Method 1: BufferedImage+Graphics to make verification code
1. Make JSP page (as shown in the figure)
The code is as follows:
2 <form action="<%=request.getContextPath()%>/servlet/LoginServlet" method="get" />
3 Verification Code:<input type="text" name="checkcode"/>
4 <img alt="Verification Cod ...
Posted by ilikephp on Sat, 02 May 2020 20:35:42 +0200
By climbing the pit many times, we found the common point of these monitoring scrolls to load more components,
Because these load more methods are bound to the elements that need to load more content,
Therefore, when the monitor hears the scrolling event, it will continue to load more,
So for infinite scrolling, you don't need to write the firs ...
Posted by lyasian on Sat, 02 May 2020 13:01:20 +0200
1, Understanding of this:This: it means "this". It's a pronoun. The meaning of pronoun is determined by the scene or situation.
You, me, him, this, that, are pronouns.
When someone says, "I'm eating", then who is this "I", we must see who said this sentence, who said it, who I am, that is, &quo ...
Posted by jpr on Sat, 02 May 2020 12:58:41 +0200
After the completion of the design, it is really a barrier and long QAQ. When using a check box, because it is too ugly to abandon the check box, I made one myself. There is no picture in it, which is implemented by css and jQuery.
The final effect can be seen directly without much nonsense:
The html element is design ...
Posted by daftdog on Fri, 01 May 2020 08:33:11 +0200
After a few days of trying and learning, I have encapsulated my first js component, there are many shortcomings, please give me some advice.
Because of some business needs, we need to add some labels to the pictures, find some on-line but can not meet the needs, and there are some bug s, too many pits
So I have the idea of encapsulating one by ...
Posted by JohnMC on Wed, 29 Apr 2020 19:44:09 +0200
1. Initial JWT
1.1 JWT principle
JWT (JSON Web Token) is the most popular cross domain authentication solution at present. Its advantage lies in that the server does not need to store tokens for distributed development, and provides data for the APP for the project of front-end and back-end separation. The items of the token generated by log ...
Posted by presence on Tue, 28 Apr 2020 07:06:22 +0200
Different types of files are stored in the file storage system. The background extracts the file name and content through the program. Lucene is used to index the file name and content. The front end provides a query interface for the user. After the user submits the query keywords, the index library is retrieved and the matching documents are ...
Posted by txmedic03 on Sun, 19 Apr 2020 16:23:54 +0200
1. Start from zero
Posted by Lodius2000 on Fri, 17 Apr 2020 04:30:03 +0200
Recently, baidu map will be used to realize the function of building visualization, so the most basic function is to realize the division of building in different regions after gridding the map;
1. Go to the open platform of Baidu map to apply for the secret key. Here I post my secret key; ak=A3CklGvnFOjkAzKzay2dySgfdig0GKz4
2. Create a new sim ...
Posted by nomad9 on Wed, 15 Apr 2020 20:10:36 +0200
Posted by igebert on Wed, 15 Apr 2020 04:17:42 +0200