• Linux破解Navicat15


        本文所需步骤均在优麒麟20.10系统上实践(家目录:home/hollowman)
        本文默认在家目录中打开终端
        本文中的软件均默认下载和保存至家目录

    一、下载navicat应用程序

    官网地址:http://navicat.com.cn/download/navicat-premium,选择32/64位版本下载。
    可以发现这是一个AppImage后缀的文件,怎么说这个类型的文件呢?只能用 “惊喜” 来形容了。
    1.AppImage科普

    AppImage后缀的文件可称之为AppImage格式分发Linux桌面应用程序。它能让所有常见Linux发行版的用户运行它。 一次打包,无需安装,无需改变依赖或系统配置,只要给予执行权限即可运行。
    1)运行AppImage应用很简单:

    $ chmod a+x appname.AppImage  #增加执行权限
    $ ./appname.AppImage  #运行应用


    2)AppImage应用的特点:

    简单。AppImage的核心思想是一个应用程序 = 一个文件 。每个AppImage都包含应用程序以及应用程序运行所需的所有文件。换句话说,除了操作系统本身的基础组件,Appimage不需要依赖包即可运行。

    可靠。AppImage 格式是上游应用打包的理想选择,这意味着你可以直接从开发者那里获取软件,而不需要任何中间步骤,这完全符合开发者意图。非常迅速。

    快速。AppImage应用可以直接下载并且运行,无需安装,并且不需要root权限。
    3)更多内容

    AppImage网站:https://appimage.org/
    AppImage资源:https://bintray.com/probono/AppImages
    2.JH思路
    1)修改原公钥(通过patcher工具来实现)
    2)根据新公钥生成(通过keygen工具来实现)
    二、提取AppImage应用程序中的文件

    修改公钥文件,首先需要将AppImage应用程序中包含的文件提取到一个新的目录中。
    这一步的思路是:将AppImage进行挂载—将挂载目录中的只读文件复制到一个新的目录-取消挂载

    hollowman@hollowman-F117:~$ mkdir navicat15-premium-cs
    hollowman@hollowman-F117:~$ sudo mount -o loop navicat15-premium-cs.AppImage  navicat15-premium-cs
    mount: /home/hollowman/navicat15-premium-cs: WARNING: source write-protected, mounted read-only.
    hollowman@hollowman-F117:~$ cp -r navicat15-premium-cs navicat15-premium-cs-bak
    hollowman@hollowman-F117:~$ sudo umount navicat15-premium-cs
    hollowman@hollowman-F117:~$ rm -rf navicat15-premium-cs 



    三、编译patcher和keygen

    patcher和keygen两个工具是由navicat-keygen编译后生成的,但navicat-keygen需要下载,而且它的编译还需要先解决依赖问题。
    1.安装需要的依赖包

    capstone、keystone、rapidjson、openssl,确保你的gcc支持C++17特性。

    #安装capstone
    hollowman@hollowman-F117:~$ sudo apt install libcapstone-dev
    #安装keystone
    hollowman@hollowman-F117:~$ sudo apt install cmake hollowman@hollowman-F117:~$ sudo apt install git hollowman@hollowman-F117:~$ git clone https://github.com/keystone-engine/keystone.git hollowman@hollowman-F117:~$ cd keystone hollowman@hollowman-F117:~/keystone$ mkdir build hollowman@hollowman-F117:~/keystone$ cd build hollowman@hollowman-F117:~/keystone/build$ ../make-share.sh hollowman@hollowman-F117:~/keystone/build$ sudo make install hollowman@hollowman-F117:~/keystone/build$ sudo ldconfig
    #安装rapidjson
    hollowman@hollowman-F117:~/keystone/build$ sudo apt install rapidjson-dev
    #安装openssl
    hollowman@hollowman-F117:~/keystone/build$ sudo apt install openssl



    2.编译navicat-keygen

    hollowman@hollowman-F117:~/keystone/build$ cd ~
    hollowman@hollowman-F117:~$ git clone -b linux --single-branch https://gitee.com/andisolo/navicat-keygen.git
    hollowman@hollowman-F117:~$ cd navicat-keygen
    hollowman@hollowman-F117:~/navicat-keygen$ make all



    此时,navicat-keygen目录下会生成一个bin目录,并且bin目录下也会生成两个文件keygen和patcher,下面的工作就要重点围绕这两个可执行文件来操作了。
    四、通过navicat-patcher命令来修改原公钥

    原公钥就在刚才我们从AppImage安装包中提取到的目录navicat15-premium-cs-bak内。前面也提到,修改公钥用到的工具是patcher。同时产生一个RSA-2048私钥文件RegPrivateKey.pem(存储于 navicat-keygen目录下)。
    语法:navicat-patcher [--dry-run] <Navicat Installation Path> [RSA-2048 Private Key File]

    hollowman@hollowman-F117:~/navicat-keygen$ ./bin/navicat-patcher ../navicat15-premium-cs-bak/
    **********************************************************
    *       Navicat Patcher (Linux) by @DoubleLabyrinth      *
    *                  Version: 1.0                          *
    **********************************************************
    
    Press ENTER to continue or Ctrl + C to abort.
    
    [+] Try to open libcc.so ... Ok!
    
    [+] PatchSolution0 ...... Ready to apply
        RefSegment      =  1
        MachineCodeRva  =  0x000000000141fbf0
        PatchMarkOffset = +0x0000000002a25648
    
    [*] Generating new RSA private key, it may take a long time...
    [*] Your RSA private key:
        -----BEGIN RSA PRIVATE KEY-----
        MIIEpAIBAAKCAQEAoGGlxu8ihpmwySW+sSvO9aaQ2OLlabD0xpEWcb29VmKF3Oj5
        R07MQ9Q6uSdvtp10nXQ6B1loezHVEU0mEvEap1oJhZATxn+SXWfHMylfQ/6+0PIg
        7IFW+6spIZ8XDX2jeuvU2XlXfVqSzbqykp8YmK3UwtyuEBpGmuv4xB0G+puwJ6gq
        dWXNbclrU2FGdSgViRN6DHyu9Z3RIn5sRygINeFjcBrRFb4ZOqYR+VlKxyuSBtsr
        zZO+1HfsC1Z+XRxHZTqtFHvWqOPe4Htm9xAZ85l2Xy5Hn4UN8CnWwIjJN67spKg/
        GdbEZwddiEYEdq0Y9AwykDxrUQGlLrbroc4atQIDAQABAoIBACzqa/UEr9SmYj5T
        Fc6kiDd/yH0VPk6VQlgB9hkwnD//I6I0lOuFg+tTGocUJlMsUaZvEHlSbtJhqFxK
        EOmpIF/R9Wy0ZvVmcOU71Svc4FM4mtQFm3bg2i1tR/2kgl5C22/ncBrfwsLWhNqc
        +LnbWJYZyMYx64WS9kcY4vh5cKTqV6tj9h8IRarl/MYrCCwY3HRzhl6lTQafZGUa
        wFI4xiGs3NEx41KWLjPdC1K4Tjc7VPI0KBXwSb7ve9kWee+uHIpKzFJfXNV43h1U
        9V2sBmuzdguLm3I9KsQ/lk92OD/0EsLshjPX2dT0yUrreVW+XtgbPTXEPF9Cc32/
        Ve9/zIECgYEAzxv28tVs3AYRVSAtGujIIMcVn6HcgfgzIMuBmJSN5oOgb7OhYRF4
        o11QBgMTDDMhRq08VhJm5SLEizscF/4ynXQSvHj0ozzlUBE8kqzbFYBLcz0CFXry
        l/qk9AXcB1394oPd36feQZx+YyanpAgLTKpQZHARMw0oNGciZ+VJMeUCgYEAxj3T
        ghCjYHEuOuikFVr8G/YEgkNoo8V604mTHBoGR2CWuZKXx/ANxPLas+XuwAV4kGYT
        EqBcsjRY/Bn67C9SYbbOowNOFM75EXFjju6bDxxFesrkNfd74QgJd3ummKVTm0GT
        /PfCJX8KU9jrHVNhxNVLlv1OiLIcL04qfKrH+JECgYEAm9xHs+e5zLskQBO+3glg
        0ooAU+nTsFvA3mVIWjMxttBH5MgiIpKrXwXSOzQFGaFA4ZdtWLjwhm/ryXvqYIQE
        Q0oe74d3U4F4cREHrLo5Ba1PGqJG9zNXbdhKWvot471wWw8x4ibKtEW5N5TXhDIp
        jsB9T5im2OyF3SngUp/SvaECgYAhcvknLwuCEFbOlcZp3ApB5YbpO9qCF6Yb31C1
        IycAECoecb+uerC4FIoWZKueNs4a/z4knG5Hm1GQaAnQpENwPVosYzhfhnS8Hre/
        vD7pk8mdaHKNMI70b1i5kmGPzAWJYs1Hl75oeUES2L0DG7iZb6vrdB42LmdXDAdb
        Na28IQKBgQCGZ0A73ZE3pV5899/qtYd006zOrZ6L3BAjKJQRAgnCiKbk8flAV4Ij
        GRRNwATM0jRQNkl/OfnAG4dnPlGg0/raQatWrX4yac9wk+leo8pl8tceJtRIEVa4
        4vsB3HpZmNdNylWYt7JGFG/BVRfOCGTWNjuiw0CneEIE2cm+Ab9d4g==
        -----END RSA PRIVATE KEY-----
    [*] Your RSA public key:
        -----BEGIN PUBLIC KEY-----
        MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoGGlxu8ihpmwySW+sSvO
        9aaQ2OLlabD0xpEWcb29VmKF3Oj5R07MQ9Q6uSdvtp10nXQ6B1loezHVEU0mEvEa
        p1oJhZATxn+SXWfHMylfQ/6+0PIg7IFW+6spIZ8XDX2jeuvU2XlXfVqSzbqykp8Y
        mK3UwtyuEBpGmuv4xB0G+puwJ6gqdWXNbclrU2FGdSgViRN6DHyu9Z3RIn5sRygI
        NeFjcBrRFb4ZOqYR+VlKxyuSBtsrzZO+1HfsC1Z+XRxHZTqtFHvWqOPe4Htm9xAZ
        85l2Xy5Hn4UN8CnWwIjJN67spKg/GdbEZwddiEYEdq0Y9AwykDxrUQGlLrbroc4a
        tQIDAQAB
        -----END PUBLIC KEY-----
    
    *******************************************************
    *                   PatchSolution0                    *
    *******************************************************
    [*] Previous:
    +0x0000000000000070                          01 00 00 00 05 00 00 00          ........
    +0x0000000000000080  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000000000090  00 00 00 00 00 00 00 00 48 56 a2 02 00 00 00 00  ........HV......
    +0x00000000000000a0  48 56 a2 02 00 00 00 00 00 10 00 00 00 00 00 00  HV..............
    [*] After:
    +0x0000000000000070                          01 00 00 00 05 00 00 00          ........
    +0x0000000000000080  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000000000090  00 00 00 00 00 00 00 00 d8 57 a2 02 00 00 00 00  .........W......
    +0x00000000000000a0  d8 57 a2 02 00 00 00 00 00 10 00 00 00 00 00 00  .W..............
    
    [*] Previous:
    +0x0000000002a25640                          00 00 00 00 00 00 00 00          ........
    +0x0000000002a25650  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25660  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25670  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25680  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25690  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256a0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256b0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256c0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256d0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256e0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a256f0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25700  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25710  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25720  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25730  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25740  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25750  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25760  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25770  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25780  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a25790  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a257a0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a257b0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a257c0  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    +0x0000000002a257d0  00 00 00 00 00 00 00 00                          ........        
    [*] After:
    +0x0000000002a25640                          ef be ad de 4d 49 49 42          ....MIIB
    +0x0000000002a25650  49 6a 41 4e 42 67 6b 71 68 6b 69 47 39 77 30 42  IjANBgkqhkiG9w0B
    +0x0000000002a25660  41 51 45 46 41 41 4f 43 41 51 38 41 4d 49 49 42  AQEFAAOCAQ8AMIIB
    +0x0000000002a25670  43 67 4b 43 41 51 45 41 6f 47 47 6c 78 75 38 69  CgKCAQEAoGGlxu8i
    +0x0000000002a25680  68 70 6d 77 79 53 57 2b 73 53 76 4f 39 61 61 51  hpmwySW+sSvO9aaQ
    +0x0000000002a25690  32 4f 4c 6c 61 62 44 30 78 70 45 57 63 62 32 39  2OLlabD0xpEWcb29
    +0x0000000002a256a0  56 6d 4b 46 33 4f 6a 35 52 30 37 4d 51 39 51 36  VmKF3Oj5R07MQ9Q6
    +0x0000000002a256b0  75 53 64 76 74 70 31 30 6e 58 51 36 42 31 6c 6f  uSdvtp10nXQ6B1lo
    +0x0000000002a256c0  65 7a 48 56 45 55 30 6d 45 76 45 61 70 31 6f 4a  ezHVEU0mEvEap1oJ
    +0x0000000002a256d0  68 5a 41 54 78 6e 2b 53 58 57 66 48 4d 79 6c 66  hZATxn+SXWfHMylf
    +0x0000000002a256e0  51 2f 36 2b 30 50 49 67 37 49 46 57 2b 36 73 70  Q/6+0PIg7IFW+6sp
    +0x0000000002a256f0  49 5a 38 58 44 58 32 6a 65 75 76 55 32 58 6c 58  IZ8XDX2jeuvU2XlX
    +0x0000000002a25700  66 56 71 53 7a 62 71 79 6b 70 38 59 6d 4b 33 55  fVqSzbqykp8YmK3U
    +0x0000000002a25710  77 74 79 75 45 42 70 47 6d 75 76 34 78 42 30 47  wtyuEBpGmuv4xB0G
    +0x0000000002a25720  2b 70 75 77 4a 36 67 71 64 57 58 4e 62 63 6c 72  +puwJ6gqdWXNbclr
    +0x0000000002a25730  55 32 46 47 64 53 67 56 69 52 4e 36 44 48 79 75  U2FGdSgViRN6DHyu
    +0x0000000002a25740  39 5a 33 52 49 6e 35 73 52 79 67 49 4e 65 46 6a  9Z3RIn5sRygINeFj
    +0x0000000002a25750  63 42 72 52 46 62 34 5a 4f 71 59 52 2b 56 6c 4b  cBrRFb4ZOqYR+VlK
    +0x0000000002a25760  78 79 75 53 42 74 73 72 7a 5a 4f 2b 31 48 66 73  xyuSBtsrzZO+1Hfs
    +0x0000000002a25770  43 31 5a 2b 58 52 78 48 5a 54 71 74 46 48 76 57  C1Z+XRxHZTqtFHvW
    +0x0000000002a25780  71 4f 50 65 34 48 74 6d 39 78 41 5a 38 35 6c 32  qOPe4Htm9xAZ85l2
    +0x0000000002a25790  58 79 35 48 6e 34 55 4e 38 43 6e 57 77 49 6a 4a  Xy5Hn4UN8CnWwIjJ
    +0x0000000002a257a0  4e 36 37 73 70 4b 67 2f 47 64 62 45 5a 77 64 64  N67spKg/GdbEZwdd
    +0x0000000002a257b0  69 45 59 45 64 71 30 59 39 41 77 79 6b 44 78 72  iEYEdq0Y9AwykDxr
    +0x0000000002a257c0  55 51 47 6c 4c 72 62 72 6f 63 34 61 74 51 49 44  UQGlLrbroc4atQID
    +0x0000000002a257d0  41 51 41 42 ad de ef be                          AQAB....        
    
    [*] Previous:
    +0x000000000141fbf0  44 0f b6 24 18 48 8b 44 24 28 8b 50 f8 85 d2 79  D..$.H.D$(.P...y
    +0x000000000141fc00  6f                                               o               
    [*] After:
    +0x000000000141fbf0  45 31 e4 48 8d 05 52 5a 60 01 90 90 90 90 90 90  E1.H..RZ`.......
    +0x000000000141fc00  90                                               .               
    
    [*] New RSA-2048 private key has been saved to
        /home/hollowman/navicat-keygen/RegPrivateKey.pem
    
    *******************************************************
    *           PATCH HAS BEEN DONE SUCCESSFULLY!         *
    *                  HAVE FUN AND ENJOY~                *
    *******************************************************



    五、将文件重新打包成AppImage

    修改公钥之后,再重新打包成AppImage应用程序,就可以运行并完成JH工作了。
    打包成AppImage需要用到打包工具:appimagetool-x86_64.AppImage。

    hollowman@hollowman-F117:~/navicat-keygen$ cd ..
    hollowman@hollowman-F117:~$ wget 'https://github.com/AppImage/AppImageKit/releases/download/continuous/appimagetool-x86_64.AppImage'
    hollowman@hollowman-F117:~$ chmod +x appimagetool-x86_64.AppImage
    hollowman@hollowman-F117:~$ ./appimagetool-x86_64.AppImage navicat15-premium-cs-bak/ navicat15-premium-cs-2.AppImage



    六、运行修改打包后的AppImage应用程序

    hollowman@hollowman-F117:~$ chmod +x ~/Desktop/navicat15-premium-en-patched.AppImage
    hollowman@hollowman-F117:~$ ./navicat15-premium-cs-2.AppImag



    出现注册界面,暂时保留界面,进入第七步。


    在这里插入图片描述
    七、使用 navicat-keygen 来生成序列号和JH码。

    语法: navicat-keygen <--bin|--text> [--adv] <RSA-2048 Private Key File>

    回到家目录,右键新建一个终端,并切换至navicat-keygen子目录

    hollowman@hollowman-F117:~$ cd navicat-keygen
    hollowman@hollowman-F117:~/navicat-keygen$ ./bin/navicat-keygen --text ./RegPrivateKey.pem




    按提示选择Navicat产品类别(1.Premium)、Navicat语言版本(1.)和填写主版本号(15),随后生成一个序列号,输入用户名和组织,出现Input request code in Base64: (Double press ENTER to end)
    保留界面,进入第八步。

    hollowman@hollowman-F117:~/navicat-keygen$ ./bin/navicat-keygen --text ./RegPrivateKey.pem 
    **********************************************************
    *       Navicat Keygen (Linux) by @DoubleLabyrinth       *
    *                   Version: 1.0                         *
    **********************************************************
    
    [*] Select Navicat product:
     0. DataModeler
     1. Premium
     2. MySQL
     3. PostgreSQL
     4. Oracle
     5. SQLServer
     6. SQLite
     7. MariaDB
     8. MongoDB
     9. ReportViewer
    
    (Input index)> 1
    
    [*] Select product language:
     0. English
     1. Simplified Chinese
     2. Traditional Chinese
     3. Japanese
     4. Polish
     5. Spanish
     6. French
     7. German
     8. Korean
     9. Russian
     10. Portuguese
    
    (Input index)> 1
    
    [*] Input major version number:
    (range: 0 ~ 15, default: 12)> 15
    
    [*] Serial number:
    NAVI-EL2T-KC4E-AXSB
    
    [*] Your name: hollowman
    [*] Your organization: hollowman.cn
    
    [*] Input request code in Base64: (Double press ENTER to end)  #下面的内容来自第八步
    BRCHuaAA6mZcKtAF+GVYi9D2PT2mdv/VOjdt5QZPmsI4h97jBwZpaSLyaqyIlrk0jQCkpHykVVe7ACM7bG2geIX8noh+mZHuoiqjqyEkqFnqreogoKlKdQIhTkrcd+lRAdQLe4vKfW2BBRmIU9W8k9gbuJFKsjhjTgJx56C0UoQUwOZy6Hk494sxEivgGJDloU2MmfstUwyhmu6fVnxLK2HLI7cEktJwTKlwHO/TpSan52PcnoUdg+LjSqEvNsxWnqYBBCXhQyglIujL1BRBOMQhtCg4Tl5jzV2hNANAz92MM8wvuX+E2QcbJzECz2kFw1kY82oAKKMppZ/NV+9n9g==
    [回车][回车]
    [*] Request Info:
    {"K":"NAVIEL2TKC4EAXSB", "DI":"5A5F27B4C81005031C5C", "P":"linux"}
    
    [*] Response Info:
    {"K":"NAVIEL2TKC4EAXSB","DI":"5A5F27B4C81005031C5C","N":"hollowman","O":"hollowman.cn","T":1611062799}
    
    [*] Activation Code:  #将以下代码复制到第八步手动JH窗口的JH码中
    c7atgCDjgvJXwiItxOWWLQcF7daMdeaZ9OQipbniWQHt63KOdVYvK/8fCdUr4f5pfsMO95r7SHqQYBzht6WDYoV8GQ39Hf8o0ISx9I1NlPwiBx4I1zZ09GiGf4VQ26YWurVw1GoWWcGrk8Yqxdta92ZbC1/MdZxYvYb89LX+mapdWA31lF4thuVgSjmJMSniuKVYcQaxHovVLlNBw6vmySTqosmQIqH4nwJkZkyMLQXn+gQ19uc5rk5HX4zlxnRzwjrU77cRTLQVIk2mw6F74mhwXqLuwyFRooxNK5JlLAg2cC/zVhfM/KcK5pc12kpy2dAnKIAA6qrocrT3EPjQLA==



    八、输入序列号注册(会提示注册失败)并转入手动JH
    1.断开网络. 找到第六步未关闭的注册窗口,填写keygen给你的 序列号。


    2.一般会提示失败,在弹出的提示中选择手动,弹出如下窗口。


    3.复制请求码中的字符串到第七步中新建的终端,也就是Input request code in Base64: (Double press ENTER to end)下面,连续2次回车
    4.回车后,终端中将生成一串JH码,复制粘贴到手动JH窗口,点击OK

     
    九、使用

    至此,只要切换到navicat15-premium-cs-2.AppImage所在目录,并运行它,就可以正常使用了。
    当然,你也可以将该应用程序移动或复制到你想要保存的目录。一个打包的文件完成一个应用程序的工作,只能再次用“惊喜”来形容。

    hollowman@hollowman-F117:~$ ./navicat15-premium-cs-2.AppImage



    效果图1张:


    参考资源:

        https://gitee.com/andisolo/navicat-keygen
        https://appimage.org/

    原文链接:https://blog.csdn.net/ymz641/article/details/112853932

  • 相关阅读:
    jsp中${pageContext.request.contextPath}的意思
    Linux系统(centos)同步时间方式
    Tomcat启动报错 Failed to start component [StandardServer[8005]]解决
    有根树
    轻重链剖分/长短链剖分
    CF1389G
    9.12模拟总结
    [POI2014]HOT-Hotels加强版
    可持久/可回退化数据结构
    PA2014 Muzeum
  • 原文地址:https://www.cnblogs.com/xing-29391/p/15600973.html
Copyright © 2020-2023  润新知