Finally I understand dedecms Structure and principle of , And then built the first website in my life . Don't say the name of the website .
dede My backstage is dede in , This is the background code

templets/default In the middle is the template

article Here is a template for the content of the article

list It's in the column index Templates

The transplantation of website needs to back up the database

then , And then there's no then , If you know this , You can set up a website .

dedecms Learn more about notes

  1. 《Web Safe attack and defense Penetration test practice guide 》 Learning notes ( One )

    Web Safe attack and defense Penetration test practice guide     Learning notes ( One ) Chapter one     information gathering     In information collection , The most important thing is to collect server configuration information and website sensitive information ( Domain name and subdomain name information target website system .CMS The fingerprint . The target site is real I ...

  2. js Learning notes :webpack Basic introduction ( One )

    I've heard of it before webpack, I'd like to have a formal contact with you today , Follow first webpack The official user's Guide to go : Here is : How to install webpack How to use webpack How to use loader How to use webpack The developer of the ...

  3. PHP- Custom template - Learning notes

    1.  Start This few days , After reading teacher Li Yanhui's <PHP Second quarter video > Medium “ chapter 7: establish TPL Custom template ”, Make a study note , By drawing the architecture diagram .UML Class diagrams and mind maps , To better understand . 2.  Overall architecture ...

  4. PHP- Member login and registration example analysis - Learning notes

    1. Start Recently I began to learn from Mr. Li Yanhui <PHP Second quarter video > Medium “ chapter 5: Use OOP Registered members ”, Make a study note , By drawing the basic page flow and UML Class diagram , To better understand . 2. Basic page flow 3. adopt UM ...

  5. 2014 Summer vacation c# A list of study notes

    2014 Summer vacation c# Learning notes One .C# Programming based 1. c# Enumeration of programming basics 2. c# Function variable parameters of programming basis 3. c# String basis of programming basis 4. c# String function of programming basis 5.c# Fundamentals of programming ref.ou ...

  6. JAVA GUI Programming learning notes Directory

    2014 Summer vacation JAVA GUI Programming learning notes Directory 1.JAVA And GUI Programming overview 2.JAVA And GUI Programming layout 3.JAVA And GUI Programming Frame window 4.JAVA And GUI Programming event monitoring mechanism 5.JAVA And ...

  7. seaJs Learning notes 2 – seaJs The use of group building library

    Original address :seaJs Learning notes 2 – seaJs The use of group building library I don't think it's enough to learn new things , Being able to use just means that you understand , I understand , Two doesn't mean you're deep , The essence of it . So continuous learning will be endless . most ...

  8. CSS Learning notes

    CSS Learning notes 2016 year 12 month 15 Daily arrangement CSS Basics Chapter1 stay console Input escape(" Song style ") ENTER Will appear unicode code Show "%u ...

  9. HTML Learning notes

    HTML Learning notes 2016 year 12 month 15 Daily arrangement Chapter1 URL(scheme://host.domain:port/path/filename) scheme: Define the type of Internet Service , The common one is ...

Random recommendation

  1. redis Storage session Realization session share

    nginx Acting as agent tomcat colony redis Storage sharing session nginx The dynamic request is back proxy to tomcat,tomcat By loading the corresponding jar Package approach to achieve redis Shared in sess ...

  2. System security scan tool (appscan) The type of scan

    Scan classification Different scenarios require different scanning types . Can't be blind . Violent to toss . Automatic scanning This is the right way to start scanning . be conducive to , Understand the structure of the whole website . It should be noted that : De pseudo static and business redundancy Pseudostatic url Structural phase ...

  3. pip It's a domestic mirror source

    pipy At present, there are : http://pypi.douban.com/   douban http://pypi.hustunique.com/   Huazhong University of technology http://pypi.sdutlinux.o ...

  4. nyoj 119 The soldiers killed the enemy ( 3、 ... and )【 The difference between the maximum value and the minimum value of the interval of the line segment tree 】

    The soldiers killed the enemy ( 3、 ... and ) The time limit :2000 ms  |  Memory limit :65535 KB difficulty :5   describe General Nan is in charge of N A soldier , The soldiers were numbered 1~N, General Nan often likes to take the person with the highest number of enemies killed in a certain number and the person with the lowest number of enemies killed to enter ...

  5. ASPNET5 Dependency injection of

    ASP.NET5 The design is based on DI On the basis of , It can take advantage of the built-in framework in Startup class , Inject dependency into . Application services can also be configured for Injection . The default service container provides some basic functions , It is not intended to replace the modern mainstream DI ...

  6. 17.1.1.7 Setting Up Replication with New Master and Slaves Set up replication for new Master and Slaves:

    17.1.1.7 Setting Up Replication with New Master and Slaves Set up replication for new Master and Slaves: The easiest and most direct way is to set up replication to make ...

  7. Android System --Binder System specific framework analysis ( Two )Binder Driving scenario analysis

    Android System --Binder System specific framework analysis ( Two )Binder Driving scenario analysis 1. Binder Driving scenario analysis 1.1 There are three elements of interprocess communication Source Purpose :handle Express " service ", That is to ...

  8. SQL Date query in statement

    Let's first create a table : CREATE TABLE `student` ( `id` INT NOT NULL AUTO_INCREMENT , `name` VARCHAR(10) NULL COMMEN ...

  9. iptables The principle and application of firewall

    brief introduction (netfilter, be located Linux Packet filtering function system in kernel   , be called Linux Firewall “ Kernel mode ”) iptables The firewall works in the network layer , in the light of TCP/IP Packet filtering and restriction ,iptables prevent ...

  10. bate Edition instructions

    This game is a mobile game , Students can pass the time when they are bored , relax . Now there are only ten levels , The game is running fairly well . characteristic : Yes alpha Version has been modified , You can pause , Reopen , Return directory . The picture has also been optimized , Not as rough as before . swim ...