;;;;;;;;;;;;;;;;;;;
8)3*6+D ; About this file ;
Rz/gtEP ;
%y[h5*y* ; 关于这个文件
DGF5CK.O ;
CL;}IBd a ;;;;;;;;;;;;;;;;;;;
~.nmI&3 ;
~2N"#b&J ; This is the recommended, PHP 4-style version of the php.ini-dist file. It
J#(LlCs?@c ; sets some non standard settings, that make PHP more efficient, more secure,
j#x6
; and encourage cleaner coding.
}W8;=$jr ;
9uO 2Mm ;
|O+H[;TB6 ; 这个是推荐的,PHP 4 版本类型的 php.ini-dist 文件,他设置了一些非标准的设置,他们使得
)
7@ `ut ; PHP更加有效,更加安全,鼓励整洁的编码。
+oML&g-g_ ;
gp?uHKsM ;
6ex/TySM ; The price is that with these settings, PHP may be incompatible with some
: /N0!&7 ; applications, and sometimes, more difficult to develop with. Using this
9};8?mucr ; file is warmly recommended for production sites. As all of the changes from
Fb>?1i`RN ; the standard settings are thoroughly documented, you can go over each one,
FUb\e-Q= ; and decide whether you want to use it or not.
+Q)XH>jh ;
u@M,qo` ;
]Sz:|%JP1 ; 这样做的代价是,某些应用程序可能在这样的配置下不兼容,在某些情况下,开发会更加困难。
e}7lBLK]* ; 使用这个文件是我门对建设站点的热心建议。每个标准设置的改变都有彻底的说明稳当,你可以
n\'4 ; 处理没一个,决定是否使用他们。
1#2 I ;
B{#I:Rs9 ;
(gU!=F?#m ; For general information about the php.ini file, please consult the php.ini-dist
[ 5b--O ; file, included in your PHP distribution.
a0E)2vt4 ;
Y('#jU ;
hEH?[>9 ; 关于 php.ini 的一般信息,请参考 php.ini-dist 文件,包括你的 PHP 的说明
rfg'G&A( ;
`25yE/ ;
69NeQ$]( ; This file is different from the php.ini-dist file in the fact that it features
w3_>VIZJl ; different values for several directives, in order to improve performance, while
pa3{8x{9m ; possibly breaking compatibility with the standard out-of-the-box behavior of
H@>` F ; PHP 3. Please make sure you read what's different, and modify your scripts
i$#;Kpb`^ ; accordingly, if you decide to use this file instead.
5H9z4-i x? ;
gPO}d ;
((;!<5-`s ; 这个文件和 php.ini-dist 的区别在于它给予了一些指示不同的值,来提高性能,同时可能破坏了
Eyqa?$R ; PHP 3 的标准的 out-of-the-box 特性。
@n /nH?L ;
b\!_cb~ "@ ;
$( kF# ; - register_globals = Off [Security, Performance]
LA5(sp@O ; Global variables are no longer registered for input data (POST, GET, cookies,
0i>5<ej,f ; environment and other server variables). Instead of using $foo, you must use
k%#EEMh ; you can use $_REQUEST["foo"] (includes any variable that arrives through the
"Gzz4D ; request, namely, POST, GET and cookie variables), or use one of the specific
FVbb2Y?R ; $_GET["foo"], $_POST["foo"], $_COOKIE["foo"] or $_FILES["foo"], depending
Lg.gfny[(t ; on where the input originates. Also, you can look at the
8/cX]J ; import_request_variables() function.
5Ln,{vsv ; Note that register_globals is going to be depracated (i.e., turned off by
M
FMs[+2_o ; default) in the next version of PHP, because it often leads to security bugs.
1n8/r}q'H ; Read
http://php.net/manual/en/security.registerglobals.php for further
&wawr2)} ; information.
Q"d^_z]K ;
&PHTpkaam ;
Bm<`n;m ; 全局变量不再注册输入的数据(POST,GET,cookies,环境变量和其他的服务器变量)。作为代替的是使用
ltSU fI ; $foo, 你必须使用 $_REQUEST["foo"] ( 包括所有的通过请求传来的变量,也就是说,POST,GET,和
k]|~>9eY] ; cookies 变量)或者根据输入的来源使用指定的 $_GET["foo"],$_POST["foo"],$_COOKIE["foo"]
$8h%a
8I ; ,$_FILES["foo"] (访问他们).同时,你可以查看 import_request_variables()函数。
lfgq=8d ;
/Cr%{'Pzk ; 注意,这个参数可能在下个版本去掉(默认为off),因为他经常引起安全 bugs.到
;ef}}K ;
http://php.net/manual/en/security.registerglobals.php o:'MpKm ; 查看详细内容
GL}]y -f ;
ec;o\erPG ;
}R2u@%n{ ; - display_errors = Off [Security]
J]'zIOQ ; With this directive set to off, errors that occur during the execution of
^uc=f2=>, ; scripts will no longer be displayed as a part of the script output, and thus,
G e@{_ ; will no longer be exposed to remote users. With some errors, the error message
iWkWR"ysy ; content may expose information about your script, web server, or database
h,N?Ab'S ; server that may be exploitable for hacking. Production sites should have this
adcE'fA<_ ; directive set to off.
EME|k{W ;
;JT-kw6l5K ;
Ll't>) ; 设置这个指示为Off,在脚本执行期间发生错误时,不再将错误作为输出的一部分显示,这样就不会暴露给
YkSl^j[DHs ; 远端用户。对于某些错误,错误信息的内容可能暴露你的脚本,web服务器,数据库服务器的信息,可能被
+Kc ; 黑客利用。最终产品占点需要设置这个指示为off.
nR~@#P\ ;
T?0eVvM ;
(5YM?QAd ; - log_errors = On [Security]
vA{-{Q ; This directive complements the above one. Any errors that occur during the
(%6P0* ; execution of your script will be logged (typically, to your server's error log,
Nai2W<, ; but can be configured in several ways). Along with setting display_errors to off,
Sz`,X0a ; this setup gives you the ability to fully understand what may have gone wrong,
rs[T=C Q ; without exposing any sensitive information to remote users.
;[DU%f ;
zC!t;*8a ;
$h"\N$iSq
; 这个指示补充上面的。所有的发生在脚本运行期间的错误都会纪录在日志中(代表性的,记录在服务器的错误
9cF[seE"0 ; 日志中,但是可以配置不同的方式)。随着 display_errors 设置为 off,这个设置给你全面了解到底什么
]%H`_8<gc ; 发生错误的能力,而不会向远端用户暴露任何信息。
>tr}|> ;
tDcT%D {: ;
q<|AZ2Ai ; - output_buffering = 4096 [Performance]
#trK^( ; Set a 4KB output buffer. Enabling output buffering typically results in less
(?c"$|^J ; writes, and sometimes less packets sent on the wire, which can often lead to
Rhs/3O8k ; better performance. The gain this directive actually yields greatly depends
7n<{tM ; on which Web server you're working with, and what kind of scripts you're using.
{JT&w6Jz ;
f8dB-FlMm ;
&p@O_0nF ; 设置 4KB 的输出缓冲区。打开输出缓冲可以减少写的次数,有时减少线路发送包的数量,这样能提高性能。
6nvz8f3*r] ; 这个指示真正得到的益处很大程度的依赖于你的工作的 WEB 服务器,以及你使用的脚本。
Yj49t_$b ;
wn%A4-%{ ;
p6V0`5@t ; - register_argc_argv = Off [Performance]
(L&d!$,Dv ; Disables registration of the somewhat redundant $argv and $argc global
bI1N@= ; variables.
{!L~@r ;
/([kh~a ;
Lqa4Vi ; 禁止注册某些多于的 $argv 和 $argc 全局变量
%tGO?JMkd ;
^yp{32 ;
N4!O.POP ; - magic_quotes_gpc = Off [Performance]
Ti5-6%~& ; Input data is no longer escaped with slashes so that it can be sent into
r,p%U!S<hV ; SQL databases without further manipulation. Instead, you should use the
ZY+qA ; function addslashes() on each input element you wish to send to a database.
q0vQa ;
u6JM]kR ;
V)25$aKW7 ; 输入数据不再被斜线转义,以便于无需更多的处理就可以发送到SQL数据库里面。作为代替,你可
Svmy(w~m ; 以对每个要发送到数据库的输入元素使用 addslashes()函数。
Y$_B1_ ;
wc4=VC"y ;
0GeTSFj ; - variables_order = "GPCS" [Performance]
WOap+ ; The environment variables are not hashed into the $HTTP_ENV_VARS[]. To access
gM:".Ee ; environment variables, you can use getenv() instead.
(\x]YMLH ;
f
;n3&e0eC ; 环境变量不再进入 $HTTP_ENV_VARS[],你需要用 getenv()来访问环境变量。
Fx.=#bVX7 ;
%h!B^{0 ;
sO@Tf\d ; - error_reporting = E_ALL [Code Cleanliness, Security(?)]
zrb}_ ; By default, PHP surpresses errors of type E_NOTICE. These error messages
Q![@c ; are emitted for non-critical errors, but that could be a symptom of a bigger
8d'0N ; problem. Most notably, this will cause error messages about the use
W'TZ%K) I ; of uninitialized variables to be displayed.
f-Z/tfC ;
S,he6zS ;
t{{QE:/ ; 默认的,PHP 给出 E_NOTICE 错误类型,这些错误信息不是核心错误,但是可能是个更大错误的隐患。
b\2
ds, ; 大多数提醒是那些没有初始化变量引起的错误信息。
~4'$yWG ;
FZnw0tMq ;
3!]rmZ-W ; - allow_call_time_pass_reference = Off [Code cleanliness]
xA*<0O\V ; It's not possible to decide to force a variable to be passed by reference
> ~O.@| ; when calling a function. The PHP 4 style to do this is by making the
tWcHb # ; function require the relevant argument by reference.
JWxwJex ;
gPPkT" ;
ym1Y4, ; 在调用函数时,不可能决定强制传递变量的引用。PHP 4 里通过函数请求相关参数的引用来实现
@q)d ;
P&Vv/D ;
<e6#lFQqK OneY_<*a< ;;;;;;;;;;;;;;;;;;;;
Q=$2c[Uk ; Language Options ;
K}Qa~_ ;
vFmZ<C'
) ;
3bI9Zt#J%& ; 语言配置
<a3WKw ;
"w<#^d_6 ;
R:qW;n%AF ;;;;;;;;;;;;;;;;;;;;
(E1~H0^ >m\(6x8RE ; Enable the PHP scripting language engine under Apache.
m8[j #=h ;
pQB."[n ;
%xLhZ\ ; 允许在Apache下的PHP脚本语言引擎
V0mn4sfs ;
Ny/MJ#Lq ;
*vMn$,^0h9 engine = On
)^hbsMhO ?S=mybp ; Allow the tags are recognized.
%W S+(0*1 ;
JBZ@'8eqi] ;
[:*)XeRK ; 允许 标记
@=u3ZVD ;
ns4,@C$ ;
jL}v9$ short_open_tag = On
OY({.uV dX \9EjClfo ; Allow ASP-style tags.
E]r?{t`] ;
w0unS`\4 ;
r3?o9D> ; 允许 ASP 类型的 标记
YS_;OFsd ;
^iYj[~ ;
\i&<s; asp_tags = Off
COlaD"Y 'J|_2* ; The number of significant digits displayed in floating point numbers.
MolgwVd ;
)+Pus~w ;
5"H=zJ=r ; 浮点数显示的有意义的数字(精度)
N'=gep0V@ ;
fc>L K7M ;
7G],T++N precision = 14
klhtKp_p 2X&qE}%k S ; Enforce year 2000 compliance (will cause problems with non-compliant browsers)
[2cD:JL ;
_@/8gPT*i ;
^LLzZnkcZ ; 强制遵从 2000 年(会在不遵从的浏览器上引起错误)
k9F=8q ;
wy2
D;; ;
Eh4=ZEX y2k_compliance = Off
8q7b_Pq1U <gBA1oRz ; Output buffering allows you to send header lines (including cookies) even
<OPArht ; after you send body content, at the price of slowing PHP's output layer a
?Mfw]z"\C) ; bit. You can enable output buffering during runtime by calling the output
|4`{]2C ; buffering functions. You can also enable output buffering for all files by
oP.7/*p ; setting this directive to On. If you wish to limit the size of the buffer
\73ch ; to a certain size - you can use a maximum number of bytes instead of 'On', as
9gZ$
; a value for this directive (e.g., output_buffering=4096).
`r_/Wt{g ;
|ENh)M8}r ;
Xn
;AZu^'R ; 输出缓冲允许你在主体内容发送后发送头信息行(包括 cookies),作为代价,会稍微减慢一点PHP
NGW xN8P6 ; 输出层的速度。你可以在运行期间通过调用输出缓冲函数来打开输出缓冲。你也可以通过设置这个
/ XIhj ; 指示来对虽有的文件打开输出缓冲。如果你想限制缓冲区大小为某个尺寸,你可以使用一个允许最大
+ck}l2 ; 的字节数值代替 "On",作为这个指示的值。
.N(p=9 ;
i}?>g -( ;
Y<8vw
d output_buffering = 4096
1BEHw?dLU U/BR*Zn]* ; You can redirect all of the output of your scripts to a function. For
Tm?# M&' ; example, if you set output_handler to "ob_gzhandler", output will be
{(}By/_ ; transparently compressed for browsers that support gzip or deflate encoding.
Z/J y'$x ; Setting an output handler automatically turns on output buffering.
#$y?v%^ ;
T[A69O]v ;
:~^(g$Z ; 你可以重新定向脚本所有输出到一个函数。例如,你可以设置 output_handler 为 "ob_gzhandler",
WX0tgXl ; 输出将会被明显的被压缩到支持 gzip 或 deflate 编码的浏览器。设置一个输出管理会自动打开
?z
u8)U ; 输出缓冲
jZ;
=so ;
E4xa[iZ ;
qIqM{#' ^ output_handler =
a.6(K @=kSo
-SX ; Transparent output compression using the zlib library
as=LIw}Q4 ; Valid values for this option are 'off', 'on', or a specific buffer size
`P ,d$H " ; to be used for compression (default is 4KB)
DlNX 3 ;
|^H5^k "Bv ;
_J [P[(ab ; 使用 zlib 库进行输出压缩,可以指定 off/on 或者用于压缩的缓冲大小
xkR0 ;
GuL<Z1<c ;
>F&47Yn zlib.output_compression = Off
1aABzB
^ wlmRe`R ; Implicit flush tells PHP to tell the output layer to flush itself
{]|J5Dgfe ; automatically after every output block. This is equivalent to calling the
mj@13$= ; PHP function flush() after each and every call to print() or echo() and each
dcT80sOC ; and every HTML block. Turning this option on has serious performance
*/DO ex"y ; implications and is generally recommended for debugging purposes only.
{1
94!S4z ;
0qT%!ku& ;
?G&ikxl ; 隐含的通知PHP的输出层在每个输出块后自己自动刷新。等同于在每个 print() 或者 echo()
c[Zje7 @ ; 和每个HTML块后面都调用 flush()函数。打开这个配置会引起严重的隐含执行,一般推荐在用于
%u5]>]M+ ; 调试目的时使用。
Om {'1 ;
;jTN| i' ;
7"xd1l?zz implicit_flush = Off
O|UC ?]6 {FTqu. ; Whether to enable the ability to force arguments to be passed by reference
!0E&@X:- ; at function call time. This method is deprecated and is likely to be
WOf 4o ; unsupported in future versions of PHP/Zend. The encouraged method of
7J&4akT{9 ; specifying which arguments should be passed by reference is in the function
SK.: Q5: ; declaration. You're encouraged to try and turn this option Off and make
pY$Q ; sure your scripts work properly with it in order to ensure they will work
<b<j=_3 ; with future versions of the language (you will receive a warning each time
GowH]MO ; you use this feature, and the argument will be passed by value instead of by
jlg(drTo ; reference).
>)Tqt!? ;
5rUdv}. ;
gltBC${7wZ ; 是否允许在函数调用期间有强制参数以引用的形式传递的能力。这个方法不赞成使用,在将来的
uSBaDYg ; PHP和Zend版本里面可能不支持。鼓励的方法是在函数声明时指定哪个参数通过引用传递。鼓励你
T9q-,w/j; ; 尝试关闭这个参数,确认你的脚本能够正常运行,以便在以后版能里面正确运行(你会在每次使用
aFIw=c(nP ; 这个特性时得到一个警告,并且参数以值来传递,代替引用)
W`*r>`krVJ ;
/5AJ.r ;
r!{Up7uL allow_call_time_pass_reference = Off
FU<Jp3<% XBw)H S#[j )U- ;
.XhrCiZ ; Safe Mode
%;"y+YFdv ;
Ld-_,-n ;
r/*D:x|yN ; 安全模式
W'TaBuCb ;
pcI uN ;
S>;
5[l 4 ;
9JKEw safe_mode = Off
HLHz2-lI x3eZ^8^1} ; By default, Safe Mode does a UID compare check when
f'3$9x ; opening files. If you want to relax this to a GID compare,
VgS_s k ; then turn on safe_mode_gid.
O%HHYV%[m ;
,wdD8ZT'Ip ;
hwNf~3eJk ; 安全模式默认的在打开文件时进行 UID 比较检查,如果你想放宽他为GID比较,打开这个参数
h3@v+Z<} ;
t<?,F ;
P}`H ~N~ safe_mode_gid = Off
B^jc3 VsR J!7MZLb ; When safe_mode is on, UID/GID checks are bypassed when
|IUWF%~^$+ ; including files from this directory and its subdirectories.
GNJj=1Lsd ; (directory must also be in include_path or full path must
W'u># ; be used when including)
-;k+GrLr^ ;
_2 osV[e ;
5d!-G$@ ; 在安全模式,当包含如下目录和子目录文件时,绕过 UID/GID检查(路径必须在 include_path下面
yJe>JK~) ; 或者在包含时使用完整路径
ZWp(GC1NA ;
qA5r ;
t.\dpBq safe_mode_include_dir =
T37XBg H %BB%pC ; When safe_mode is on, only executables located in the safe_mode_exec_dir
TrR8?- ; will be allowed to be executed via the exec family of functions.
_/<x ;
j^2j&Ta ;
v1,oilL ; 在安全模式下,只有给出目录下可以通过 exec 族函数执行
gr-OHeid ;
yyy|Pw4:Z ;
I[X772K safe_mode_exec_dir =
6Sn .I1Wy r0 uwPf ; open_basedir, if set, limits all file operations to the defined directory
0}dpK $. ; and below. This directive makes most sense if used in a per-directory
Tc3yS(aq ; or per-virtualhost web server configuration file.
liz~7RY4 ;
WvZ8/T'x ;
}|5Pr(I ; 如果设置,则限制所有的文件操作都到下面给出的目录下。这个指示在每个目录,每个虚拟主机的web
Fh9h,'
V" ; 服务器配置文件里给出更多的认识。
4#hSJ(~7S ;
cDkf qcC ;
dzrio-QU~ ;open_basedir =
t}tEvh `&6dnSC},P ; Setting certain environment variables may be a potential security breach.
K8Y=S12Ti ; This directive contains a comma-delimited list of prefixes. In Safe Mode,
4)o ; the user may only alter environment variables whose names begin with the
h;NYdX5 ; prefixes supplied here. By default, users will only be able to set
OprkR ; environment variables that begin with PHP_ (e.g. PHP_FOO=BAR).
OY@ %p}l ;
w$-6-rE]d ; Note: If this directive is empty, PHP will let the user modify ANY
S#}
KIy ; environment variable!
)q3p-)@kQ ;
YLn?.sV{[0 ;
Z0r?|G0 ; 设置某些环境变量可能是隐藏的安全缺口。这个指示包含一个逗号分割的前缀指示。在安全模式下
O463I.XAP ; 用户只能修改下面提供的为前缀的变量名字。默认,用户只能设置以 PHP_ 前缀开头的环境变量(
-v|qZ' ; 例如 PHP_FOO=BAR).
4d;8`66O ;
gEE\y{y ; 注意:如果这个设置为空,则 PHP 可以让用户修改任何环境变量。
by/jYg)+ ;
Hc(OI|z~ ;
kt$jm)UI~l safe_mode_allowed_env_vars = PHP_
ZbAcO/ [Hh9a;.*}h ; This directive contains a comma-delimited list of environment variables that
y9}>: pj4 ; the end user won't be able to change using putenv(). These variables will be
$l&(%\pp ; protected even if safe_mode_allowed_env_vars is set to allow to change them.
8 uwq-/$ ;
*,WU?tl& ;
fIv* T[ ; 这个指示包含用逗号分割的不允许最终用户通过 putenv()修改的环境变量的列表。这些变量即使
/FEVmH?
; 在 safe_mode_allowed_env_vars 设置允许改变他们的情况下也被保护。
L8#5*8W6 ;
OX\F~+ ;
;q6Ki.D safe_mode_protected_env_vars = LD_LIBRARY_PATH
bhlG,NTP l"]}Ts# ; This directive allows you to disable certain functions for security reasons.
GYUn6P ; It receives a comma-delimited list of function names. This directive is
p,i[W.dy.' ; *NOT* affected by whether Safe Mode is turned On or Off.
'u<juFr ;
y;@:ulv[ ;
$[=%R`~w ; 这个指示用于在由于安全原因的情况下屏蔽某些函数。接受用逗号分割的函数名列表,这个指示不受
,]c
1A$Sr0 ; Safe Mode 是否打开的影响。
3
xp)a%=7 ;
!H>R%g#28_ ;
M?uC%x+S$_ disable_functions =
[-oc>;`=l AX/m25x ; Colors for Syntax Highlighting mode. Anything that's acceptable in
w!clI8v/ ; would work.
ZSd4z:/ ;
Pce;r*9 ;
,^f+^^ ; 语法加亮模式的颜色,任何 正常工作的都可以接受
$aXer: ;
U2s /2 [. ;
G,Azm}+ highlight.string = #CC0000
K?$^@N highlight.comment = #FF9900
>>fH{/l highlight.keyword = #006600
.gOL1`b* highlight.bg = #FFFFFF
hv_XP,1K highlight.default = #0000CC
aM0f/"-_ highlight.html = #000000
+@iA;2& ]^K4i)\
n$,*|_$# ;
E#t>Qn ; Misc
=]Jd9]vi ;
_Qi&J.U> ; Decides whether PHP may expose the fact that it is installed on the server
2Ny"O.0h ; (e.g. by adding its signature to the Web server header). It is no security
7,9=uk>0\ ; threat in any way, but it makes it possible to determine whether you use PHP
^V Zk+'4 ; on your server or not.
mk+B9?;cF- ;
*CTlOy ;
(|1A?@sJ#h ; 是否让服务器暴露 PHP(例如在 web 服务器头增加标记)。他不会有安全威胁,但是可以让你
nq8C'Fo!6T ; 检测一个服务器是否使用了 PHP.
hJ~Uf5Q ;
e|WJQd4+S ;
;&-k#PE]/H expose_php = On
>y:,9; 7!TueP0Zd VrQmP ;;;;;;;;;;;;;;;;;;;
'K{Z{[s{ ; Resource Limits ;
:I^;jdL ;
x-.?HS[ ;
t$#jL5 ; 资源限制
vJOw]cwq ;
XtSkh] #z! ;
uurh??R !6>~?gNd ;;;;;;;;;;;;;;;;;;;
s
3f-7f< O]Qd<%V'x ;
3Xy-r=N. l ;
en*GM}<V ; 每个脚本最大执行的秒数
G`BU=Fi ;
J B]q ;
(uZ&V7l max_execution_time = 30 ; Maximum execution time of each script, in seconds
wLJ:\_Jaf "J8vjr1/ ;
0Bi.6r ;
MC:@U~}6 ; 一个脚本最大消耗的内存
rJbf_]^ ;
=\wxsL ;
>!bJslWA memory_limit = 8M ; Maximum amount of memory a script may consume (8MB)
FOy|F-j 8=uu8-l8g k:F9. j%* ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
kH7(@Pa ; Error handling and logging ;
3e;^/kf<9 ;
]B3=lc" ;
Vi]W |bP ; 错误处理和记录
kbMWGB%; ;
bU:EqW\( ^ ;
-^h' >. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
fnX`Q[b4\A 6'G6<8>- ; error_reporting is a bit-field. Or each number up to get desired error
Jx](G>F4f1 ; reporting level
O5kz5b>Z ;
v8[I8{41 ;
usK*s$ns ; 错误报告是一个位字段,每个数值代表错误报告的等级
sAS:-wp ;
RA'M8:$ ;
$jI3VB ; E_ALL - All errors and warnings
> $7v
;Q ;
f"SD/]q- ; 所有的错误和警告
m\r@@! ;
^c4@(]v'G ; E_ERROR - fatal run-time errors
:^WKT ;
BB*f4z$Y% ; 致命的运行期错误
~8P!XAU56% ;
VZymM<