curl_exec() has been disabled for security reasons
这个从网页抓取信息,我在本地是成功的,为什么上传到服务器后就这样了,这样要改服务器的配置吗,但是服务器是不给我碰的。。。
回复讨论(解决方案)
查看下php.ini,或做一个页面,内容 phpinfo() ?> 看看
disable_functions中是否有curl_exec和curl_error这个方法,如果有,则把这两个方法在disable_functions中删除。
怎么删除,服务器不是我管理的,删除本地的也没用吧
echo ini_get("disable_function"); 输出看看
禁用了 所以服务器是不给你用这些方法去采集的。换地吧或者就在本地做

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Kernelsecuritycheckfailure (kernel check failure) is a relatively common type of stop code. However, no matter what the reason is, the blue screen error causes many users to be very distressed. Let this site carefully introduce 17 types to users. Solution. 17 solutions to kernel_security_check_failure blue screen Method 1: Remove all external devices When any external device you are using is incompatible with your version of Windows, the Kernelsecuritycheckfailure blue screen error may occur. To do this, you need to unplug all external devices before trying to restart your computer.

Flask-Security: Adding user authentication and password encryption to Python web applications As the Internet continues to develop, more and more applications require user authentication and password encryption to protect the security of user data. In the Python language, there is a very popular web framework-Flask. Flask-Security is an extension library based on the Flask framework, which can help developers easily

NginxProxyManager Security Analysis and Protection Introduction: In Internet applications, security has always been a crucial issue. As a powerful reverse proxy and load balancing server software, Nginx plays an important role in ensuring the security of network applications. However, with the continuous development of Internet technology and the increasing number of network attacks, how to ensure the security of NginxProxyManager has become an urgent problem to be solved. This article will start from NginxProxyMana

In back-end management systems, access permission control is usually required to limit different users' ability to access interfaces. If a user lacks specific permissions, he or she cannot access certain interfaces. This article will use the waynboot-mall project as an example to introduce how common back-end management systems introduce the permission control framework SpringSecurity. The outline is as follows: waynboot-mall project address: https://github.com/wayn111/waynboot-mall 1. What is SpringSecurity? SpringSecurity is an open source project based on the Spring framework, aiming to provide powerful and flexible security for Java applications.

BubblePal, a newly launched AI-based interactive toy, appears to be something that could have inspired the writers of the 2022 sci-fi/horror flick M3GAN, if it hadn’t just been launched last week. Based on large language model (LLM) technology, the ‘

BubblePal, a newly launched AI-based interactive toy, appears to be something that could have inspired the writers of the 2022 sci-fi/horror flick M3GAN, if it hadn’t just been launched last week. Based on large language model (LLM) technology, the ‘

An 18-year-old vulnerability, known as the "0.0.0.0 Day" flaw, has been disclosed to allow malicious websites to bypass security protocols in major web browsers, including Google Chrome, Mozilla Firefox, and Apple Safari. The flaw primarily

It is required that systems A, B, and C use the sso service to log in to systems A, B, and C to obtain three tokens: Atoken, Btoken, and Ctoken respectively. After one of the systems actively logs out, the other two systems also log out. All Atoken, Btoken, and Ctoken invalidation record tokenpom file introduces dependence on Redis database dependence on hutool: used to parse tokenorg.springframework.bootspring-boot-starter-data-rediscn.hutoolhutool-all5.7.13 token storage class to implement AuthJdbcToken
