PHP腳本:隨心所欲的代碼逐漸流行
Jun 08, 2016 pm 05:32 PM記得 HTML 從1.0 版發(fā)展到 2.0 版的那些令人興奮的日子嗎,那時把握一種新的 Web 語言就和查看 Web 站點之后的代碼一樣簡單?記得輕松的學習基礎(chǔ) HTML 嗎?記得能夠隨意地構(gòu)建出一些代碼,并在編寫時快速地查看外觀,而且假如它不能運行,能夠輕易地修改 HTML 代碼嗎?沒有 IDE,沒有對象和類。只需一個文本編輯器、一些標記和您自己的聰明才智??胺Q快速和經(jīng)濟高效!
這些日子不會永遠消逝。這種“保持簡單”的精神在 PHP(近幾年來得到廣泛應(yīng)用的一種腳本語言)中繼續(xù)延續(xù)。這種語言在不斷發(fā)展,并逐漸知道 PHP 能做什么以及不能做什么,并且使 Web 應(yīng)用程序更加易于構(gòu)建。
從默默無聞的新生事物到 Web 上的明星角色
就像二十世紀五十年代初涉影壇的好萊塢演員,PHP 真正的開始并不廣為人知。有些人認為 PHP 代表“個人主頁”。有些人認為 PHP 是其發(fā)明者姓名的首字母縮寫。實際上,PHP 代表超文本預(yù)處理器 (Hypertext Pre Processor),它是由一個名叫 Rasmus Lerdorf 的人在 1994/95 年左右發(fā)明的。Lerdorf 提出了 PHP 框架,作為跟蹤 Web 站點的訪問者如何查看其在線簡歷的一種方式。他公開發(fā)布了最初的超文本預(yù)處理器源代碼,以幫助其它的 Web 開發(fā)人員對在線內(nèi)容執(zhí)行類似的操作。
當時 Web 開發(fā)人員受到 HTML 中提供的表示特性的打擊,開始發(fā)現(xiàn)這種新的 PHP 腳本語言在構(gòu)建動態(tài)內(nèi)容的 Web 站點時有多大的好處。PHP 代碼可以直接嵌入到 HTML 代碼中,而且這種年輕的腳本語言就像 HTML 一樣易于把握。
對開發(fā)人員而言,這意味著可以很快學會 PHP,可以快速構(gòu)建動態(tài)內(nèi)容的 Web 站點,對代碼的修改也可以快速地完成。在開發(fā)人員編程時,可以立即查看結(jié)果,無需 IDE,也無須困擾于處理用戶類型和整數(shù)類型以及對象和類

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

AgeneratorinPHPisamemory-efficientwaytoiterateoverlargedatasetsbyyieldingvaluesoneatatimeinsteadofreturningthemallatonce.1.Generatorsusetheyieldkeywordtoproducevaluesondemand,reducingmemoryusage.2.Theyareusefulforhandlingbigloops,readinglargefiles,or

In PHP, you can use square brackets or curly braces to obtain string specific index characters, but square brackets are recommended; the index starts from 0, and the access outside the range returns a null value and cannot be assigned a value; mb_substr is required to handle multi-byte characters. For example: $str="hello";echo$str[0]; output h; and Chinese characters such as mb_substr($str,1,1) need to obtain the correct result; in actual applications, the length of the string should be checked before looping, dynamic strings need to be verified for validity, and multilingual projects recommend using multi-byte security functions uniformly.

To prevent session hijacking in PHP, the following measures need to be taken: 1. Use HTTPS to encrypt the transmission and set session.cookie_secure=1 in php.ini; 2. Set the security cookie attributes, including httponly, secure and samesite; 3. Call session_regenerate_id(true) when the user logs in or permissions change to change to change the SessionID; 4. Limit the Session life cycle, reasonably configure gc_maxlifetime and record the user's activity time; 5. Prohibit exposing the SessionID to the URL, and set session.use_only

The urlencode() function is used to encode strings into URL-safe formats, where non-alphanumeric characters (except -, _, and .) are replaced with a percent sign followed by a two-digit hexadecimal number. For example, spaces are converted to signs, exclamation marks are converted to!, and Chinese characters are converted to their UTF-8 encoding form. When using, only the parameter values ??should be encoded, not the entire URL, to avoid damaging the URL structure. For other parts of the URL, such as path segments, the rawurlencode() function should be used, which converts the space to . When processing array parameters, you can use http_build_query() to automatically encode, or manually call urlencode() on each value to ensure safe transfer of data. just

You can use substr() or mb_substr() to get the first N characters in PHP. The specific steps are as follows: 1. Use substr($string,0,N) to intercept the first N characters, which is suitable for ASCII characters and is simple and efficient; 2. When processing multi-byte characters (such as Chinese), mb_substr($string,0,N,'UTF-8'), and ensure that mbstring extension is enabled; 3. If the string contains HTML or whitespace characters, you should first use strip_tags() to remove the tags and trim() to clean the spaces, and then intercept them to ensure the results are clean.

There are two main ways to get the last N characters of a string in PHP: 1. Use the substr() function to intercept through the negative starting position, which is suitable for single-byte characters; 2. Use the mb_substr() function to support multilingual and UTF-8 encoding to avoid truncating non-English characters; 3. Optionally determine whether the string length is sufficient to handle boundary situations; 4. It is not recommended to use strrev() substr() combination method because it is not safe and inefficient for multi-byte characters.

To set and get session variables in PHP, you must first always call session_start() at the top of the script to start the session. 1. When setting session variables, use $_SESSION hyperglobal array to assign values ??to specific keys, such as $_SESSION['username']='john_doe'; it can store strings, numbers, arrays and even objects, but avoid storing too much data to avoid affecting performance. 2. When obtaining session variables, you need to call session_start() first, and then access the $_SESSION array through the key, such as echo$_SESSION['username']; it is recommended to use isset() to check whether the variable exists to avoid errors

Key methods to prevent SQL injection in PHP include: 1. Use preprocessing statements (such as PDO or MySQLi) to separate SQL code and data; 2. Turn off simulated preprocessing mode to ensure true preprocessing; 3. Filter and verify user input, such as using is_numeric() and filter_var(); 4. Avoid directly splicing SQL strings and use parameter binding instead; 5. Turn off error display in the production environment and record error logs. These measures comprehensively prevent the risk of SQL injection from mechanisms and details.
