HTTPServiceÓëPHPͨÐÅ
ÔÚFlexÖÐÓÐ2¸öHTTPServiceÀ࣬ËüÃǵÄÍêÕû¼Ì³Ð·¾¶·Ö±ðÊÇmx.rpc.httpºÍmx.rpc.http.mxml,¿ÉÒÔ¿´³ömx.rpc.http.mxmlÊÇmx.rpc.httpµÄ×ÓÀà¡£mx.rpc.http.mxmlÖеÄhttpServiceÖ÷ÒªÊÇΪÁËMXML±êÇ©ÖÐʹÓÃHTTPService¶øÉèµÄ¡£mx.rpc.httpÊÇÔÚʹÓÃas½Å±¾½øÐвÙ×÷ʱʹÓᣵ±µ÷Óà HTTPService ¶ÔÏóµÄ send() ·½·¨Ê±£¬½«·¢³ö¶ÔÖ¸¶¨ URL µÄ HTTP ÇëÇ󣬲¢ÇÒ·µ»Ø HTTP ÏìÓ¦¡£¿ÉÒÔÑ¡ÔñÏòÖ¸¶¨ URL ´«µÝ²ÎÊý¡£Èç¹ûûÓÐʹÓûùÓÚ·þÎñÆ÷µÄ´úÀí·þÎñ£¬ÔòÖ»ÄÜʹÓà HTTP GET »ò POST ·½·¨¡£
send
()
·½·¨
public function send(parameters:Object = null):AsyncToken
Ö´ÐÐ HTTPService ÇëÇó¡£²ÎÊýÊÇ¿ÉÑ¡µÄ£»µ«Èç¹ûÖ¸¶¨²ÎÊý£¬ËùÖ¸¶¨µÄÖµÓ¦¸ÃÊǰüº¬Ãû³Æ/Öµ¶ÔµÄ Object »ò XML ¶ÔÏó£¨È¡¾öÓÚ contentType£©¡£
²ÎÊý
parameters:Object (default = null)
·µ»Ø
AsyncToken — ±íʾÒì²½Íê³É±ê¼ÇµÄ¶ÔÏ󡣸öÔÏóÓë result »ò fault ʼþµÄ token ÊôÐÔÖеĶÔÏóÏàͬ¡£
setCredentials
()
·½·¨
ÏÂÃæÊÇÒ»¸öʹÓÃHTTPServiceÓëPHPͨÐŵÄÀý×Ó£¬PHP·µ»ØÒ»¸öXMLÎı¾´®£¬FLex½«Õâ¸öXML´®ÏÔʾÔÚDataGRid¿Ø¼þÖС£
Flex´úÂ루ע£ºÏÂÃæµÄ´úÂëдÔÚÒ»¸öFlexÄ£¿éÖУ©£º
<?xml version="1.0" encoding="utf-8"?>
<mx:Module xmlns:mx="http://www.adobe.com/2006/mxml" layout="absolute" width="438" height="324" fontSize="12" creationComplete="CreationComplete()">
<mx:Script>
<!--[CDATA[
import mx.rpc.http.HTTPService;
import mx.rpc.events.ResultEvent;
import mx.rpc.events.FaultEvent;
[Bindable]
private var xml:XML;
private var http:HTTPService;
public function onclose():void{
this.parent.parent.parent.removeChild(this.parent.parent);
}
public function CreationComplete():void{
this.GetItem();
}
private function GetItem():void{
http = new HTTPService();
http.url="http://localhost/PHPAsset/getunit.php";
http.method="POST";
http.resultFormat="e4x";
http.useProxy=false;
http.addEventListener(ResultEvent.RESULT,onResult);
http.addEventListener(FaultEvent.FAULT,onFault);
http.send();
}
private function onFault(
Ïà¹ØÎĵµ£º
OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......
BUGTRAQ ID: 36555
CVE ID: CVE-2009-3557
PHPÊǹ㷺ʹÓõÄͨÓÃÄ¿µÄ½Å±¾ÓïÑÔ£¬ÌرðÊʺÏÓÚWeb¿ª·¢£¬¿ÉǶÈëµ½HTMLÖС£
PHPµÄtempnam()ÖеĴíÎó¿ÉÄÜÔÊÐíÈÆ¹ýsafe_modeÏÞÖÆ¡£ÒÔÏÂÊÇext/standard/file.cÖеÄÓЩ¶´´úÂë¶Î£º
PHP_FUNCTION(tempnam)
{
char *dir, *prefix;
int dir_len, prefix_len;
size_t p_len;
char ......
<?php
#--Config--#
$login_password= '123456'; //ÕâÊÇÃÜÂë
#----------#
error_reporting(E_ALL);
set_time_limit(0);
ini_set("max_execution_time","0");
ini_set("memory_limit","9999M");
set_magic_quotes_runtime(0);
if(!isset($_SERVER))$_SERVER = &$HTTP_SERVER_VARS;
if(!isset($_POST))$_PO ......
ĿǰLAMP (Linux + Apache + MySQL + PHP) ½ü¼¸ÄêÀ´·¢Õ¹Ñ¸ËÙ£¬ÒѾ³ÉΪWeb ·þÎñÆ÷µÄÊÂʵ±ê×¼¡£LAMP
Õâ¸ö´ÊµÄÓÉÀ´×îÔçʼÓڵ¹úÔÓÖ¾“c't Magazine”£¬Michael KunzeÔÚ1990Äê×îÏȰÑÕâЩÏîÄ¿×éºÏÔÚÒ»Æð´´ÔìÁËLAMPµÄËõд×Ö¡£ÕâЩ×é¼þËäÈ»²¢²»ÊÇ¿ª¿ªÊ¼¾ÍÉè¼ÆÎªÒ»ÆðʹÓõ쬵«ÊÇ£¬ÕâЩ¿ªÔ´Èí¼þ¶¼¿ÉÒԺܷ½±ã µÄË ......
´ò¿ª httpd.conf Îļþ ¼ÓÈëÒÔÏÂÅäÖÃ
ÒÔphpÄ£¿éÅäÖÃapache2.2.x
#BEGIN PHP INSTALLER EDITS - REMOVE ONLY ON UNINSTALL by hooyes
PHPIniDir "D:/php-5.2.6-Win32/"
LoadFile D:/php-5.2.6-Win32/php5ts.dll
LoadFile D:/php-5.2.6-Win32/li ......