
How to authenticate python users?
python user login verification
Login verification, three chances, how to do it?
1. A user list records legal passwords and usernames, a black room list records users who entered incorrectly 3 times,
an intermediate list records all user inputs, and counts whether a certain user Entered incorrectly 3 times
2. Use in to determine whether an element is in a list, and the for loop holds the input verification
#!/usr/bin/python3
__author__ = 'beimenchuixue'
__blog__ = 'http://www.cnblogs.com/2bjiujiu/'
def login(users_ku):
lock_list = [] # 锁定用户库,3次登录失败进入的小黑屋
median = [] # 登录失败的录入中间列表,如果用count数出3次,进入锁定
while True:
name = input('输入你的用户名:')
psw = input('请输入你的密码:')
if name in lock_list: # 判断用户是否进入小黑屋
print('此账号锁定,不能再用此账号登陆')
continue
if [name, psw] in users_ku: # 判断用户输入的合法性
print('登录成功')
break
else:
median.append(name) # 用户名录入
print('账号或者密码输入错误,请重新输入')
if median.count(name) == 3: # 同用户3次登录失败进入的小黑屋
lock_list.append(name) # 进入小黑屋
if __name__ == '__main__':
# 用户验证密码库
users_ku = [['name1', 'psw1'], ['name2', 'psw2']]
login(users_ku)Requirements met:
1. User Different input orders can catch whether you enter 3 times
2. If you enter incorrectly 3 times, you will no longer be allowed to log in
Related recommendations: "Python Tutorial》
The above is the detailed content of How to do python user verification. For more information, please follow other related articles on the PHP Chinese website!
Refactoring Python Code EffectivelyJul 24, 2025 am 03:38 AMRefactoring is not rewriting, but improving the code structure and readability without changing the function. Common reconstruction situations include too large functions or classes, many repetitive codes, fuzzy variable naming, and complex control processes. Refactoring should start with details, such as splitting large functions, extracting duplicate code, simplifying conditional judgment, and improving variable naming. Tools and testing are the key. Using pytest, black, isort, flake8, mypy and other tools to cooperate with unit testing can ensure that the changes are safe. Refactoring should be continuously optimized from a small way, rather than rewriting it all at once.
Python Memory Management ExplainedJul 24, 2025 am 03:38 AMPython's memory management consists of automatic allocation and recycling mechanisms. When creating variables, memory will be allocated from the memory pool or system malloc according to the object size. Small objects preferentially use memory pools to improve efficiency. Memory recycling mainly relies on reference counting and garbage collector (gc module). Reference counting is zeroed and memory is released, while circular references are processed by garbage collector. To reduce memory usage, array, NumPy array, generator, and \_\_slots\_\_\_ can be used. The memory is not released immediately at the end of the del or function, which may be caused by garbage collection delay, external memory usage or object cache. You can use tracemalloc or memory\_profiler tools to analyze the memory situation.
python recursion exampleJul 24, 2025 am 03:36 AMRecursion is a method for function calls to solve problems in Python, and is suitable for scenarios such as factorial, Fibonacci sequence, nested list traversal and binary search. 1. Factorial is recursively calculated by n*factorial(n-1), and the basic situation is n==0 or 1, and the basic situation is n==0 or 1; 2. The Fibonacci sequence defines f(n)=f(n-1) f(n-2), and the basic situation is f(0)=0, f(1)=1, but the naive recursive efficiency is low, and it is recommended to use lru_cache to optimize; 3. When traversing the nested list, if the elements are lists, they will be processed recursively, otherwise they will be printed; 4. The binary search recursive version looks for the target value in an ordered array, and determines the recursive left and right intervals based on the comparison between the intermediate value and the target. The basic situation is low>hig
Customizing Logging Handlers in PythonJul 24, 2025 am 03:33 AMThe core of custom loggingHandler is to inherit logging.Handler and implement the emit() method, which is suitable for scenarios such as sending logs to emails, writing to databases, or pushing remote servers. 1. The situations that need to be customized include: pushing logs to Slack or DingTalk, recording to database or API, processing by level, and adding additional information; 2. The implementation method is to inherit logging.Handler and rewriting emit(), where you write custom logic such as sending HTTP requests; 3. When using it, you need to pay attention to exception handling, formatting output, setting appropriate levels and formatters, and avoid duplicate output and propagation problems.
What is the difference between python `break` and `continue`?Jul 24, 2025 am 03:33 AMIn Python, the difference between break and continue is that: 1.break is used to terminate the entire loop immediately, which is often used to exit the loop early or complete the search task; 2.continue only skips the current iteration and continues to execute the next loop, which is suitable for ignoring specific elements or filtering data. For example, use break after finding a match when searching a list, and skip invalid entries with continue when cleaning data. Although both control the cycle flow, their functions are completely different.
How to flatten a list of lists in PythonJul 24, 2025 am 03:32 AMThere are three ways to tile nested lists in Python: First, use list comprehension, the syntax is [itemforsublistinlist_of_listsforiteminsublist], which is suitable for two-dimensional lists; Second, use itertools.chain, which includes itertools.chain.from_iterable(list_of_lists) or itertools.chain(*list_of_lists), which has better performance; Third, when dealing with irregular nesting, judgment statements need to be added, for example, using isinstance(sublist, list) to distinguish lists from non-
python threading lock exampleJul 24, 2025 am 03:29 AMThreading.Lock is needed to prevent race conditions for shared resources in multi-threading environments. 1. Create lock object lock=threading.Lock(); 2. Use withlock: Ensure the operation atomicity of shared variables; 3. Multiple threads accumulate 100,000 times for counters, and the final result is correct 500,000; 4. It is recommended to use the with statement to automatically manage the acquisition and release of locks; 5. Avoid nested acquisition of locks, and use threading.RLock() if necessary; 6. The scope of the lock should be as small as possible to improve performance; 7. Pay attention to avoid deadlocks due to inconsistent locking order.
Scientific Computing with PythonJul 24, 2025 am 03:25 AMPython is widely used in scientific computing because its mature libraries and tool chains can handle various tasks. Key points include: 1. Install core libraries such as NumPy (efficient arrays and mathematical functions), SciPy (advanced mathematical operations), Matplotlib (data visualization) and Pandas (table data processing), which can be installed through pip or conda; 2. Replace native lists with NumPy to improve performance, and support vectorized operations, broadcast mechanisms and linear algebra functions; 3. SciPy provides complex mathematical tools such as integral, optimization, and Fourier transform, such as using quad function to calculate definite integrals; 4. Matplotlib and its encapsulation library Seaborn are used for graph display, supporting style settings and professionalism


Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download
The most popular open source editor

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Chinese version
Chinese version, very easy to use







