Source code description:
Backend technology stack:
The program is newly developed based on THINKPHP6+VUE, which greatly improves code execution efficiency while ensuring safety. The back-end management UI is based on the new version of the LayUI front-end framework, making the back-end management concise and clear for administrators to understand at a glance; at the same time, using RequireJs loading, the back-end management loading speed will be very fast. The backend is managed through RBAC authorization to ensure backend data security and reject malicious intrusions.
Front-end technology stack:
The front-end customer page uses Vue. Compared with traditional HTML pages, Vue page response speed is faster and smoother. The front-end and back-end separation technology not only improves the page loading speed, but also greatly improves the customer experience and makes the page closer to the native APP. Customer authorization and data interaction use a new front-end and back-end separation processing solution: Json Web Token (JWT). The header and payload content are signed during program data interaction to prevent content from being tampered with and ensure the security of the entire program data interaction.
Demo address: http://103.233.253.150:88/ (requires mobile browser to open)
Account number: 13800138000
Password: 123456
(Please contact customer service for back-end testing)
Source code statement: The system is only for learning and research. If it is used for other purposes, you will be responsible for it. The purchase representative agrees! ! ! !
Installation method
1. Upload website files to the website root directory
2. Import the database file into the database
3. Set pseudo-static to TP framework, and the running directory is /public
4. Configure the database: Open the file /config/database.php
5. Website backend: domain name/admin
----------------------------------------
Article 287-2 of the Criminal Law, Crime of Assisting Information Network Criminal Activities
Whoever, knowingly knowing that others are using information networks to commit crimes, provides technical support such as Internet access, server hosting, network storage, communication transmission, etc. for their crimes, or provides advertising promotion, payment and settlement, etc., shall be sentenced to fixed-term imprisonment of not more than three years or more if the circumstances are serious. The offender shall be sentenced to criminal detention and shall also or solely be fined. If a unit commits the crime in the preceding paragraph, the unit shall be fined, and the person directly in charge and other directly responsible personnel shall be punished in accordance with the provisions of paragraph 1. If the acts in the preceding two paragraphs constitute other crimes at the same time, they shall be convicted and punished in accordance with the provisions on heavier penalties.
================================================== =======
Announcement hereby: The source code comes from Internet sharing. The programs sold in this store are only for entertainment simulation testing and research. They may not be used for illegal purposes or violate national laws, otherwise you will be responsible for the consequences! All legal liability consequences of using it for other purposes after purchase will be borne by the purchaser and our store has nothing to do with it!