摘要:判断是否属手机使用您使用的是移动设备访问
//判断是否属手机 function is_mobile() { $user_agent = $_SERVER["HTTP_USER_AGENT"]; $mobile_agents = Array("240x320","acer","acoon","acs-","abacho","ahong","airness","alcatel","amoi","android","anywhereyougo.com","applewebkit/525","applewebkit/532","asus","audio","au-mic","avantogo","becker","benq","bilbo","bird","blackberry","blazer","bleu","cdm-","compal","coolpad","danger","dbtel","dopod","elaine","eric","etouch","fly ","fly_","fly-","go.web","goodaccess","gradiente","grundig","haier","hedy","hitachi","htc","huawei","hutchison","inno","ipad","ipaq","ipod","jbrowser","kddi","kgt","kwc","lenovo","lg ","lg2","lg3","lg4","lg5","lg7","lg8","lg9","lg-","lge-","lge9","longcos","maemo","mercator","meridian","micromax","midp","mini","mitsu","mmm","mmp","mobi","mot-","moto","nec-","netfront","newgen","nexian","nf-browser","nintendo","nitro","nokia","nook","novarra","obigo","palm","panasonic","pantech","philips","phone","pg-","playstation","pocket","pt-","qc-","qtek","rover","sagem","sama","samu","sanyo","samsung","sch-","scooter","sec-","sendo","sgh-","sharp","siemens","sie-","softbank","sony","spice","sprint","spv","symbian","tablet","talkabout","tcl-","teleca","telit","tianyu","tim-","toshiba","tsm","up.browser","utec","utstar","verykool","virgin","vk-","voda","voxtel","vx","wap","wellco","wig browser","wii","windows ce","wireless","xda","xde","zte"); $is_mobile = false; foreach ($mobile_agents as $device) { if (stristr($user_agent, $device)) { $is_mobile = true; break; } } return $is_mobile; }使用
if( is_mobile() ){ echo "您使用的是移动设备访问"; }
文章版权归作者所有,未经允许请勿转载,若此文章存在违规行为,您可以联系管理员删除。
转载请注明本文地址:https://www.ucloud.cn/yun/21318.html
摘要:方法判断是否属手机调用您使用的是移动设备访问 方法 //判断是否属手机 function is_mobile() { $user_agent = $_SERVER[HTTP_USER_AGENT]; $mobile_agents = Array(240x320,acer,acoon,acs-,abacho,ahong,airness,alcatel,amoi,andro...
摘要:处在局域网之内的,由于有局域网出入口的网络设备的基本保护,相对于暴露在广域网中要安全不少,主要威胁对象基本控制在了可以接入局域网的内部潜在威胁者,和极少数能够突破最外围防线局域网出入口的安全设备的入侵者。 前言 对于任何一个企业来说,其数据库系统中所保存数据的安全性无疑是非常重要的,尤其是公司的有些商业数据,可能数据就是公司的根本。 失去了数据,可能就失去了一切 本章将针对mysql...
摘要:打算探索方式,利用搭建开发环境利用搭建开发环境。第二种,基于文件共享服务安装并配置软件仓库来安装服务程序服务程序中的参数以及作用全局参数。是否所有人可见,等同于参数。 由于买不起MAC PRO,所以想研究下在windows下进行php开发的最佳方式。打算探索方式, 利用vmware搭建php开发环境; 利用docker搭建php开发环境。 在网上看到vagrant问题颇多,所以不打...
摘要:自年以来,在智能家居市场的驱动下,智能猫眼市场膨胀速度惊人。移动侦测即人体感应当有人经过门前时会自动启动拍照或者录像功能记录来访者。而实时操作系统内核小巧,对任何中断指令都可以做到马上响应,系统启动时间则只有几秒钟。 1、背景 随着人工智能的迅速发展,智能家居的时代已经到来,除了智...
阅读 677·2023-04-25 17:33
阅读 3585·2021-07-29 14:49
阅读 2453·2019-08-30 15:53
阅读 3394·2019-08-29 16:27
阅读 1959·2019-08-29 16:11
阅读 982·2019-08-29 14:17
阅读 2390·2019-08-29 13:47
阅读 1983·2019-08-29 13:28