Tag:User name

  • Spring Boot Security Learning (10) Web Log-in to remember my function


    scene Many logins have the function of remembering me. After the user logs in once, the system will remember the user for a period of time. During this period, the user can use our system without repeated logins. Remember the basic principles of user functions as shown below: When the user logs in, the request […]

  • PHP prevents form duplicate submission instances by session judgment


    PHP uses session judgment to prevent form duplicate submission instances. To prevent duplicate operations after the user submits the form, session judgment is used to determine whether it is the first submission or not, otherwise, let him return to the previous form page. The current form page is_submit is set to 0 (); $_SESSION[‘is_submit’] = […]

  • The use of pymysql module


    I. Connecting to MySQL Server import pymysql # Connect to the database and call the Connect function (the Connect function returns an object of Connection) Conn = pymysql. Connect (host =’localhost’, # host ip) Port = 3306, port # User=’user’, # username Password=’passwd’, # password Database=’db’, # database name Charset=’utf8′, # Character Set ) 2. […]

  • Common Oracle Directives


    / ** For clarity, all fixed commands are displayed in uppercase format SQL Syntax Classification: DML, DDL, DCL (1) Data Manipulation Language (DML): Data: add, modify, delete (2) DDL (Data Definition Language, Database Definition Language): Definition of data table structure, definition of database object (user, data table, schema name) (3) DCL (Data Control Lanaguage): Authorization […]

  • Windows Server 2008 R2 FTP Service User Isolation


    Windows Server 2008 R2 FTP Service User Isolation Original title:Install FTP service and build a new FTP site with C: ftproot as the main directory. When users soft1 and soft2 log on to FTP site anonymously through appropriate technology, they can only browse the contents of “Public” subdirectory. If they log on to FTP site […]

  • Using VNC to remotely control Centos 7.6


    Install vncserver [[email protected] ~]# yum install tigervnc-server -y Loaded plugins: fastestmirror Determining fastest mirrors * base: mirror.fileplanet.com * elrepo-kernel: repos.lax-noc.com * extras: mirror.hostduplex.com * updates: mirror.hostduplex.com (many more lines supressed) Installed: tigervnc-server.x86_64 0:1.8.0-13.el7 Dependency Installed: libICE.x86_64 0:1.0.9-9.el7 libSM.x86_64 0:1.2.2-2.el7 libX11.x86_64 0:1.6.5-2.el7 libX11-common.noarch 0:1.6.5-2.el7 libXau.x86_64 0:1.0.8-2.1.el7 libXcursor.x86_64 0:1.1.15-1.el7 libXdamage.x86_64 0:1.1.4-4.1.el7 libXdmcp.x86_64 0:1.1.2-6.el7 libXext.x86_64 0:1.3.3-3.el7 libXfixes.x86_64 0:5.0.3-1.el7 […]

  • Python Realizes Network Multi-Person Chat Room


    Network Multi-Person Chat Room File structure:   chatroom– client.py_client code– Language.py_Language File– server.py_server-side codeSettings.py Settings File   0 directories, 4 files Use module: os sys socket select Ideas: Settings.py, defining HOST, PORT, ADDR, buffersize, language, curuser and other variables. Server. py, the server code, uses the select module selection method to realize IO multiplexing to monitor sys. […]

  • The Method of Changing Sa User Name in SQL Server 2005


    The code for modifying the SA account name of the database is as follows: Copy codeThe code is as follows: Alter LOGIN sa DISABLE Alter LOGIN sa WITH NAME = [systemAccount] “System Account” is the new name of SA. Upon completion of execution, you can refresh the login name on the right side to see […]

  • Mysql-8.0.16-winx64/Linux Modify Root User Password


      Connecting database and other basic operations, please solve it by yourself. This article focuses on recording how to change the password.   1. Query the user password: Query user password command: select host, user, authentication_string from mysql.user ; host:Ip’location’% which allows users to log in indicates that they can be remote; User: the user […]

  • Koa2 server uses JWT to distribute authentication and routing privileges


    General idea   When writing REST APIs on the back end, some APIs are very sensitive, such as getting personal information of users, viewing all user lists, modifying passwords, etc. If these APIs are not protected, others can easily access and call these APIs for operation. So for some apis, before invoking, we must first authenticate […]

  • PDO Simple DB Class Encapsulation


    <?php class DB{ private $dbs = “”; private $fields = “*”; private $tables = null; private $joins = null; private $ons = null; private $wheres = null; private $limits = null; private $orderby = null; private $likes = null; private $groupby = null; private $sums = null; private $field = null; private $avgs = null; […]

  • The Method of Getting Root User telnet to FreeBSD


    1: How to Open telnet ee /etc/inetd.conf hold #telnet stream  tcp     nowait  root    /usr/libexec/telnetd    telnetd #telnet stream  tcp6    nowait  root    /usr/libexec/telnetd    telnetd Remove the # in front kill -HUP `cat /var/run/inetd.pid` Restart inetd, and that’s all.If you don’t even start inetd, you need to ee /etc/rc.conf inetd_enable=”YES” 2: Allow root user telnet Telnet is not very secure. Root is not allowed to enter the host as telnet by default.To allow root users […]