Ò׽ؽØÍ¼Èí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

HTTPServiceÓëPHPͨÐÅ

ÔÚFlexÖÐÓÐ2¸öHTTPServiceÀ࣬ËüÃǵÄÍêÕû¼Ì³Ð·¾¶·Ö±ðÊÇmx.rpc.httpºÍmx.rpc.http.mxml,¿ÉÒÔ¿´³ömx.rpc.http.mxmlÊÇmx.rpc.httpµÄ×ÓÀà¡£mx.rpc.http.mxmlÖеÄhttpServiceÖ÷ÒªÊÇΪÁËMXML±êÇ©ÖÐʹÓÃHTTPService¶øÉèµÄ¡£mx.rpc.httpÊÇÔÚʹÓÃas½Å±¾½øÐвÙ×÷ʱʹÓᣵ±µ÷Óà HTTPService ¶ÔÏóµÄ send() ·½·¨Ê±£¬½«·¢³ö¶ÔÖ¸¶¨ URL µÄ HTTP ÇëÇ󣬲¢ÇÒ·µ»Ø HTTP ÏìÓ¦¡£¿ÉÒÔÑ¡ÔñÏòÖ¸¶¨ URL ´«µÝ²ÎÊý¡£Èç¹ûûÓÐʹÓûùÓÚ·þÎñÆ÷µÄ´úÀí·þÎñ£¬ÔòÖ»ÄÜʹÓà HTTP GET »ò POST ·½·¨¡£
send
()
·½·¨
 
public function send(parameters:Object = null):AsyncToken
Ö´ÐÐ HTTPService ÇëÇó¡£²ÎÊýÊÇ¿ÉÑ¡µÄ£»µ«Èç¹ûÖ¸¶¨²ÎÊý£¬ËùÖ¸¶¨µÄÖµÓ¦¸ÃÊǰüº¬Ãû³Æ/Öµ¶ÔµÄ Object »ò XML ¶ÔÏó£¨È¡¾öÓÚ contentType£©¡£
²ÎÊý
 
parameters:Object (default = null)
·µ»Ø
 
AsyncToken — ±íʾÒì²½Íê³É±ê¼ÇµÄ¶ÔÏ󡣸öÔÏóÓë result »ò fault ʼþµÄ token ÊôÐÔÖеĶÔÏóÏàͬ¡£
setCredentials
()
·½·¨
 
ÏÂÃæÊÇÒ»¸öʹÓÃHTTPServiceÓëPHPͨÐŵÄÀý×Ó£¬PHP·µ»ØÒ»¸öXMLÎı¾´®£¬FLex½«Õâ¸öXML´®ÏÔʾÔÚDataGRid¿Ø¼þÖС£
Flex´úÂ루ע£ºÏÂÃæµÄ´úÂëдÔÚÒ»¸öFlexÄ£¿éÖУ©£º
<?xml version="1.0" encoding="utf-8"?>
<mx:Module xmlns:mx="http://www.adobe.com/2006/mxml" layout="absolute" width="438" height="324" fontSize="12" creationComplete="CreationComplete()">
<mx:Script>
<!--[CDATA[
import mx.rpc.http.HTTPService;
import mx.rpc.events.ResultEvent;
import mx.rpc.events.FaultEvent;
[Bindable]
private var xml:XML;
private var http:HTTPService;

public function onclose():void{
this.parent.parent.parent.removeChild(this.parent.parent);

}

public function CreationComplete():void{
this.GetItem();


}

private function GetItem():void{
http = new HTTPService();
http.url="http://localhost/PHPAsset/getunit.php";
http.method="POST";
http.resultFormat="e4x";
http.useProxy=false;
http.addEventListener(ResultEvent.RESULT,onResult);
http.addEventListener(FaultEvent.FAULT,onFault);
http.send();



}
private function onFault(


Ïà¹ØÎĵµ£º

PHP ÖÐÇÉÓÃÊý×é½µµÍ³ÌÐòµÄʱ¼ä¸´ÔÓ¶È

OpenX adserver version 2.8.1 and lower is vulnerable to remote code
execution. To be exploited, this vulnerability requires banner / file
upload permissions, such as granted to the 'advertiser' and
'administrator' roles.
This vulnerability is caused by the (insecure) file upload mechanism of
af ......

Ò»php´óÂí£¬ÖµµÃÑо¿

<?php
#--Config--#
$login_password= '123456'; //ÕâÊÇÃÜÂë
#----------#
error_reporting(E_ALL);
set_time_limit(0);
ini_set("max_execution_time","0");
ini_set("memory_limit","9999M");
set_magic_quotes_runtime(0);
if(!isset($_SERVER))$_SERVER = &$HTTP_SERVER_VARS;
if(!isset($_POST))$_PO ......

ÔÚApacheÖÐÖ§³ÖPHPµÄÅäÖòÎÊý

´ò¿ª httpd.conf Îļþ ¼ÓÈëÒÔÏÂÅäÖÃ
ÒÔphpÄ£¿éÅäÖÃapache2.2.x 
#BEGIN PHP INSTALLER EDITS - REMOVE ONLY ON UNINSTALL by hooyes
PHPIniDir "D:/php-5.2.6-Win32/"
LoadFile D:/php-5.2.6-Win32/php5ts.dll
LoadFile D:/php-5.2.6-Win32/li ......

ÓÅ»¯PHP³ÌÐò

ÏÈÎÒÃÇÁ˽âÒ»ÏÂÎÒÃǵÄphp³ÌÐòÊÇÔõÑùÖ´Ðеģ¬Ê×ÏÈËû±»±àÒëΪÖмä´úÂ룬ȻºóÖмä´úÂë±»ËÍÈëÖ´ÐÐÒýÇæÖ´ÐУ¬È»ºóÏú»Ù¡£Ã¿¸öÇëÇóµÄÖмä´úÂëÔÚÖ´ÐÐÍêÖ®ºó±»Ïú»Ù£¬ÕâÑùµÄºÃ´¦ÔÚÓÚËûÍêÈ«¸ôÀëÁ˲»Í¬µÄÇëÇó£¬Ê¹ÄÚ´æÊ¹ÓÃÂʽµµÍ¡£µ«ÊÇÕâÑùµÄȱµãÒ²ÏÔ¶øÒ×¼û£¬ÒòΪËûÐèÒªÔÙÖØ¸´ÇëÇóÒ»¸ö½çÃæµÄʱºò¶ÔÒ»¸ö´úÂëÁ¬Ðø±àÒëÁ½´Î£¬±àÒëµÄÖмä´úÂëà ......

php ajax debug method make log in a text file

log into file
//
ob_start();
echo "<pre>";
print_r($data);
echo "</pre>";
$a=ob_get_contents();
//DAL::remove("insert into mytest(vvv) values('$a')");
$filename = "file.txt";
$file = fopen($filename, "w") ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØÍ¼ | ¸ÓICP±¸09004571ºÅ