The first reflection is whether these properties of the verification code can be set (that is, whether they are encapsulated into a class and then used by exposing public properties and methods, or whether the verification is implemented directly in the general handler) Code generation to output), the result is unfortunately the latter... The algorithm inside feels pretty good, at least for someone like me who barely understands algorithms, so I thought of encapsulating it. She then shamelessly incorporated it into her own class library ^^
First analyze the shortcomings in this code (what she thinks):
1. For procedural programming, if you want to modify the verification code Properties, such as modifying font size, background color and other details, you need to find the relevant code in the general processing program and modify it. However, this code is better. It separates the verification code string generation and image generation in different methods, making it easy to find the places to be modified.
2. If I want to apply this function to other places, such as a winform program, then this code cannot be reused in the form of a component (a dll), but can be copied, pasted and modified...
3. I didn’t find that the verification code was saved after it was generated (- -!)
Of course, the so-called shortcomings are relative, that is, if you have time to think about it and then slowly design a verification code class, you will definitely It can make a relatively good class, but if you are working on a project and the project is urgent, such code is actually more powerful. The so-called object-oriented design pattern code decoupling is just a cloud~~~
The next step is my modification of this code. First, determine what effect I want, that is, how I want to use it after encapsulating it. First of all, I hope that when using it, I only need to create a new verification code instance (if necessary, I can set various attributes of the verification code arbitrarily), and then I can call certain methods of this instance to use strings, streams, bitmap objects, and byte respectively. Obtain this verification code in the form of an array (note that this verification code class does not include the function of saving the verification code into the context. Personally, I feel that generating the verification code and saving the verification code into the context are two different functions. There is no need to add this function. Do it in the verification code class). In this case, the code becomes extremely simple in the general processing program. First, just create a verification code with new, then call the method to obtain the verification code in the form of a string, and then save it in the morning and afternoon. As for whether it exists in the Session or Cookie It comes as needed, and the verification code class does not care about these; then it calls another method to obtain the verification code in the form of a byte array, so that the image can be output through the context.Response.BinaryWrite() method, that is to say There are only three lines of code in the general processing program. The calling code is roughly as follows:
/// <summary> /// 獲取驗(yàn)證碼(一般處理程序入口函數(shù)) /// </summary> /// <param name="context">當(dāng)前上下文</param> public void ProcessRequest(HttpContext context) { // 創(chuàng)建驗(yàn)證碼 ValidateCode validateCode = new ValidateCode(); // 獲取驗(yàn)證碼(字符串),寫入Session context.Session["SomeValidateCode"] = validateCode.GetString(); // 輸出驗(yàn)證碼(圖片) context.Response.BinaryWrite(validateCode.GetByteArray()); }
PS: I remember that when I first started working, the code was poorly written (worse than now). I usually used it directly when I got a copy of the code. I never thought about whether to use it. The code should be modified or encapsulated. I was taught by my master at that time and I was very impressed. Personally, I feel that there is nothing wrong with using other people's code. First of all, others have used it to at least prove the usability of the code. In addition, my IQ is limited. Some things you want to break your own are not as good as others, but you must not blindly use other people's code. Just use it. It is best to make necessary modifications or encapsulation according to your actual situation, even if it is just a simple layer. Of course, again, if the project is urgent, it is obviously a waste of time. In short, don’t think about it, use it as soon as you get it, at least make sure the key code or the overall structure of the code is clear.
For more encapsulated asp.net verification code related articles, please pay attention to the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

TheyieldkeywordinC#simplifiesiteratorcreationbyautomaticallygeneratingastatemachinethatenableslazyevaluation.1.Itallowsreturningitemsoneatatimeusingyieldreturn,pausingexecutionbetweeneachitem,whichisidealforlargeordynamicsequences.2.yieldbreakcanbeus

DependencyInjection(DI)inC#isadesignpatternthatenhancesmodularity,testability,andmaintainabilitybyallowingclassestoreceivedependenciesexternally.1.DIpromotesloosecouplingbydecouplingobjectcreationfromusage.2.Itsimplifiestestingthroughmockobjectinject

The role of IDisposable and using in C# is to efficiently and deterministically manage unmanaged resources. 1. IDisposable provides Dispose() method, so that the class can clearly define how to release unmanaged resources; 2. The using statement ensures that Dispose() is automatically called when the object is out of scope, simplifying resource management and avoiding leakage; 3. When using it, please note that the object must implement IDisposable, can declare multiple objects, and should always use using for types such as StreamReader; 4. Common best practices include not relying on destructors to clean up, correctly handling nested objects, and implementing the Dispose(bool) pattern.

LambdaexpressionsandLINQsimplifydatamanipulationinC#byenablingconcise,readable,andefficientcode.1.Lambdaexpressionsallowinlinefunctiondefinitions,makingiteasiertopasslogicasargumentsforfiltering,transforming,sorting,andaggregatingdatadirectlywithinme

Nullablereferencetypes(NRTs)inC#8 helpcatchNullReferenceExceptionerrorsatcompiletimebymakingreferencetypesnon-nullablebydefault,requiringexplicitdeclarationfornullability.NRTsmustbeenabledeitherinthe.csprojfilewithenableoratthetopofa.csfileusing#null

Four common "anti-pattern" problems in C# development need to be avoided. First, the unreasonable use of async/await leads to deadlocks or performance degradation. We should adhere to the principle of full asynchronousness, configure ConfigureAwait(false) and standardize naming; second, excessive dependence on var affects readability, and explicitly declare and unify team specifications when the type is unclear; third, the incorrect use of Dispose and resource management causes leakage, and the use statement should be used correctly and the IDisposable standard mode should be implemented; fourth, the abuse of static classes or singletons causes testing difficulties, and priority should be given to dependency injection, statelessness, or the life cycle managed by containers. Avoiding these misunderstandings can significantly improve code quality and maintenance.

Span and Memory improve C# performance by reducing memory allocation. 1. Span avoids array copying and provides light references to existing memory, which is suitable for parsing binary protocols, string operations and high-performance buffer management; 2. Memory supports passing memory slices across asynchronous methods, which is suitable for scenarios where more flexible life cycles are required; 3. Both reduce GC pressure, optimize performance by reusing buffers and avoiding temporary copying; 4. Span is limited to use on the stack and cannot be stored in classes or used in asynchronous methods. Be careful to avoid reassignment operations such as calling.ToArray().

SOLID principle is five design principles to improve code maintainability and scalability in object-oriented programming. They are: 1. The single responsibility principle (SRP) requires that the class only assumes one responsibility, such as separating report generation and email sending; 2. The opening and closing principle (OCP) emphasizes that the extension is supported through interfaces or abstract classes without modifying the original code, such as using the IShape interface to realize area calculation of different graphics; 3. The Richter replacement principle (LSP) requires that the subclass can replace the parent class without destroying logic, such as Square should not mistakenly inherit Rectangle, resulting in abnormal behavior; 4. The interface isolation principle (ISP) advocates the definition of fine-grained interfaces, such as split printing and scanning functions to avoid redundant dependencies; 5. The dependency inversion principle (DIP) advocates the
