Nginx configuration record

Nginx configuration record Anti-theft chain location ~* \.(gif|jpg|png)$ { # Only 192.168.0.1 requests for resources are allowed valid_referers none blocked 192.168.0.1; if ($invalid_referer) { rewrite ^/ http://$host/logo.png; } } Set expiration time based on file type location ~.*\.css$ { expires 1d; break; } lo ...

Posted on Wed, 02 Oct 2019 06:10:47 -0700 by therealairness

Docker deploys Laravel applications

This article uses PHP basic mirroring: php:7.3-apache The Laravel version of this article is: laravel:5.8.* I. Preparing our Laravel application # Run the mix command to package js, css, img files. If you don't use mix, you can omit this step. npm install npm run production # Installing dependencies in composer.lock composer install --ignor ...

Posted on Tue, 01 Oct 2019 17:06:52 -0700 by Pavlos1316

Weekly algorithmic question 009: Date of finding binary symmetry

Title: The year, month and day are expressed as 8-bit integers such as YYYYMMDD. Then the integers are converted into binary digits and arranged in reverse order. Then the binary digits are converted into decimal digits, and the same date as the original date is obtained. The date should be between the last Olympic Games (October 10, 1964) and ...

Posted on Tue, 01 Oct 2019 16:28:08 -0700 by my800stuff

Some practical Git techniques

Preface (what is Git) Officially: Git is a free open source distributed version control system designed to handle everything from small to large projects quickly and efficiently. To quote Mr. Liao Xuefeng, it can automatically help me record every file change, and also allow colleagues to collaborate ...

Posted on Tue, 01 Oct 2019 15:23:30 -0700 by zTagged

Analysis of WEB Topics in Attacking and Defending the World

ics-05 - Attack and Defense of the World Link: http://111.198.29.45:50775Test Point: Files contain vulnerabilities, preg_replace() functions/e vulnerabilities 1. Click on the left column and there is an index.php page. Look at the source code and find herf=?page=index. Judge that there is a file conta ...

Posted on Tue, 01 Oct 2019 10:57:53 -0700 by greepit

ansible process control

Use when to Judge Host Name - hosts: rsync_server tasks: - name: Install rsyncd Server yum: name: rsync state: present - name: Config rsyncd Conf copy: src: ./rsyncd.j2 dest: /etc/rsyncd.conf owner: root group: root mode: 0644 when: ansible_fqdn == 'backup' ...

Posted on Tue, 01 Oct 2019 08:21:00 -0700 by Havok

yii2.0 privilege control ACF privilege--login authentication

ACF is a simple authorization implemented through the yii filters AccessControl class In general, we call the following in the controller:Open backend controller SiteController. PHP and we see a piece of code like this public function behaviors(){return ['access' => ['class' => AccessControl::className(),'rules' => [['actions' => ...

Posted on Tue, 01 Oct 2019 03:19:31 -0700 by amelhedi

What did Lao Wang do with you in the routing matching process of Source | Laravel?

Laravel has a number of routing configurations, including domain name settings, request protocols, request modes, and request paths.So what does Laravel do to match routes after getting requests? This article explains the source code of Laravel 5.8 and shows you the source code step by step. There are four validators for Laravel default routes, ...

Posted on Thu, 26 Sep 2019 18:18:23 -0700 by five

Use PHP Traits to encapsulate Laravel Eloquent associations

The article was forwarded from the professional Laravel developer community with the original link: https://learnku.com/laravel/t... I recently refactored the code for a project, and I found myself writing the same method on the Eloquent model to define the association relationship of the Account class.For reference only, I prefer to use gett ...

Posted on Tue, 24 Sep 2019 19:02:19 -0700 by fowlerlfc

Operational Weapon: Introduction to WEB Log Analysis Scenarios

Why do you want to analyze Web logs? With the continuous development of Web technology, Web has been applied more and more widely. Nowadays, many enterprises provide services to a website, so the business behavior and security of the website is very important. As the security industry put it, "There are only two kinds of people in the wor ...

Posted on Thu, 19 Sep 2019 20:14:49 -0700 by tomtimms