可怕的$_SERVER
来源:互联网 发布:aix测试端口 编辑:程序博客网 时间:2024/04/28 07:09
Array (
[REDIRECT_HANDLER] => application/x-httpd-php
[REDIRECT_STATUS] => 200
[HTTP_ACCEPT] => */*
[HTTP_ACCEPT_LANGUAGE] => zh-CN
[HTTP_USER_AGENT] => Mozilla/4.0
(
compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727;
.NET CLR 3.5.30729;.NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E
)
[HTTP_ACCEPT_ENCODING] => gzip, deflate
[HTTP_HOST] => localhost:8080
[HTTP_CONNECTION] => Keep-Alive
[HTTP_COOKIE] => ECS
[visit_times]=30
[PATH] => C:\Program Files\MySQL\MySQL Server 5.5\bin;
C:\Program Files (x86)\AMD APP\bin\x86_64;
C:\Program Files (x86)\AMD APP\bin\x86;
C:\Windows\system32;C:\Windows;
C:\Windows\System32\Wbem;
C:\Windows\System32\WindowsPowerShell\v1.0\;
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static;;
C:\Program Files (x86)\Java\jre7\bin;
C:\Program Files (x86)\Java\jdk1.7.0_03\bin;
C:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;
C:\Program Files\Microsoft SQL Server\100\Tools\Binn\;
C:\Program Files\Microsoft SQL Server\100\DTS\Binn\;
[SystemRoot] => C:\Windows
[COMSPEC] => C:\Windows\system32\cmd.exe
[PATHEXT] => .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
[WINDIR] => C:\Windows
[SERVER_SIGNATURE] => [SERVER_SOFTWARE] => Apache/2.2.22 (Win32)
[SERVER_NAME] => localhost
[SERVER_ADDR] => 127.0.0.1
[SERVER_PORT] => 8080
[REMOTE_ADDR] => 127.0.0.1
[DOCUMENT_ROOT] => C:/phpdocs
[SERVER_ADMIN] => xxx@stone.com
[SCRIPT_FILENAME] => C:\phpdocs\test\Get_SystemInfo\client_info.php
[REMOTE_PORT] => 4752
[REDIRECT_URL] => /test/Get_SystemInfo/client_info.php
[GATEWAY_INTERFACE] => CGI/1.1
[SERVER_PROTOCOL] => HTTP/1.1
[REQUEST_METHOD] => GET
[QUERY_STRING] =>
[REQUEST_URI] => /test/Get_SystemInfo/client_info.php
[SCRIPT_NAME] => /test/Get_SystemInfo/client_info.php
[ORIG_SCRIPT_FILENAME] => C:/php/php-cgi.exe
[ORIG_PATH_INFO] => /test/Get_SystemInfo/client_info.php
[ORIG_PATH_TRANSLATED] => C:\phpdocs\test\Get_SystemInfo\client_info.php
[ORIG_SCRIPT_NAME] => /php/php-cgi.exe
[PHP_SELF] => /test/Get_SystemInfo/client_info.php
[REQUEST_TIME] => 1338279626
[argv] => Array ( )
[argc] => 0
)
[REDIRECT_HANDLER] => application/x-httpd-php
[REDIRECT_STATUS] => 200
[HTTP_ACCEPT] => */*
[HTTP_ACCEPT_LANGUAGE] => zh-CN
[HTTP_USER_AGENT] => Mozilla/4.0
(
compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727;
.NET CLR 3.5.30729;.NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E
)
[HTTP_ACCEPT_ENCODING] => gzip, deflate
[HTTP_HOST] => localhost:8080
[HTTP_CONNECTION] => Keep-Alive
[HTTP_COOKIE] => ECS
[visit_times]=30
[PATH] => C:\Program Files\MySQL\MySQL Server 5.5\bin;
C:\Program Files (x86)\AMD APP\bin\x86_64;
C:\Program Files (x86)\AMD APP\bin\x86;
C:\Windows\system32;C:\Windows;
C:\Windows\System32\Wbem;
C:\Windows\System32\WindowsPowerShell\v1.0\;
C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static;;
C:\Program Files (x86)\Java\jre7\bin;
C:\Program Files (x86)\Java\jdk1.7.0_03\bin;
C:\Program Files (x86)\Microsoft SQL Server\100\Tools\Binn\;
C:\Program Files\Microsoft SQL Server\100\Tools\Binn\;
C:\Program Files\Microsoft SQL Server\100\DTS\Binn\;
[SystemRoot] => C:\Windows
[COMSPEC] => C:\Windows\system32\cmd.exe
[PATHEXT] => .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
[WINDIR] => C:\Windows
[SERVER_SIGNATURE] => [SERVER_SOFTWARE] => Apache/2.2.22 (Win32)
[SERVER_NAME] => localhost
[SERVER_ADDR] => 127.0.0.1
[SERVER_PORT] => 8080
[REMOTE_ADDR] => 127.0.0.1
[DOCUMENT_ROOT] => C:/phpdocs
[SERVER_ADMIN] => xxx@stone.com
[SCRIPT_FILENAME] => C:\phpdocs\test\Get_SystemInfo\client_info.php
[REMOTE_PORT] => 4752
[REDIRECT_URL] => /test/Get_SystemInfo/client_info.php
[GATEWAY_INTERFACE] => CGI/1.1
[SERVER_PROTOCOL] => HTTP/1.1
[REQUEST_METHOD] => GET
[QUERY_STRING] =>
[REQUEST_URI] => /test/Get_SystemInfo/client_info.php
[SCRIPT_NAME] => /test/Get_SystemInfo/client_info.php
[ORIG_SCRIPT_FILENAME] => C:/php/php-cgi.exe
[ORIG_PATH_INFO] => /test/Get_SystemInfo/client_info.php
[ORIG_PATH_TRANSLATED] => C:\phpdocs\test\Get_SystemInfo\client_info.php
[ORIG_SCRIPT_NAME] => /php/php-cgi.exe
[PHP_SELF] => /test/Get_SystemInfo/client_info.php
[REQUEST_TIME] => 1338279626
[argv] => Array ( )
[argc] => 0
)
- 可怕的$_SERVER
- $_SERVER[PHP_SELF], $_SERVER[SCRIPT_NAME], $_SERVER['REQUEST_URI'] 的区别
- 可怕的SoftEther
- 可怕的程序溢出
- 最“可怕”的老师
- 六种最可怕的病毒
- 可怕的天气
- 可怕的口音
- 可怕的天网防火墙
- 可怕的肠粉事件
- 可怕的网络
- 女生挺可怕的
- 可怕的口音
- 可怕的冷漠
- 可怕的CET
- 可怕的无知
- 日本的“可怕”
- 可怕的早晨
- init.omap4pandaboard.rc & kernel support android system
- mfc常用方法关于窗体
- Jetspeed2学习笔记(二)(转载)
- Jetspeed2学习笔记(三)(转载)
- 信号与系统的三种变换
- 可怕的$_SERVER
- Activity与Service通信之BroadcastReceive
- 职场智慧之程序员的职业规划
- 将一个数组转换成深度最低的二叉树
- DBA工具——DMV——如何知道TSQL语句已运行了多久
- Tomcat下JSP、Servlet和JavaBean环境的配置
- MTK6573电源管理(PM)小结
- PHP 中的 SimpleXML 处理
- 《JavaScript DOM编程艺术》学习回顾4