


2016-04-05 When is the Spring Festival in 2016? Year of the Monkey 2016? Tomb-Sweeping Day Holiday Schedule 2016
data-id="1190000004873405">
PHP application fields
web server-side script: main role
application graphical interface
command line script
php.exe -f "php file path "
orphp.exe -r "php script code"
Install Apache
Open the installation program and go all the way to next
Install php
Extract the php compressed package to a directory in the system
Installation Mysql
The default option is just go to next
Configure Apache and PHP
Open apache's httpd.conf file and add the following content
LoadModule php5_module "Find the path to php5apache2_2.dll in the php decompression directory"
Add the following content
AddType application/x-httpd-php .php .pap .phtml
Detect apache configuration syntax
httpd.exe -t
PHP configuration time zone
Open php decompression Find the php.ini file in the directory
Look for the keyword
timezone
and uncomment it and change it todate.timezone = PRC
Set the php.ini file path in httpd.conf
PHPIniDir 'php decompression directory '
Restart Apache
PHP Configure Mysql
Look for
extension_dir
in php.ini UncommentLook for
php_mysql.dll in php.ini
Uncomment and cancel at the same timeNotes on mysqli.dll
Apache host configuration
Directory access permissions description
<code><Directory “要设置权限的目录路径”> #设置当一个请求中没有给定请求的文件名又没有默认网页(首页)的时候,显示文件列表 Options Indexes #设置权限控制的先后顺序,只有2种:Deny,Allow(先拒绝,后允许),Allow,Deny(先允许后拒绝) Order Deny,Allow #Deny用于设定要拒绝访问的来源地址或服务器名,几乎没有实际意义! Deny from 拒绝名单 比如:deny from 192.168.3.8 172.180.4 Allow from 允许名单 比如:Allow from all #设置该文件夹下的“默认网页”(首页),可以设置多个,用于请求中不带文件名的时候自动使用该文件作为“返回”页面。 DirectoryIndex index.php index.html main.php default.php abc.php 123.html # 允许分布权限 AllowOverride all </Directory></code>
Distribution permissions means setting the permissions of the folders separately without restarting apache. In the folders that need to configure permissions separately Create a new .htaccess file with the following content
<code>Deny from all</code>
Apache virtual host configuration
In apache's main configuration file httpd.conf, "open" the multi-site virtual host configuration file item (keyword: vhosts):
In the httpd-vhosts.conf file, set the IP address and port number that you want to provide "multi-site" service. Usually the default is: :80, where "" represents all IPs. The default is actually after apache is installed. Set up, no need to set it manually (keyword NameVirtualHost):
Configure every single site
<code><virtualhost *:80> #主机名 ServerName www.baidu.com #主机别名 ServerAlias map.baidu.com tv.baidu.com #目录 DocumentRoot "C:/root" #目录权限配置 <Directory "C:/root"> Options Indexes Order Deny,Allow Allow from all </Directory> #虚拟目录 Alias /abc 'C:/alias' <Directory "C:/alias"> Options Indexes Order Deny,Allow Allow from all </Directory> </virtualhost></code>
The above introduces 2016-04-05, including the content of 2016. I hope it will be helpful to friends who are interested in PHP tutorials.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

The enumeration function in PHP8.1 enhances the clarity and type safety of the code by defining named constants. 1) Enumerations can be integers, strings or objects, improving code readability and type safety. 2) Enumeration is based on class and supports object-oriented features such as traversal and reflection. 3) Enumeration can be used for comparison and assignment to ensure type safety. 4) Enumeration supports adding methods to implement complex logic. 5) Strict type checking and error handling can avoid common errors. 6) Enumeration reduces magic value and improves maintainability, but pay attention to performance optimization.

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

RESTAPI design principles include resource definition, URI design, HTTP method usage, status code usage, version control, and HATEOAS. 1. Resources should be represented by nouns and maintained at a hierarchy. 2. HTTP methods should conform to their semantics, such as GET is used to obtain resources. 3. The status code should be used correctly, such as 404 means that the resource does not exist. 4. Version control can be implemented through URI or header. 5. HATEOAS boots client operations through links in response.

In PHP, exception handling is achieved through the try, catch, finally, and throw keywords. 1) The try block surrounds the code that may throw exceptions; 2) The catch block handles exceptions; 3) Finally block ensures that the code is always executed; 4) throw is used to manually throw exceptions. These mechanisms help improve the robustness and maintainability of your code.

The main function of anonymous classes in PHP is to create one-time objects. 1. Anonymous classes allow classes without names to be directly defined in the code, which is suitable for temporary requirements. 2. They can inherit classes or implement interfaces to increase flexibility. 3. Pay attention to performance and code readability when using it, and avoid repeatedly defining the same anonymous classes.
