The first reflection is whether these properties of the verification code can be set (that is, whether they are encapsulated into a class and then used by exposing public properties and methods, or whether the verification is implemented directly in the general handler) Code generation to output), the result is unfortunately the latter... The algorithm inside feels pretty good, at least for someone like me who barely understands algorithms, so I thought of encapsulating it. She then shamelessly incorporated it into her own class library ^^
First analyze the shortcomings in this code (what she thinks):
1. For procedural programming, if you want to modify the verification code Properties, such as modifying font size, background color and other details, you need to find the relevant code in the general processing program and modify it. However, this code is better. It separates the verification code string generation and image generation in different methods, making it easy to find the places to be modified.
2. If I want to apply this function to other places, such as a winform program, then this code cannot be reused in the form of a component (a dll), but can be copied, pasted and modified...
3. I didn’t find that the verification code was saved after it was generated (- -!)
Of course, the so-called shortcomings are relative, that is, if you have time to think about it and then slowly design a verification code class, you will definitely It can make a relatively good class, but if you are working on a project and the project is urgent, such code is actually more powerful. The so-called object-oriented design pattern code decoupling is just a cloud~~~
The next step is my modification of this code. First, determine what effect I want, that is, how I want to use it after encapsulating it. First of all, I hope that when using it, I only need to create a new verification code instance (if necessary, I can set various attributes of the verification code arbitrarily), and then I can call certain methods of this instance to use strings, streams, bitmap objects, and byte respectively. Obtain this verification code in the form of an array (note that this verification code class does not include the function of saving the verification code into the context. Personally, I feel that generating the verification code and saving the verification code into the context are two different functions. There is no need to add this function. Do it in the verification code class). In this case, the code becomes extremely simple in the general processing program. First, just create a verification code with new, then call the method to obtain the verification code in the form of a string, and then save it in the morning and afternoon. As for whether it exists in the Session or Cookie It comes as needed, and the verification code class does not care about these; then it calls another method to obtain the verification code in the form of a byte array, so that the image can be output through the context.Response.BinaryWrite() method, that is to say There are only three lines of code in the general processing program. The calling code is roughly as follows:
/// <summary> /// 獲取驗(yàn)證碼(一般處理程序入口函數(shù)) /// </summary> /// <param name="context">當(dāng)前上下文</param> public void ProcessRequest(HttpContext context) { // 創(chuàng)建驗(yàn)證碼 ValidateCode validateCode = new ValidateCode(); // 獲取驗(yàn)證碼(字符串),寫入Session context.Session["SomeValidateCode"] = validateCode.GetString(); // 輸出驗(yàn)證碼(圖片) context.Response.BinaryWrite(validateCode.GetByteArray()); }
PS: I remember that when I first started working, the code was poorly written (worse than now). I usually used it directly when I got a copy of the code. I never thought about whether to use it. The code should be modified or encapsulated. I was taught by my master at that time and I was very impressed. Personally, I feel that there is nothing wrong with using other people's code. First of all, others have used it to at least prove the usability of the code. In addition, my IQ is limited. Some things you want to break your own are not as good as others, but you must not blindly use other people's code. Just use it. It is best to make necessary modifications or encapsulation according to your actual situation, even if it is just a simple layer. Of course, again, if the project is urgent, it is obviously a waste of time. In short, don’t think about it, use it as soon as you get it, at least make sure the key code or the overall structure of the code is clear.
For more encapsulated asp.net verification code related articles, please pay attention to the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Reflection is a mechanism for dynamically checking and operating types and their members at runtime. Its core uses include: 1. Obtain type information and create instances dynamically; 2. Dynamically call methods and access attributes, including private members; 3. Check the types in the assembly, suitable for plug-in systems, serialization libraries and other scenarios. Common usage methods include loading DLL to create objects, traversing attributes for unified processing, calling private methods, etc. However, the reflection performance is low, and the main problems include slow first calls, slower frequent calls, and inability to optimize inline. Therefore, it is recommended to cache the reflection results, use delegate calls or alternatives to improve efficiency. The rational use of reflection can balance flexibility and performance.

Pattern matching in C# makes the conditional logic more concise and expressive through is expressions and switch expressions. 1. Use the is expression to perform concise type checks, such as if (objisstrings), and extract values ??at the same time; 2. Use logical modes (and, or, not) to simplify conditional judgments, such as valueis>0and

Extension methods allow "add" methods to them without modifying the type or creating derived classes. They are static methods defined in static classes, called through instance method syntax, and the first parameter specifies the extended type using this keyword. For example, the IsNullOrEmpty extension method can be defined for the string type and called like an instance method. The defining steps include: 1. Create a static class; 2. Defining a static method; 3. Add this before the first parameter; 4. Call using the instance method syntax. Extension methods are suitable for enhancing the readability of existing types, types that cannot be modified by operations, or build tool libraries, and are commonly found in LINQ. Note that it cannot access private members, and the latter is preferred when conflicts with the instance method of the same name. Response

TheyieldkeywordinC#simplifiesiteratorcreationbyautomaticallygeneratingastatemachinethatenableslazyevaluation.1.Itallowsreturningitemsoneatatimeusingyieldreturn,pausingexecutionbetweeneachitem,whichisidealforlargeordynamicsequences.2.yieldbreakcanbeus

The role of IDisposable and using in C# is to efficiently and deterministically manage unmanaged resources. 1. IDisposable provides Dispose() method, so that the class can clearly define how to release unmanaged resources; 2. The using statement ensures that Dispose() is automatically called when the object is out of scope, simplifying resource management and avoiding leakage; 3. When using it, please note that the object must implement IDisposable, can declare multiple objects, and should always use using for types such as StreamReader; 4. Common best practices include not relying on destructors to clean up, correctly handling nested objects, and implementing the Dispose(bool) pattern.

DependencyInjection(DI)inC#isadesignpatternthatenhancesmodularity,testability,andmaintainabilitybyallowingclassestoreceivedependenciesexternally.1.DIpromotesloosecouplingbydecouplingobjectcreationfromusage.2.Itsimplifiestestingthroughmockobjectinject

LambdaexpressionsandLINQsimplifydatamanipulationinC#byenablingconcise,readable,andefficientcode.1.Lambdaexpressionsallowinlinefunctiondefinitions,makingiteasiertopasslogicasargumentsforfiltering,transforming,sorting,andaggregatingdatadirectlywithinme

Span and Memory improve C# performance by reducing memory allocation. 1. Span avoids array copying and provides light references to existing memory, which is suitable for parsing binary protocols, string operations and high-performance buffer management; 2. Memory supports passing memory slices across asynchronous methods, which is suitable for scenarios where more flexible life cycles are required; 3. Both reduce GC pressure, optimize performance by reusing buffers and avoiding temporary copying; 4. Span is limited to use on the stack and cannot be stored in classes or used in asynchronous methods. Be careful to avoid reassignment operations such as calling.ToArray().
