tgz mv mongodb-linux-x86_64-4.0.0.tgz mongodb 2. Configure environment variables vi /etc/profile Insert: export PATH=/usr/mongodb/bin:$PATH Rerun profile source /etc/profile 3. Create database configuration file, storage file and log file cd /usr/mongodb touch mongodb.conf mkdir […]

  • Idea configures the running environment of Maven project in Git


    After importing the project on git, close the project. Click open and select pom.xml File opens the project. Configure git development roles and rad.properties (development folder). In the Maven window on the right, click reimport all Maven projects. Configure Tomcat: delete the original deployment and add a new expanded in deployment. Configure name, open browser, […]

  • How to realize multi person real-time annotation when sharing screen?


    preface With the development of real-time communication technology, online education, video conferencing, online finance and other real-time interactive applications are used more and more. It is increasingly common to share documents and desktop online for teaching, collaboration and product demonstration. Diversified scenarios also give rise to more personalized demand for real-time interactive technology, including real-time […]

  • C # MVC layui realizes two-level linkage of drop-down box


    1 layui.use 1. Official use document of layui: HTTPS :// www . layui . com / doc / 2. The built-in module of layui is not loaded by default. The module will not be loaded until the method of starting the module is executed; 3、 layui.use It’s a way to load modules.The code is as […]

  • Authority Subsystem (3) — role module


    Role management design description Business design description This module mainly realizes the management of internal roles (positions) in the enterprise. When adding roles, you can assign resource access rights to roles, and finally assign roles to usersBased on the design of the table, the logical relationship of the data is shown as follows:The script of […]