JD's 10 billion subsidy has supported the issuance of enterprise's invoice April 24th Wolf mixed 3389 times 11 I don't know whether it was a conscience discovery or a request from the tax bureau. It was said that JD's 10 billion subsidy did not support the issuance of enterprise lettered invoices. Unexpectedly, less than a month later, it could issue enterprise lettered invoices. When I got off work yesterday, I saw a big guy in the group deliberately reminding me that 10 billion subsidies have supported the issuance of enterprise invoices. Without saying a word, I immediately opened the JD App, found the previous order, and opened it. I didn't expect that it would be really possible. Before ZhenTM, he was dead or alive, and it was useless to be tough on the phone. But if I can drive now, I will achieve what I thought read the whole passage tencent Blog security Jingdong Mall JD.COM
Blog Jump Page Optimization Record April 18th Wolf Happy sharing 3031 times 35 Blog comments will let friends leave links, mainly for the convenience of mutual visits, or where to find each other's links. However, some people like to promote everywhere. Of course, this is for those who want to advertise everywhere. Ordinary blogs don't care much about this. My blog has a jump page for a long time, which is mainly used to jump after base64 encoding. However, since one day, I have not automatically jumped. If I need to click the button again, I think it's inconvenient, not to mention read the whole passage Blog link security
Blog blocked by Tencent Security Website Center March 6th Wolf mixed 2509 times 34 I don't know when to intercept it, because I haven't paid attention to it. Until one day, when I clicked the blog link from Tencent's mailbox, I couldn't jump. I followed the prompts to enter a so-called detection center called Tencent Security - Website Security Center. The results are shown in the figure below, and there is really a so-called interception. Click Appealing in the figure above to open the following form, and submit according to the form. After submitting, wait. At the same time, the email will receive an email informing you that it has been submitted. Wait. There was a reply soon, and the result was read the whole passage tencent Blog security
Real name authentication is an excuse November 29, 2020 Wolf mixed 9378 times 33 Everywhere there are real names. Even a small enterprise wants people to provide the front and back of ID cards under the banner of real names. Who authorized you to collect them? That's too much. For such enterprises, I can only say that my money will be given to you. After all, for me, you are not worthy of my trust at all. Why does the other party need to provide ID card photos for payment? Don't take all kinds of reasons. It's just that you want to collect more ID card information. As for what you will do if you collect it, who knows and who promises? Look, in addition to the bank card account number, ID card read the whole passage security ID Real name authentication
QQ number with 8 digits for the first time August 2, 2020 Wolf mixed 11756 times 53 There are relatively few people using QQ now, but I still like QQ. There are not as many messy things as WeChat. I am always forced to upgrade in one way or another. I cannot use WeChat without my mobile phone. In short, compared with QQ, I definitely like QQ. But now many people just use WeChat, so I am forced to use WeChat more. A few days ago, I saw that @ wys posted many QQ numbers on the blog, saying that they would not use them until they expired. I have a look. There is an 8-digit QQ. My current QQ is more than ten years old read the whole passage QQ security
Is the digital browser specially designed to intercept Qiniuhe? November 26, 2014 Wolf Network information 7822 times 4 I believe many people will praise the service of Qiniuhe Youpai. The 7N acceleration makes it easier to generate an image directly, like I used to store static files. Then it was used as a map bed. Not long ago, it was renewed. Then these two excellent services, met the great digital companies, met the great digital browser, and became scary. They are malicious websites! Intercept! How scary! I was scared to urinate, and suddenly felt that the digital browser was safe, which gave me a security tip. Can see read the whole passage three hundred and sixty security Seven Cattle cloud storage Shoot the clouds again
Jinshan security guards are foolishly designed August 11, 2013 Wolf mixed 10055 times 7 Why do you say that? In fact, I have always thought that Kingsoft guards are very good. However, they also have the foundation to do security software. Although Kingsoft drug bullies are very bad, they are better than some software killers. That's why I have the idea and practice of supporting Kingsoft. In addition, I am also a heavy user of wps. However, I gave up the express disk and T disk of Jinshan. I really don't want to comment more. You can use them freely if you like. This time, a software of Kingsoft itself was installed from the software management of Kingsoft Guards read the whole passage Jinshan security for ipad
Almost all New Zealand formula milk powder in the Chinese market are fake brands April 18, 2013 Wolf Network information 8352 times 9 The New Zealand Milk Powder Export Association decided not to ignore more than 200 so-called "New Zealand formula brands" in the Chinese market, and took the initiative with its member enterprises to China to rectify the "fake" New Zealand milk powder. On April 13, the New Zealand Infant Formula Export Association said in Beijing that at present, there are more than 200 brands of formula from New Zealand sold in the Chinese market, but there are not many brands of real local enterprises in New Zealand, and at present read the whole passage security Powdered Milk
Domestic food safety, really tough safety November 28, 2012 Wolf Personal mood 8757 times 4 There are always some things that keep me busy. Look, the blog has not been updated for several days, and now the management of the website is more and more lazy. When the weather is cold, there is always a hint of laziness. It's still raining outside, and the clothes are not dry again. Recently, the weather has become a combination of underpants. However, I thought of a good idea at lunch this afternoon, which was also recognized by some colleagues, that is, I took my dry underwear to the company at work, hung it behind the chassis (the company is basically equipped with a desktop computer), played for 9 hours, and got off work read the whole passage Gray wolf security Powdered Milk
Easily and simply enhance wordpress security August 4, 2010 Wolf Network information 12628 times 11 No matter at any time, pay attention to the security of. php. Under the Linux host, you can use. htaccess to increase. Especially Wordpress. I use Wordpress now. Although it's OK to say that personal blogs are nothing, once some boring people see your blog, they will make trouble. It's also very uncomfortable, isn't it? The following steps are taken to modify the. htaccess and config files. to increase the security of the system. 1. Disable access read the whole passage wordpress htaccess config security