


The efficacy and function of Ganoderma lucidum spore powder and how to consume it. Method 2 of displaying web pages normally in any character set (continued)
Transfer to: coolcode.cn
A few days ago, I wrote an article on how to display web pages normally in any character set. The introduction in it is very simple, that is, character sets other than the first 128 characters are represented by NCR, but I did not introduce the specific conversion method, because At the time I thought it was too simple. But later I found someone asked this question, so I will explain it in detail here.
The first step is to convert the string of the source character set into the UTF-16 character set. This step is because each character in the UTF-16 character set is two bytes, and it is easy to process later. It will be very complicated if you do the processing directly on the source character set. The source character set can be obtained from the meta tag in the original web page, or can be specified separately. My program allows the user to specify the source character set in the form, because I cannot guarantee that the file submitted by the user must be an HTML file (the same is true for other files) Yes, for example, the Chinese language package source file of WordPress is a po file, and the content in it can also be processed in this way), and even if it is an HTML file, it does not necessarily have a meta tag for specifying the character set, so specify it separately through the form The character set is relatively safe. You may think that converting one character set to another is complicated. Indeed, it is very troublesome to implement it yourself, but it is very easy to do it with PHP because it already contains such a function. , you can easily achieve conversion between various character sets through the iconv function. If the iconv extension is not installed on your machine, you can also use the mb_convert_encoding function. If the Multibyte String extension is not installed, there is nothing you can do. , because it is basically impossible for you to convert so many types of codes yourself, unless you are a top expert! It is recommended to use iconv because it is more efficient and supports more character sets.
After completing the above step, the next step is to process the string in units of two bytes. These two bytes are directly converted into numbers and are xxxxx in xxxx;. If the number is less than 128, use this character directly (note that it becomes a single byte here), otherwise use the form of xxxx;. One thing to note here is that when this number is 65279 (hexadecimal 0xFEFF), please ignore it, because this is the transmission control character in Unicode encoding, and our current string already only has iso-8859- 1 is the first 128 characters in the encoding, so we don't need it.
Okay, the basic idea is this. Here is the implementation program:
Download: nochaoscode.php
Copy the code The code is as follows:
function nochaoscode($encode, $str) {
$str = iconv($encode, "UTF-16BE", $str);
for ($i = 0; $i < strlen($str); $i++,$i++) {
$code = ord($str{$i}) * 256 + ord($str{$i + 1});
if ($code < 128) {
} else if ($code != 65279) {
$output
}
}
return $output;
}
?>
Among the parameters of the function, $encode is the source character set, and $str is the string that needs to be converted. The return result is the converted string.
Supplement: Today Legend told me a simpler method, which is to directly use the mb_convert_encoding function. Because mb_convert_encoding supports an encoding format called HTML-ENTITIES, which is NCR encoding. It's even simpler to use it.
The above introduces the efficacy and function of Ganoderma lucidum spore powder and how to consume it. Method 2 (continued) of normal display of web pages in any character set, including the efficacy and role of Ganoderma lucidum spore powder and how to consume it. I hope it will be helpful to the PHP tutorial. Interested friends help.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

The enumeration function in PHP8.1 enhances the clarity and type safety of the code by defining named constants. 1) Enumerations can be integers, strings or objects, improving code readability and type safety. 2) Enumeration is based on class and supports object-oriented features such as traversal and reflection. 3) Enumeration can be used for comparison and assignment to ensure type safety. 4) Enumeration supports adding methods to implement complex logic. 5) Strict type checking and error handling can avoid common errors. 6) Enumeration reduces magic value and improves maintainability, but pay attention to performance optimization.

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...
