thinkphp3.2.3 sql injection vulnerability analysis
First go to ThinkPHP's official website to download thinkphp_v3.2.3 full version source code( https://www.thinkphp.cn/Down ), and then unzip it to the root directory of phpstudy website.
thinkphp3.2.3 where injection
environment
Configuration database
ThinkPHP/Conf/convention.php, crea ...
Posted by madcrazy1 on Wed, 18 May 2022 22:50:05 +0300
1, Foreword
A Transaction is a Transaction between the beginning and the end of a Transaction.
To put it simply: either all are executed or all fail.
Distributed transactions are naturally transactions running in distributed systems, which are composed of transactions on multiple different machines. As above, only when all transactions in the ...
Posted by mingo on Wed, 18 May 2022 08:36:52 +0300
background
After the database has been running for some time, the table space has been increasing, but the actual amount of data is not so large. Deleting data or truncate tables does not reduce the tablespace. This is because when the table space is insufficient, it will expand automatically, but it will not shrink automatically.
terms of se ...
Posted by lorewap3 on Wed, 18 May 2022 03:56:25 +0300
1, Foreword
Several common ways to install software on Linux:
Source code compilationDecompress the compressed package (generally tar.gz)Compiled installation package (RPM, DPKG, etc.)Online installation (YUM, APT, etc.) The convenience of the above methods increases in turn, but the versatility decreases in turn
Delete the development ...
Posted by parkej60 on Wed, 18 May 2022 02:16:56 +0300
Abnormal phenomenon
Recently, the project needs to use Debezium to specify the binlog location to read data. When FileDatabaseHistory is configured to save offset, an unrecognized schema exception will appear.
14:52:18.237 [blc-9.135.12.10:3307] ERROR io.debezium.connector.mysql.MySqlStreamingChangeEventSource - Encountered change event ' ...
Posted by jasonscherer on Wed, 18 May 2022 01:40:00 +0300
Steps of JDBC linking SQL Server database
SQL Server2014 database configuration:
(1). Open the installed SQL Server 2014 Management Studio, select SQL server authentication, and enter the user name (SA by default) and password,
(2). Open the security login, right-click sa, select attribute status, and set whether to allow connection to the da ...
Posted by harrisonad on Tue, 17 May 2022 23:58:36 +0300
Generally speaking, a table corresponds to a mapper mapping file, but the storage of some attributes in the database does not directly store its contents, but stores its unique identification, such as id. the political outlook, Department, job level and position of employees in the following table are maintained through the id of each sub table ...
Posted by langemarkdesign on Tue, 17 May 2022 21:43:35 +0300
SQL statement
Query statement select
SELECT column_name,column_name
FROM table_name
[WHERE Clause]
[LIMIT N][ OFFSET M]
select is a query statement, followed by commas to separate multiple columns, and * indicates all columns
Which form is it from after from
where add conditional restrictions
Limit limit the number of displays
Offset indic ...
Posted by Sgarissta on Mon, 16 May 2022 03:42:58 +0300
1, Mybatis cache
Like most ORM tier frameworks, Mybatis naturally provides support for L1 and L2 caching. The following is the role and definition of L1 cache and L2 cache.
1. The first level cache is the sqlSession level cache. When operating the database, you need to construct sqlSession object, in which there is a (memory area) data st ...
Posted by ladokha on Sun, 15 May 2022 22:48:08 +0300
Redis is a NoSQL Not Only SQL (key value)
NoSQL
Used to solve 3v+3 high
Massive Volume, real-time Velocity, diversity
High concurrency, high scalability and high performance
Redis Download
Windows
Download the zip package and unzip it to the environment folder
Linux
I use the automatic installation of pagoda panel
Directory for aut ...
Posted by ChrisBoden on Sun, 15 May 2022 10:01:55 +0300