Current File : //lib64/perl5/vendor_perl/DB_File.pm
# DB_File.pm -- Perl 5 interface to Berkeley DB 
#
# Written by Paul Marquess (pmqs@cpan.org)
#
#     Copyright (c) 1995-2018 Paul Marquess. All rights reserved.
#     This program is free software; you can redistribute it and/or
#     modify it under the same terms as Perl itself.


package DB_File::HASHINFO ;

require 5.008003;

use warnings;
use strict;
use Carp;
require Tie::Hash;
@DB_File::HASHINFO::ISA = qw(Tie::Hash);

sub new
{
    my $pkg = shift ;
    my %x ;
    tie %x, $pkg ;
    bless \%x, $pkg ;
}


sub TIEHASH
{
    my $pkg = shift ;

    bless { VALID => { 
		       	bsize	  => 1,
			ffactor	  => 1,
			nelem	  => 1,
			cachesize => 1,
			hash	  => 2,
			lorder	  => 1,
		     }, 
	    GOT   => {}
          }, $pkg ;
}


sub FETCH 
{  
    my $self  = shift ;
    my $key   = shift ;

    return $self->{GOT}{$key} if exists $self->{VALID}{$key}  ;

    my $pkg = ref $self ;
    croak "${pkg}::FETCH - Unknown element '$key'" ;
}


sub STORE 
{
    my $self  = shift ;
    my $key   = shift ;
    my $value = shift ;

    my $type = $self->{VALID}{$key};

    if ( $type )
    {
    	croak "Key '$key' not associated with a code reference" 
	    if $type == 2 && !ref $value && ref $value ne 'CODE';
        $self->{GOT}{$key} = $value ;
        return ;
    }
    
    my $pkg = ref $self ;
    croak "${pkg}::STORE - Unknown element '$key'" ;
}

sub DELETE 
{
    my $self = shift ;
    my $key  = shift ;

    if ( exists $self->{VALID}{$key} )
    {
        delete $self->{GOT}{$key} ;
        return ;
    }
    
    my $pkg = ref $self ;
    croak "DB_File::HASHINFO::DELETE - Unknown element '$key'" ;
}

sub EXISTS
{
    my $self = shift ;
    my $key  = shift ;

    exists $self->{VALID}{$key} ;
}

sub NotHere
{
    my $self = shift ;
    my $method = shift ;

    croak ref($self) . " does not define the method ${method}" ;
}

sub FIRSTKEY { my $self = shift ; $self->NotHere("FIRSTKEY") }
sub NEXTKEY  { my $self = shift ; $self->NotHere("NEXTKEY") }
sub CLEAR    { my $self = shift ; $self->NotHere("CLEAR") }

package DB_File::RECNOINFO ;

use warnings;
use strict ;

@DB_File::RECNOINFO::ISA = qw(DB_File::HASHINFO) ;

sub TIEHASH
{
    my $pkg = shift ;

    bless { VALID => { map {$_, 1} 
		       qw( bval cachesize psize flags lorder reclen bfname )
		     },
	    GOT   => {},
          }, $pkg ;
}

package DB_File::BTREEINFO ;

use warnings;
use strict ;

@DB_File::BTREEINFO::ISA = qw(DB_File::HASHINFO) ;

sub TIEHASH
{
    my $pkg = shift ;

    bless { VALID => { 
		      	flags	   => 1,
			cachesize  => 1,
			maxkeypage => 1,
			minkeypage => 1,
			psize	   => 1,
			compare	   => 2,
			prefix	   => 2,
			lorder	   => 1,
	    	     },
	    GOT   => {},
          }, $pkg ;
}


package DB_File ;

use warnings;
use strict;
our ($VERSION, @ISA, @EXPORT, $AUTOLOAD, $DB_BTREE, $DB_HASH, $DB_RECNO);
our ($db_version, $use_XSLoader, $splice_end_array_no_length, $splice_end_array, $Error);
use Carp;

# Module not thread safe, so don't clone
sub CLONE_SKIP { 1 } 

$VERSION = "1.842" ;
$VERSION = eval $VERSION; # needed for dev releases

{
    local $SIG{__WARN__} = sub {$splice_end_array_no_length = join(" ",@_);};
    my @a =(1); splice(@a, 3);
    $splice_end_array_no_length = 
        ($splice_end_array_no_length =~ /^splice\(\) offset past end of array at /);
}      
{
    local $SIG{__WARN__} = sub {$splice_end_array = join(" ", @_);};
    my @a =(1); splice(@a, 3, 1);
    $splice_end_array = 
        ($splice_end_array =~ /^splice\(\) offset past end of array at /);
}      

#typedef enum { DB_BTREE, DB_HASH, DB_RECNO } DBTYPE;
$DB_BTREE = new DB_File::BTREEINFO ;
$DB_HASH  = new DB_File::HASHINFO ;
$DB_RECNO = new DB_File::RECNOINFO ;

require Tie::Hash;
require Exporter;
BEGIN {
    $use_XSLoader = 1 ;
    { local $SIG{__DIE__} ; eval { require XSLoader } ; }

    if ($@) {
        $use_XSLoader = 0 ;
        require DynaLoader;
        @ISA = qw(DynaLoader);
    }
}

push @ISA, qw(Tie::Hash Exporter);
@EXPORT = qw(
        $DB_BTREE $DB_HASH $DB_RECNO 

	BTREEMAGIC
	BTREEVERSION
	DB_LOCK
	DB_SHMEM
	DB_TXN
	HASHMAGIC
	HASHVERSION
	MAX_PAGE_NUMBER
	MAX_PAGE_OFFSET
	MAX_REC_NUMBER
	RET_ERROR
	RET_SPECIAL
	RET_SUCCESS
	R_CURSOR
	R_DUP
	R_FIRST
	R_FIXEDLEN
	R_IAFTER
	R_IBEFORE
	R_LAST
	R_NEXT
	R_NOKEY
	R_NOOVERWRITE
	R_PREV
	R_RECNOSYNC
	R_SETCURSOR
	R_SNAPSHOT
	__R_UNUSED

);

sub AUTOLOAD {
    my($constname);
    ($constname = $AUTOLOAD) =~ s/.*:://;
    my ($error, $val) = constant($constname);
    Carp::croak $error if $error;
    no strict 'refs';
    *{$AUTOLOAD} = sub { $val };
    goto &{$AUTOLOAD};
}           


eval {
    # Make all Fcntl O_XXX constants available for importing
    require Fcntl;
    my @O = grep /^O_/, @Fcntl::EXPORT;
    Fcntl->import(@O);  # first we import what we want to export
    push(@EXPORT, @O);
};

if ($use_XSLoader)
  { XSLoader::load("DB_File", $VERSION)}
else
  { bootstrap DB_File $VERSION }

sub tie_hash_or_array
{
    my (@arg) = @_ ;
    my $tieHASH = ( (caller(1))[3] =~ /TIEHASH/ ) ;

    use File::Spec;
    $arg[1] = File::Spec->rel2abs($arg[1]) 
        if defined $arg[1] ;

    $arg[4] = tied %{ $arg[4] } 
	if @arg >= 5 && ref $arg[4] && $arg[4] =~ /=HASH/ && tied %{ $arg[4] } ;

    $arg[2] = O_CREAT()|O_RDWR() if @arg >=3 && ! defined $arg[2];
    $arg[3] = 0666               if @arg >=4 && ! defined $arg[3];

    # make recno in Berkeley DB version 2 (or better) work like 
    # recno in version 1.
    if ($db_version >= 4 and ! $tieHASH) {
        $arg[2] |= O_CREAT();
    }

    if ($db_version > 1 and defined $arg[4] and $arg[4] =~ /RECNO/ and 
	$arg[1] and ! -e $arg[1]) {
	open(FH, ">$arg[1]") or return undef ;
	close FH ;
	chmod $arg[3] ? $arg[3] : 0666 , $arg[1] ;
    }

    DoTie_($tieHASH, @arg) ;
}

sub TIEHASH
{
    tie_hash_or_array(@_) ;
}

sub TIEARRAY
{
    tie_hash_or_array(@_) ;
}

sub CLEAR 
{
    my $self = shift;
    my $key = 0 ;
    my $value = "" ;
    my $status = $self->seq($key, $value, R_FIRST());
    my @keys;
 
    while ($status == 0) {
        push @keys, $key;
        $status = $self->seq($key, $value, R_NEXT());
    }
    foreach $key (reverse @keys) {
        my $s = $self->del($key); 
    }
}

sub EXTEND { }

sub STORESIZE
{
    my $self = shift;
    my $length = shift ;
    my $current_length = $self->length() ;

    if ($length < $current_length) {
	my $key ;
        for ($key = $current_length - 1 ; $key >= $length ; -- $key)
	  { $self->del($key) }
    }
    elsif ($length > $current_length) {
        $self->put($length-1, "") ;
    }
}
 

sub SPLICE
{
    my $self = shift;
    my $offset = shift;
    if (not defined $offset) {
	warnings::warnif('uninitialized', 'Use of uninitialized value in splice');
	$offset = 0;
    }

    my $has_length = @_;
    my $length = @_ ? shift : 0;
    # Carping about definedness comes _after_ the OFFSET sanity check.
    # This is so we get the same error messages as Perl's splice().
    # 

    my @list = @_;

    my $size = $self->FETCHSIZE();
    
    # 'If OFFSET is negative then it start that far from the end of
    # the array.'
    # 
    if ($offset < 0) {
	my $new_offset = $size + $offset;
	if ($new_offset < 0) {
	    die "Modification of non-creatable array value attempted, "
	      . "subscript $offset";
	}
	$offset = $new_offset;
    }

    if (not defined $length) {
	warnings::warnif('uninitialized', 'Use of uninitialized value in splice');
	$length = 0;
    }

    if ($offset > $size) {
 	$offset = $size;
	warnings::warnif('misc', 'splice() offset past end of array')
            if $has_length ? $splice_end_array : $splice_end_array_no_length;
    }

    # 'If LENGTH is omitted, removes everything from OFFSET onward.'
    if (not defined $length) {
	$length = $size - $offset;
    }

    # 'If LENGTH is negative, leave that many elements off the end of
    # the array.'
    # 
    if ($length < 0) {
	$length = $size - $offset + $length;

	if ($length < 0) {
	    # The user must have specified a length bigger than the
	    # length of the array passed in.  But perl's splice()
	    # doesn't catch this, it just behaves as for length=0.
	    # 
	    $length = 0;
	}
    }

    if ($length > $size - $offset) {
	$length = $size - $offset;
    }

    # $num_elems holds the current number of elements in the database.
    my $num_elems = $size;

    # 'Removes the elements designated by OFFSET and LENGTH from an
    # array,'...
    # 
    my @removed = ();
    foreach (0 .. $length - 1) {
	my $old;
	my $status = $self->get($offset, $old);
	if ($status != 0) {
	    my $msg = "error from Berkeley DB on get($offset, \$old)";
	    if ($status == 1) {
		$msg .= ' (no such element?)';
	    }
	    else {
		$msg .= ": error status $status";
		if (defined $! and $! ne '') {
		    $msg .= ", message $!";
		}
	    }
	    die $msg;
	}
	push @removed, $old;

	$status = $self->del($offset);
	if ($status != 0) {
	    my $msg = "error from Berkeley DB on del($offset)";
	    if ($status == 1) {
		$msg .= ' (no such element?)';
	    }
	    else {
		$msg .= ": error status $status";
		if (defined $! and $! ne '') {
		    $msg .= ", message $!";
		}
	    }
	    die $msg;
	}

	-- $num_elems;
    }

    # ...'and replaces them with the elements of LIST, if any.'
    my $pos = $offset;
    while (defined (my $elem = shift @list)) {
	my $old_pos = $pos;
	my $status;
	if ($pos >= $num_elems) {
	    $status = $self->put($pos, $elem);
	}
	else {
	    $status = $self->put($pos, $elem, $self->R_IBEFORE);
	}

	if ($status != 0) {
	    my $msg = "error from Berkeley DB on put($pos, $elem, ...)";
	    if ($status == 1) {
		$msg .= ' (no such element?)';
	    }
	    else {
		$msg .= ", error status $status";
		if (defined $! and $! ne '') {
		    $msg .= ", message $!";
		}
	    }
	    die $msg;
	}

	die "pos unexpectedly changed from $old_pos to $pos with R_IBEFORE"
	  if $old_pos != $pos;

	++ $pos;
	++ $num_elems;
    }

    if (wantarray) {
	# 'In list context, returns the elements removed from the
	# array.'
	# 
	return @removed;
    }
    elsif (defined wantarray and not wantarray) {
	# 'In scalar context, returns the last element removed, or
	# undef if no elements are removed.'
	# 
	if (@removed) {
	    my $last = pop @removed;
	    return "$last";
	}
	else {
	    return undef;
	}
    }
    elsif (not defined wantarray) {
	# Void context
    }
    else { die }
}
sub ::DB_File::splice { &SPLICE }

sub find_dup
{
    croak "Usage: \$db->find_dup(key,value)\n"
        unless @_ == 3 ;
 
    my $db        = shift ;
    my ($origkey, $value_wanted) = @_ ;
    my ($key, $value) = ($origkey, 0);
    my ($status) = 0 ;

    for ($status = $db->seq($key, $value, R_CURSOR() ) ;
         $status == 0 ;
         $status = $db->seq($key, $value, R_NEXT() ) ) {

        return 0 if $key eq $origkey and $value eq $value_wanted ;
    }

    return $status ;
}

sub del_dup
{
    croak "Usage: \$db->del_dup(key,value)\n"
        unless @_ == 3 ;
 
    my $db        = shift ;
    my ($key, $value) = @_ ;
    my ($status) = $db->find_dup($key, $value) ;
    return $status if $status != 0 ;

    $status = $db->del($key, R_CURSOR() ) ;
    return $status ;
}

sub get_dup
{
    croak "Usage: \$db->get_dup(key [,flag])\n"
        unless @_ == 2 or @_ == 3 ;
 
    my $db        = shift ;
    my $key       = shift ;
    my $flag	  = shift ;
    my $value 	  = 0 ;
    my $origkey   = $key ;
    my $wantarray = wantarray ;
    my %values	  = () ;
    my @values    = () ;
    my $counter   = 0 ;
    my $status    = 0 ;
 
    # iterate through the database until either EOF ($status == 0)
    # or a different key is encountered ($key ne $origkey).
    for ($status = $db->seq($key, $value, R_CURSOR()) ;
	 $status == 0 and $key eq $origkey ;
         $status = $db->seq($key, $value, R_NEXT()) ) {
 
        # save the value or count number of matches
        if ($wantarray) {
	    if ($flag)
                { ++ $values{$value} }
	    else
                { push (@values, $value) }
	}
        else
            { ++ $counter }
     
    }
 
    return ($wantarray ? ($flag ? %values : @values) : $counter) ;
}


sub STORABLE_freeze
{
    my $type = ref shift;
    croak "Cannot freeze $type object\n";
}

sub STORABLE_thaw
{
    my $type = ref shift;
    croak "Cannot thaw $type object\n";
}



1;
__END__

=head1 NAME

DB_File - Perl5 access to Berkeley DB version 1.x

=head1 SYNOPSIS

 use DB_File;

 [$X =] tie %hash,  'DB_File', [$filename, $flags, $mode, $DB_HASH] ;
 [$X =] tie %hash,  'DB_File', $filename, $flags, $mode, $DB_BTREE ;
 [$X =] tie @array, 'DB_File', $filename, $flags, $mode, $DB_RECNO ;

 $status = $X->del($key [, $flags]) ;
 $status = $X->put($key, $value [, $flags]) ;
 $status = $X->get($key, $value [, $flags]) ;
 $status = $X->seq($key, $value, $flags) ;
 $status = $X->sync([$flags]) ;
 $status = $X->fd ;

 # BTREE only
 $count = $X->get_dup($key) ;
 @list  = $X->get_dup($key) ;
 %list  = $X->get_dup($key, 1) ;
 $status = $X->find_dup($key, $value) ;
 $status = $X->del_dup($key, $value) ;

 # RECNO only
 $a = $X->length;
 $a = $X->pop ;
 $X->push(list);
 $a = $X->shift;
 $X->unshift(list);
 @r = $X->splice(offset, length, elements);

 # DBM Filters
 $old_filter = $db->filter_store_key  ( sub { ... } ) ;
 $old_filter = $db->filter_store_value( sub { ... } ) ;
 $old_filter = $db->filter_fetch_key  ( sub { ... } ) ;
 $old_filter = $db->filter_fetch_value( sub { ... } ) ;

 untie %hash ;
 untie @array ;

=head1 DESCRIPTION

B<DB_File> is a module which allows Perl programs to make use of the
facilities provided by Berkeley DB version 1.x (if you have a newer
version of DB, see L<Using DB_File with Berkeley DB version 2 or greater>).
It is assumed that you have a copy of the Berkeley DB manual pages at
hand when reading this documentation. The interface defined here
mirrors the Berkeley DB interface closely.

Berkeley DB is a C library which provides a consistent interface to a
number of database formats.  B<DB_File> provides an interface to all
three of the database types currently supported by Berkeley DB.

The file types are:

=over 5

=item B<DB_HASH>

This database type allows arbitrary key/value pairs to be stored in data
files. This is equivalent to the functionality provided by other
hashing packages like DBM, NDBM, ODBM, GDBM, and SDBM. Remember though,
the files created using DB_HASH are not compatible with any of the
other packages mentioned.

A default hashing algorithm, which will be adequate for most
applications, is built into Berkeley DB. If you do need to use your own
hashing algorithm it is possible to write your own in Perl and have
B<DB_File> use it instead.

=item B<DB_BTREE>

The btree format allows arbitrary key/value pairs to be stored in a
sorted, balanced binary tree.

As with the DB_HASH format, it is possible to provide a user defined
Perl routine to perform the comparison of keys. By default, though, the
keys are stored in lexical order.

=item B<DB_RECNO>

DB_RECNO allows both fixed-length and variable-length flat text files
to be manipulated using the same key/value pair interface as in DB_HASH
and DB_BTREE.  In this case the key will consist of a record (line)
number.

=back

=head2 Using DB_File with Berkeley DB version 2 or greater

Although B<DB_File> is intended to be used with Berkeley DB version 1,
it can also be used with version 2, 3 or 4. In this case the interface is
limited to the functionality provided by Berkeley DB 1.x. Anywhere the
version 2 or greater interface differs, B<DB_File> arranges for it to work
like version 1. This feature allows B<DB_File> scripts that were built
with version 1 to be migrated to version 2 or greater without any changes.

If you want to make use of the new features available in Berkeley DB
2.x or greater, use the Perl module B<BerkeleyDB> instead.

B<Note:> The database file format has changed multiple times in Berkeley
DB version 2, 3 and 4. If you cannot recreate your databases, you
must dump any existing databases with either the C<db_dump> or the
C<db_dump185> utility that comes with Berkeley DB.
Once you have rebuilt DB_File to use Berkeley DB version 2 or greater,
your databases can be recreated using C<db_load>. Refer to the Berkeley DB
documentation for further details.

Please read L<"COPYRIGHT"> before using version 2.x or greater of Berkeley
DB with DB_File.

=head2 Interface to Berkeley DB

B<DB_File> allows access to Berkeley DB files using the tie() mechanism
in Perl 5 (for full details, see L<perlfunc/tie()>). This facility
allows B<DB_File> to access Berkeley DB files using either an
associative array (for DB_HASH & DB_BTREE file types) or an ordinary
array (for the DB_RECNO file type).

In addition to the tie() interface, it is also possible to access most
of the functions provided in the Berkeley DB API directly.
See L<THE API INTERFACE>.

=head2 Opening a Berkeley DB Database File

Berkeley DB uses the function dbopen() to open or create a database.
Here is the C prototype for dbopen():

      DB*
      dbopen (const char * file, int flags, int mode, 
              DBTYPE type, const void * openinfo)

The parameter C<type> is an enumeration which specifies which of the 3
interface methods (DB_HASH, DB_BTREE or DB_RECNO) is to be used.
Depending on which of these is actually chosen, the final parameter,
I<openinfo> points to a data structure which allows tailoring of the
specific interface method.

This interface is handled slightly differently in B<DB_File>. Here is
an equivalent call using B<DB_File>:

        tie %array, 'DB_File', $filename, $flags, $mode, $DB_HASH ;

The C<filename>, C<flags> and C<mode> parameters are the direct
equivalent of their dbopen() counterparts. The final parameter $DB_HASH
performs the function of both the C<type> and C<openinfo> parameters in
dbopen().

In the example above $DB_HASH is actually a pre-defined reference to a
hash object. B<DB_File> has three of these pre-defined references.
Apart from $DB_HASH, there is also $DB_BTREE and $DB_RECNO.

The keys allowed in each of these pre-defined references is limited to
the names used in the equivalent C structure. So, for example, the
$DB_HASH reference will only allow keys called C<bsize>, C<cachesize>,
C<ffactor>, C<hash>, C<lorder> and C<nelem>. 

To change one of these elements, just assign to it like this:

	$DB_HASH->{'cachesize'} = 10000 ;

The three predefined variables $DB_HASH, $DB_BTREE and $DB_RECNO are
usually adequate for most applications.  If you do need to create extra
instances of these objects, constructors are available for each file
type.

Here are examples of the constructors and the valid options available
for DB_HASH, DB_BTREE and DB_RECNO respectively.

     $a = new DB_File::HASHINFO ;
     $a->{'bsize'} ;
     $a->{'cachesize'} ;
     $a->{'ffactor'};
     $a->{'hash'} ;
     $a->{'lorder'} ;
     $a->{'nelem'} ;

     $b = new DB_File::BTREEINFO ;
     $b->{'flags'} ;
     $b->{'cachesize'} ;
     $b->{'maxkeypage'} ;
     $b->{'minkeypage'} ;
     $b->{'psize'} ;
     $b->{'compare'} ;
     $b->{'prefix'} ;
     $b->{'lorder'} ;

     $c = new DB_File::RECNOINFO ;
     $c->{'bval'} ;
     $c->{'cachesize'} ;
     $c->{'psize'} ;
     $c->{'flags'} ;
     $c->{'lorder'} ;
     $c->{'reclen'} ;
     $c->{'bfname'} ;

The values stored in the hashes above are mostly the direct equivalent
of their C counterpart. Like their C counterparts, all are set to a
default values - that means you don't have to set I<all> of the
values when you only want to change one. Here is an example:

     $a = new DB_File::HASHINFO ;
     $a->{'cachesize'} =  12345 ;
     tie %y, 'DB_File', "filename", $flags, 0777, $a ;

A few of the options need extra discussion here. When used, the C
equivalent of the keys C<hash>, C<compare> and C<prefix> store pointers
to C functions. In B<DB_File> these keys are used to store references
to Perl subs. Below are templates for each of the subs:

    sub hash
    {
        my ($data) = @_ ;
        ...
        # return the hash value for $data
	return $hash ;
    }

    sub compare
    {
	my ($key, $key2) = @_ ;
        ...
        # return  0 if $key1 eq $key2
        #        -1 if $key1 lt $key2
        #         1 if $key1 gt $key2
        return (-1 , 0 or 1) ;
    }

    sub prefix
    {
	my ($key, $key2) = @_ ;
        ...
        # return number of bytes of $key2 which are 
        # necessary to determine that it is greater than $key1
        return $bytes ;
    }

See L<Changing the BTREE sort order> for an example of using the
C<compare> template.

If you are using the DB_RECNO interface and you intend making use of
C<bval>, you should check out L<The 'bval' Option>.

=head2 Default Parameters

It is possible to omit some or all of the final 4 parameters in the
call to C<tie> and let them take default values. As DB_HASH is the most
common file format used, the call:

    tie %A, "DB_File", "filename" ;

is equivalent to:

    tie %A, "DB_File", "filename", O_CREAT|O_RDWR, 0666, $DB_HASH ;

It is also possible to omit the filename parameter as well, so the
call:

    tie %A, "DB_File" ;

is equivalent to:

    tie %A, "DB_File", undef, O_CREAT|O_RDWR, 0666, $DB_HASH ;

See L<In Memory Databases> for a discussion on the use of C<undef>
in place of a filename.

=head2 In Memory Databases

Berkeley DB allows the creation of in-memory databases by using NULL
(that is, a C<(char *)0> in C) in place of the filename.  B<DB_File>
uses C<undef> instead of NULL to provide this functionality.

=head1 DB_HASH

The DB_HASH file format is probably the most commonly used of the three
file formats that B<DB_File> supports. It is also very straightforward
to use.

=head2 A Simple Example

This example shows how to create a database, add key/value pairs to the
database, delete keys/value pairs and finally how to enumerate the
contents of the database.

    use warnings ;
    use strict ;
    use DB_File ;
    our (%h, $k, $v) ;

    unlink "fruit" ;
    tie %h, "DB_File", "fruit", O_RDWR|O_CREAT, 0666, $DB_HASH 
        or die "Cannot open file 'fruit': $!\n";

    # Add a few key/value pairs to the file
    $h{"apple"} = "red" ;
    $h{"orange"} = "orange" ;
    $h{"banana"} = "yellow" ;
    $h{"tomato"} = "red" ;

    # Check for existence of a key
    print "Banana Exists\n\n" if $h{"banana"} ;

    # Delete a key/value pair.
    delete $h{"apple"} ;

    # print the contents of the file
    while (($k, $v) = each %h)
      { print "$k -> $v\n" }

    untie %h ;

here is the output:

    Banana Exists

    orange -> orange
    tomato -> red
    banana -> yellow

Note that the like ordinary associative arrays, the order of the keys
retrieved is in an apparently random order.

=head1 DB_BTREE

The DB_BTREE format is useful when you want to store data in a given
order. By default the keys will be stored in lexical order, but as you
will see from the example shown in the next section, it is very easy to
define your own sorting function.

=head2 Changing the BTREE sort order

This script shows how to override the default sorting algorithm that
BTREE uses. Instead of using the normal lexical ordering, a case
insensitive compare function will be used.

    use warnings ;
    use strict ;
    use DB_File ;

    my %h ;

    sub Compare
    {
        my ($key1, $key2) = @_ ;
        "\L$key1" cmp "\L$key2" ;
    }

    # specify the Perl sub that will do the comparison
    $DB_BTREE->{'compare'} = \&Compare ;

    unlink "tree" ;
    tie %h, "DB_File", "tree", O_RDWR|O_CREAT, 0666, $DB_BTREE 
        or die "Cannot open file 'tree': $!\n" ;

    # Add a key/value pair to the file
    $h{'Wall'} = 'Larry' ;
    $h{'Smith'} = 'John' ;
    $h{'mouse'} = 'mickey' ;
    $h{'duck'}  = 'donald' ;

    # Delete
    delete $h{"duck"} ;

    # Cycle through the keys printing them in order.
    # Note it is not necessary to sort the keys as
    # the btree will have kept them in order automatically.
    foreach (keys %h)
      { print "$_\n" }

    untie %h ;

Here is the output from the code above.

    mouse
    Smith
    Wall

There are a few point to bear in mind if you want to change the
ordering in a BTREE database:

=over 5

=item 1.

The new compare function must be specified when you create the database.

=item 2.

You cannot change the ordering once the database has been created. Thus
you must use the same compare function every time you access the
database.

=item 3

Duplicate keys are entirely defined by the comparison function.
In the case-insensitive example above, the keys: 'KEY' and 'key'
would be considered duplicates, and assigning to the second one
would overwrite the first. If duplicates are allowed for (with the
R_DUP flag discussed below), only a single copy of duplicate keys
is stored in the database --- so (again with example above) assigning
three values to the keys: 'KEY', 'Key', and 'key' would leave just
the first key: 'KEY' in the database with three values. For some
situations this results in information loss, so care should be taken
to provide fully qualified comparison functions when necessary.
For example, the above comparison routine could be modified to
additionally compare case-sensitively if two keys are equal in the
case insensitive comparison:

    sub compare {
        my($key1, $key2) = @_;
        lc $key1 cmp lc $key2 ||
        $key1 cmp $key2;
    }

And now you will only have duplicates when the keys themselves
are truly the same. (note: in versions of the db library prior to
about November 1996, such duplicate keys were retained so it was
possible to recover the original keys in sets of keys that
compared as equal).


=back 

=head2 Handling Duplicate Keys 

The BTREE file type optionally allows a single key to be associated
with an arbitrary number of values. This option is enabled by setting
the flags element of C<$DB_BTREE> to R_DUP when creating the database.

There are some difficulties in using the tied hash interface if you
want to manipulate a BTREE database with duplicate keys. Consider this
code:

    use warnings ;
    use strict ;
    use DB_File ;

    my ($filename, %h) ;

    $filename = "tree" ;
    unlink $filename ;

    # Enable duplicate records
    $DB_BTREE->{'flags'} = R_DUP ;

    tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE 
	or die "Cannot open $filename: $!\n";

    # Add some key/value pairs to the file
    $h{'Wall'} = 'Larry' ;
    $h{'Wall'} = 'Brick' ; # Note the duplicate key
    $h{'Wall'} = 'Brick' ; # Note the duplicate key and value
    $h{'Smith'} = 'John' ;
    $h{'mouse'} = 'mickey' ;

    # iterate through the associative array
    # and print each key/value pair.
    foreach (sort keys %h)
      { print "$_  -> $h{$_}\n" }

    untie %h ;

Here is the output:

    Smith   -> John
    Wall    -> Larry
    Wall    -> Larry
    Wall    -> Larry
    mouse   -> mickey

As you can see 3 records have been successfully created with key C<Wall>
- the only thing is, when they are retrieved from the database they
I<seem> to have the same value, namely C<Larry>. The problem is caused
by the way that the associative array interface works. Basically, when
the associative array interface is used to fetch the value associated
with a given key, it will only ever retrieve the first value.

Although it may not be immediately obvious from the code above, the
associative array interface can be used to write values with duplicate
keys, but it cannot be used to read them back from the database.

The way to get around this problem is to use the Berkeley DB API method
called C<seq>.  This method allows sequential access to key/value
pairs. See L<THE API INTERFACE> for details of both the C<seq> method
and the API in general.

Here is the script above rewritten using the C<seq> API method.

    use warnings ;
    use strict ;
    use DB_File ;

    my ($filename, $x, %h, $status, $key, $value) ;

    $filename = "tree" ;
    unlink $filename ;

    # Enable duplicate records
    $DB_BTREE->{'flags'} = R_DUP ;

    $x = tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE 
	or die "Cannot open $filename: $!\n";

    # Add some key/value pairs to the file
    $h{'Wall'} = 'Larry' ;
    $h{'Wall'} = 'Brick' ; # Note the duplicate key
    $h{'Wall'} = 'Brick' ; # Note the duplicate key and value
    $h{'Smith'} = 'John' ;
    $h{'mouse'} = 'mickey' ;

    # iterate through the btree using seq
    # and print each key/value pair.
    $key = $value = 0 ;
    for ($status = $x->seq($key, $value, R_FIRST) ;
         $status == 0 ;
         $status = $x->seq($key, $value, R_NEXT) )
      {  print "$key -> $value\n" }

    undef $x ;
    untie %h ;

that prints:

    Smith   -> John
    Wall    -> Brick
    Wall    -> Brick
    Wall    -> Larry
    mouse   -> mickey

This time we have got all the key/value pairs, including the multiple
values associated with the key C<Wall>.

To make life easier when dealing with duplicate keys, B<DB_File> comes with 
a few utility methods.

=head2 The get_dup() Method

The C<get_dup> method assists in
reading duplicate values from BTREE databases. The method can take the
following forms:

    $count = $x->get_dup($key) ;
    @list  = $x->get_dup($key) ;
    %list  = $x->get_dup($key, 1) ;

In a scalar context the method returns the number of values associated
with the key, C<$key>.

In list context, it returns all the values which match C<$key>. Note
that the values will be returned in an apparently random order.

In list context, if the second parameter is present and evaluates
TRUE, the method returns an associative array. The keys of the
associative array correspond to the values that matched in the BTREE
and the values of the array are a count of the number of times that
particular value occurred in the BTREE.

So assuming the database created above, we can use C<get_dup> like
this:

    use warnings ;
    use strict ;
    use DB_File ;

    my ($filename, $x, %h) ;

    $filename = "tree" ;

    # Enable duplicate records
    $DB_BTREE->{'flags'} = R_DUP ;

    $x = tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE 
	or die "Cannot open $filename: $!\n";

    my $cnt  = $x->get_dup("Wall") ;
    print "Wall occurred $cnt times\n" ;

    my %hash = $x->get_dup("Wall", 1) ;
    print "Larry is there\n" if $hash{'Larry'} ;
    print "There are $hash{'Brick'} Brick Walls\n" ;

    my @list = sort $x->get_dup("Wall") ;
    print "Wall =>	[@list]\n" ;

    @list = $x->get_dup("Smith") ;
    print "Smith =>	[@list]\n" ;

    @list = $x->get_dup("Dog") ;
    print "Dog =>	[@list]\n" ;


and it will print:

    Wall occurred 3 times
    Larry is there
    There are 2 Brick Walls
    Wall =>	[Brick Brick Larry]
    Smith =>	[John]
    Dog =>	[]

=head2 The find_dup() Method

    $status = $X->find_dup($key, $value) ;

This method checks for the existence of a specific key/value pair. If the
pair exists, the cursor is left pointing to the pair and the method 
returns 0. Otherwise the method returns a non-zero value.

Assuming the database from the previous example:

    use warnings ;
    use strict ;
    use DB_File ;

    my ($filename, $x, %h, $found) ;

    $filename = "tree" ;

    # Enable duplicate records
    $DB_BTREE->{'flags'} = R_DUP ;

    $x = tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE 
	or die "Cannot open $filename: $!\n";

    $found = ( $x->find_dup("Wall", "Larry") == 0 ? "" : "not") ; 
    print "Larry Wall is $found there\n" ;

    $found = ( $x->find_dup("Wall", "Harry") == 0 ? "" : "not") ; 
    print "Harry Wall is $found there\n" ;

    undef $x ;
    untie %h ;

prints this

    Larry Wall is  there
    Harry Wall is not there


=head2 The del_dup() Method

    $status = $X->del_dup($key, $value) ;

This method deletes a specific key/value pair. It returns
0 if they exist and have been deleted successfully.
Otherwise the method returns a non-zero value.

Again assuming the existence of the C<tree> database

    use warnings ;
    use strict ;
    use DB_File ;

    my ($filename, $x, %h, $found) ;

    $filename = "tree" ;

    # Enable duplicate records
    $DB_BTREE->{'flags'} = R_DUP ;

    $x = tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE 
	or die "Cannot open $filename: $!\n";

    $x->del_dup("Wall", "Larry") ;

    $found = ( $x->find_dup("Wall", "Larry") == 0 ? "" : "not") ; 
    print "Larry Wall is $found there\n" ;

    undef $x ;
    untie %h ;

prints this

    Larry Wall is not there

=head2 Matching Partial Keys 

The BTREE interface has a feature which allows partial keys to be
matched. This functionality is I<only> available when the C<seq> method
is used along with the R_CURSOR flag.

    $x->seq($key, $value, R_CURSOR) ;

Here is the relevant quote from the dbopen man page where it defines
the use of the R_CURSOR flag with seq:

    Note, for the DB_BTREE access method, the returned key is not
    necessarily an exact match for the specified key. The returned key
    is the smallest key greater than or equal to the specified key,
    permitting partial key matches and range searches.

In the example script below, the C<match> sub uses this feature to find
and print the first matching key/value pair given a partial key.

    use warnings ;
    use strict ;
    use DB_File ;
    use Fcntl ;

    my ($filename, $x, %h, $st, $key, $value) ;

    sub match
    {
        my $key = shift ;
        my $value = 0;
        my $orig_key = $key ;
        $x->seq($key, $value, R_CURSOR) ;
        print "$orig_key\t-> $key\t-> $value\n" ;
    }

    $filename = "tree" ;
    unlink $filename ;

    $x = tie %h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_BTREE
        or die "Cannot open $filename: $!\n";

    # Add some key/value pairs to the file
    $h{'mouse'} = 'mickey' ;
    $h{'Wall'} = 'Larry' ;
    $h{'Walls'} = 'Brick' ; 
    $h{'Smith'} = 'John' ;


    $key = $value = 0 ;
    print "IN ORDER\n" ;
    for ($st = $x->seq($key, $value, R_FIRST) ;
	 $st == 0 ;
         $st = $x->seq($key, $value, R_NEXT) )

      {  print "$key	-> $value\n" }

    print "\nPARTIAL MATCH\n" ;

    match "Wa" ;
    match "A" ;
    match "a" ;

    undef $x ;
    untie %h ;

Here is the output:

    IN ORDER
    Smith -> John
    Wall  -> Larry
    Walls -> Brick
    mouse -> mickey

    PARTIAL MATCH
    Wa -> Wall  -> Larry
    A  -> Smith -> John
    a  -> mouse -> mickey

=head1 DB_RECNO

DB_RECNO provides an interface to flat text files. Both variable and
fixed length records are supported.

In order to make RECNO more compatible with Perl, the array offset for
all RECNO arrays begins at 0 rather than 1 as in Berkeley DB.

As with normal Perl arrays, a RECNO array can be accessed using
negative indexes. The index -1 refers to the last element of the array,
-2 the second last, and so on. Attempting to access an element before
the start of the array will raise a fatal run-time error.

=head2 The 'bval' Option

The operation of the bval option warrants some discussion. Here is the
definition of bval from the Berkeley DB 1.85 recno manual page:

    The delimiting byte to be used to mark  the  end  of  a
    record for variable-length records, and the pad charac-
    ter for fixed-length records.  If no  value  is  speci-
    fied,  newlines  (``\n'')  are  used to mark the end of
    variable-length records and  fixed-length  records  are
    padded with spaces.

The second sentence is wrong. In actual fact bval will only default to
C<"\n"> when the openinfo parameter in dbopen is NULL. If a non-NULL
openinfo parameter is used at all, the value that happens to be in bval
will be used. That means you always have to specify bval when making
use of any of the options in the openinfo parameter. This documentation
error will be fixed in the next release of Berkeley DB.

That clarifies the situation with regards Berkeley DB itself. What
about B<DB_File>? Well, the behavior defined in the quote above is
quite useful, so B<DB_File> conforms to it.

That means that you can specify other options (e.g. cachesize) and
still have bval default to C<"\n"> for variable length records, and
space for fixed length records.

Also note that the bval option only allows you to specify a single byte
as a delimiter.

=head2 A Simple Example

Here is a simple example that uses RECNO (if you are using a version 
of Perl earlier than 5.004_57 this example won't work -- see 
L<Extra RECNO Methods> for a workaround).

    use warnings ;
    use strict ;
    use DB_File ;

    my $filename = "text" ;
    unlink $filename ;

    my @h ;
    tie @h, "DB_File", $filename, O_RDWR|O_CREAT, 0666, $DB_RECNO 
        or die "Cannot open file 'text': $!\n" ;

    # Add a few key/value pairs to the file
    $h[0] = "orange" ;
    $h[1] = "blue" ;
    $h[2] = "yellow" ;

    push @h, "green", "black" ;

    my $elements = scalar @h ;
    print "The array contains $elements entries\n" ;

    my $last = pop @h ;
    print "popped $last\n" ;

    unshift @h, "white" ;
    my $first = shift @h ;
    print "shifted $first\n" ;

    # Check for existence of a key
    print "Element 1 Exists with value $h[1]\n" if $h[1] ;

    # use a negative index
    print "The last element is $h[-1]\n" ;
    print "The 2nd last element is $h[-2]\n" ;

    untie @h ;

Here is the output from the script:

    The array contains 5 entries
    popped black
    shifted white
    Element 1 Exists with value blue
    The last element is green
    The 2nd last element is yellow

=head2 Extra RECNO Methods

If you are using a version of Perl earlier than 5.004_57, the tied
array interface is quite limited. In the example script above
C<push>, C<pop>, C<shift>, C<unshift>
or determining the array length will not work with a tied array.

To make the interface more useful for older versions of Perl, a number
of methods are supplied with B<DB_File> to simulate the missing array
operations. All these methods are accessed via the object returned from
the tie call.

Here are the methods:

=over 5

=item B<$X-E<gt>push(list) ;>

Pushes the elements of C<list> to the end of the array.

=item B<$value = $X-E<gt>pop ;>

Removes and returns the last element of the array.

=item B<$X-E<gt>shift>

Removes and returns the first element of the array.

=item B<$X-E<gt>unshift(list) ;>

Pushes the elements of C<list> to the start of the array.

=item B<$X-E<gt>length>

Returns the number of elements in the array.

=item B<$X-E<gt>splice(offset, length, elements);>

Returns a splice of the array.

=back

=head2 Another Example

Here is a more complete example that makes use of some of the methods
described above. It also makes use of the API interface directly (see 
L<THE API INTERFACE>).

    use warnings ;
    use strict ;
    my (@h, $H, $file, $i) ;
    use DB_File ;
    use Fcntl ;

    $file = "text" ;

    unlink $file ;

    $H = tie @h, "DB_File", $file, O_RDWR|O_CREAT, 0666, $DB_RECNO 
        or die "Cannot open file $file: $!\n" ;

    # first create a text file to play with
    $h[0] = "zero" ;
    $h[1] = "one" ;
    $h[2] = "two" ;
    $h[3] = "three" ;
    $h[4] = "four" ;


    # Print the records in order.
    #
    # The length method is needed here because evaluating a tied
    # array in a scalar context does not return the number of
    # elements in the array.  

    print "\nORIGINAL\n" ;
    foreach $i (0 .. $H->length - 1) {
        print "$i: $h[$i]\n" ;
    }

    # use the push & pop methods
    $a = $H->pop ;
    $H->push("last") ;
    print "\nThe last record was [$a]\n" ;

    # and the shift & unshift methods
    $a = $H->shift ;
    $H->unshift("first") ;
    print "The first record was [$a]\n" ;

    # Use the API to add a new record after record 2.
    $i = 2 ;
    $H->put($i, "Newbie", R_IAFTER) ;

    # and a new record before record 1.
    $i = 1 ;
    $H->put($i, "New One", R_IBEFORE) ;

    # delete record 3
    $H->del(3) ;

    # now print the records in reverse order
    print "\nREVERSE\n" ;
    for ($i = $H->length - 1 ; $i >= 0 ; -- $i)
      { print "$i: $h[$i]\n" }

    # same again, but use the API functions instead
    print "\nREVERSE again\n" ;
    my ($s, $k, $v)  = (0, 0, 0) ;
    for ($s = $H->seq($k, $v, R_LAST) ; 
             $s == 0 ; 
             $s = $H->seq($k, $v, R_PREV))
      { print "$k: $v\n" }

    undef $H ;
    untie @h ;

and this is what it outputs:

    ORIGINAL
    0: zero
    1: one
    2: two
    3: three
    4: four

    The last record was [four]
    The first record was [zero]

    REVERSE
    5: last
    4: three
    3: Newbie
    2: one
    1: New One
    0: first

    REVERSE again
    5: last
    4: three
    3: Newbie
    2: one
    1: New One
    0: first

Notes:

=over 5

=item 1.

Rather than iterating through the array, C<@h> like this:

    foreach $i (@h)

it is necessary to use either this:

    foreach $i (0 .. $H->length - 1) 

or this:

    for ($a = $H->get($k, $v, R_FIRST) ;
         $a == 0 ;
         $a = $H->get($k, $v, R_NEXT) )

=item 2.

Notice that both times the C<put> method was used the record index was
specified using a variable, C<$i>, rather than the literal value
itself. This is because C<put> will return the record number of the
inserted line via that parameter.

=back

=head1 THE API INTERFACE

As well as accessing Berkeley DB using a tied hash or array, it is also
possible to make direct use of most of the API functions defined in the
Berkeley DB documentation.

To do this you need to store a copy of the object returned from the tie.

	$db = tie %hash, "DB_File", "filename" ;

Once you have done that, you can access the Berkeley DB API functions
as B<DB_File> methods directly like this:

	$db->put($key, $value, R_NOOVERWRITE) ;

B<Important:> If you have saved a copy of the object returned from
C<tie>, the underlying database file will I<not> be closed until both
the tied variable is untied and all copies of the saved object are
destroyed. 

    use DB_File ;
    $db = tie %hash, "DB_File", "filename" 
        or die "Cannot tie filename: $!" ;
    ...
    undef $db ;
    untie %hash ;

See L<The untie() Gotcha> for more details.

All the functions defined in L<dbopen> are available except for
close() and dbopen() itself. The B<DB_File> method interface to the
supported functions have been implemented to mirror the way Berkeley DB
works whenever possible. In particular note that:

=over 5

=item *

The methods return a status value. All return 0 on success.
All return -1 to signify an error and set C<$!> to the exact
error code. The return code 1 generally (but not always) means that the
key specified did not exist in the database.

Other return codes are defined. See below and in the Berkeley DB
documentation for details. The Berkeley DB documentation should be used
as the definitive source.

=item *

Whenever a Berkeley DB function returns data via one of its parameters,
the equivalent B<DB_File> method does exactly the same.

=item *

If you are careful, it is possible to mix API calls with the tied
hash/array interface in the same piece of code. Although only a few of
the methods used to implement the tied interface currently make use of
the cursor, you should always assume that the cursor has been changed
any time the tied hash/array interface is used. As an example, this
code will probably not do what you expect:

    $X = tie %x, 'DB_File', $filename, O_RDWR|O_CREAT, 0777, $DB_BTREE
        or die "Cannot tie $filename: $!" ;

    # Get the first key/value pair and set  the cursor
    $X->seq($key, $value, R_FIRST) ;

    # this line will modify the cursor
    $count = scalar keys %x ; 

    # Get the second key/value pair.
    # oops, it didn't, it got the last key/value pair!
    $X->seq($key, $value, R_NEXT) ;

The code above can be rearranged to get around the problem, like this:

    $X = tie %x, 'DB_File', $filename, O_RDWR|O_CREAT, 0777, $DB_BTREE
        or die "Cannot tie $filename: $!" ;

    # this line will modify the cursor
    $count = scalar keys %x ; 

    # Get the first key/value pair and set  the cursor
    $X->seq($key, $value, R_FIRST) ;

    # Get the second key/value pair.
    # worked this time.
    $X->seq($key, $value, R_NEXT) ;

=back

All the constants defined in L<dbopen> for use in the flags parameters
in the methods defined below are also available. Refer to the Berkeley
DB documentation for the precise meaning of the flags values.

Below is a list of the methods available.

=over 5

=item B<$status = $X-E<gt>get($key, $value [, $flags]) ;>

Given a key (C<$key>) this method reads the value associated with it
from the database. The value read from the database is returned in the
C<$value> parameter.

If the key does not exist the method returns 1.

No flags are currently defined for this method.

=item B<$status = $X-E<gt>put($key, $value [, $flags]) ;>

Stores the key/value pair in the database.

If you use either the R_IAFTER or R_IBEFORE flags, the C<$key> parameter
will have the record number of the inserted key/value pair set.

Valid flags are R_CURSOR, R_IAFTER, R_IBEFORE, R_NOOVERWRITE and
R_SETCURSOR.

=item B<$status = $X-E<gt>del($key [, $flags]) ;>

Removes all key/value pairs with key C<$key> from the database.

A return code of 1 means that the requested key was not in the
database.

R_CURSOR is the only valid flag at present.

=item B<$status = $X-E<gt>fd ;>

Returns the file descriptor for the underlying database.

See L<Locking: The Trouble with fd> for an explanation for why you should
not use C<fd> to lock your database.

=item B<$status = $X-E<gt>seq($key, $value, $flags) ;>

This interface allows sequential retrieval from the database. See
L<dbopen> for full details.

Both the C<$key> and C<$value> parameters will be set to the key/value
pair read from the database.

The flags parameter is mandatory. The valid flag values are R_CURSOR,
R_FIRST, R_LAST, R_NEXT and R_PREV.

=item B<$status = $X-E<gt>sync([$flags]) ;>

Flushes any cached buffers to disk.

R_RECNOSYNC is the only valid flag at present.

=back

=head1 DBM FILTERS

A DBM Filter is a piece of code that is be used when you I<always> want to
make the same transformation to all keys and/or values in a DBM database.
An example is when you need to encode your data in UTF-8 before writing to
the database and then decode the UTF-8 when reading from the database file.

There are two ways to use a DBM Filter.

=over 5

=item 1.

Using the low-level API defined below.

=item 2.

Using the L<DBM_Filter> module. 
This module hides the complexity of the API defined below and comes
with a number of "canned" filters that cover some of the common use-cases.

=back

Use of the L<DBM_Filter> module is recommended.

=head2 DBM Filter Low-level API

There are four methods associated with DBM Filters. All work identically,
and each is used to install (or uninstall) a single DBM Filter. Each
expects a single parameter, namely a reference to a sub. The only
difference between them is the place that the filter is installed.

To summarise:

=over 5

=item B<filter_store_key>

If a filter has been installed with this method, it will be invoked
every time you write a key to a DBM database.

=item B<filter_store_value>

If a filter has been installed with this method, it will be invoked
every time you write a value to a DBM database.


=item B<filter_fetch_key>

If a filter has been installed with this method, it will be invoked
every time you read a key from a DBM database.

=item B<filter_fetch_value>

If a filter has been installed with this method, it will be invoked
every time you read a value from a DBM database.

=back

You can use any combination of the methods, from none, to all four.

All filter methods return the existing filter, if present, or C<undef>
in not.

To delete a filter pass C<undef> to it.

=head2 The Filter

When each filter is called by Perl, a local copy of C<$_> will contain
the key or value to be filtered. Filtering is achieved by modifying
the contents of C<$_>. The return code from the filter is ignored.

=head2 An Example -- the NULL termination problem.

Consider the following scenario. You have a DBM database
that you need to share with a third-party C application. The C application
assumes that I<all> keys and values are NULL terminated. Unfortunately
when Perl writes to DBM databases it doesn't use NULL termination, so
your Perl application will have to manage NULL termination itself. When
you write to the database you will have to use something like this:

    $hash{"$key\0"} = "$value\0" ;

Similarly the NULL needs to be taken into account when you are considering
the length of existing keys/values.

It would be much better if you could ignore the NULL terminations issue
in the main application code and have a mechanism that automatically
added the terminating NULL to all keys and values whenever you write to
the database and have them removed when you read from the database. As I'm
sure you have already guessed, this is a problem that DBM Filters can
fix very easily.

    use warnings ;
    use strict ;
    use DB_File ;

    my %hash ;
    my $filename = "filt" ;
    unlink $filename ;

    my $db = tie %hash, 'DB_File', $filename, O_CREAT|O_RDWR, 0666, $DB_HASH 
      or die "Cannot open $filename: $!\n" ;

    # Install DBM Filters
    $db->filter_fetch_key  ( sub { s/\0$//    } ) ;
    $db->filter_store_key  ( sub { $_ .= "\0" } ) ;
    $db->filter_fetch_value( sub { s/\0$//    } ) ;
    $db->filter_store_value( sub { $_ .= "\0" } ) ;

    $hash{"abc"} = "def" ;
    my $a = $hash{"ABC"} ;
    # ...
    undef $db ;
    untie %hash ;

Hopefully the contents of each of the filters should be
self-explanatory. Both "fetch" filters remove the terminating NULL,
and both "store" filters add a terminating NULL.


=head2 Another Example -- Key is a C int.

Here is another real-life example. By default, whenever Perl writes to
a DBM database it always writes the key and value as strings. So when
you use this:

    $hash{12345} = "something" ;

the key 12345 will get stored in the DBM database as the 5 byte string
"12345". If you actually want the key to be stored in the DBM database
as a C int, you will have to use C<pack> when writing, and C<unpack>
when reading.

Here is a DBM Filter that does it:

    use warnings ;
    use strict ;
    use DB_File ;
    my %hash ;
    my $filename = "filt" ;
    unlink $filename ;


    my $db = tie %hash, 'DB_File', $filename, O_CREAT|O_RDWR, 0666, $DB_HASH 
      or die "Cannot open $filename: $!\n" ;

    $db->filter_fetch_key  ( sub { $_ = unpack("i", $_) } ) ;
    $db->filter_store_key  ( sub { $_ = pack ("i", $_) } ) ;
    $hash{123} = "def" ;
    # ...
    undef $db ;
    untie %hash ;

This time only two filters have been used -- we only need to manipulate
the contents of the key, so it wasn't necessary to install any value
filters.

=head1 HINTS AND TIPS 


=head2 Locking: The Trouble with fd

Until version 1.72 of this module, the recommended technique for locking
B<DB_File> databases was to flock the filehandle returned from the "fd"
function. Unfortunately this technique has been shown to be fundamentally
flawed (Kudos to David Harris for tracking this down). Use it at your own
peril!

The locking technique went like this. 

    $db = tie(%db, 'DB_File', 'foo.db', O_CREAT|O_RDWR, 0644)
        || die "dbcreat foo.db $!";
    $fd = $db->fd;
    open(DB_FH, "+<&=$fd") || die "dup $!";
    flock (DB_FH, LOCK_EX) || die "flock: $!";
    ...
    $db{"Tom"} = "Jerry" ;
    ...
    flock(DB_FH, LOCK_UN);
    undef $db;
    untie %db;
    close(DB_FH);

In simple terms, this is what happens:

=over 5

=item 1.

Use "tie" to open the database.

=item 2.

Lock the database with fd & flock.

=item 3.

Read & Write to the database.

=item 4.

Unlock and close the database.

=back

Here is the crux of the problem. A side-effect of opening the B<DB_File>
database in step 2 is that an initial block from the database will get
read from disk and cached in memory.

To see why this is a problem, consider what can happen when two processes,
say "A" and "B", both want to update the same B<DB_File> database
using the locking steps outlined above. Assume process "A" has already
opened the database and has a write lock, but it hasn't actually updated
the database yet (it has finished step 2, but not started step 3 yet). Now
process "B" tries to open the same database - step 1 will succeed,
but it will block on step 2 until process "A" releases the lock. The
important thing to notice here is that at this point in time both
processes will have cached identical initial blocks from the database.

Now process "A" updates the database and happens to change some of the
data held in the initial buffer. Process "A" terminates, flushing
all cached data to disk and releasing the database lock. At this point
the database on disk will correctly reflect the changes made by process
"A".

With the lock released, process "B" can now continue. It also updates the
database and unfortunately it too modifies the data that was in its
initial buffer. Once that data gets flushed to disk it will overwrite
some/all of the changes process "A" made to the database.

The result of this scenario is at best a database that doesn't contain
what you expect. At worst the database will corrupt.

The above won't happen every time competing process update the same
B<DB_File> database, but it does illustrate why the technique should
not be used.

=head2 Safe ways to lock a database

Starting with version 2.x, Berkeley DB  has internal support for locking.
The companion module to this one, B<BerkeleyDB>, provides an interface
to this locking functionality. If you are serious about locking
Berkeley DB databases, I strongly recommend using B<BerkeleyDB>.

If using B<BerkeleyDB> isn't an option, there are a number of modules
available on CPAN that can be used to implement locking. Each one
implements locking differently and has different goals in mind. It is
therefore worth knowing the difference, so that you can pick the right
one for your application. Here are the three locking wrappers:

=over 5

=item B<Tie::DB_Lock>

A B<DB_File> wrapper which creates copies of the database file for
read access, so that you have a kind of a multiversioning concurrent read
system. However, updates are still serial. Use for databases where reads
may be lengthy and consistency problems may occur.

=item B<Tie::DB_LockFile> 

A B<DB_File> wrapper that has the ability to lock and unlock the database
while it is being used. Avoids the tie-before-flock problem by simply
re-tie-ing the database when you get or drop a lock.  Because of the
flexibility in dropping and re-acquiring the lock in the middle of a
session, this can be massaged into a system that will work with long
updates and/or reads if the application follows the hints in the POD
documentation.

=item B<DB_File::Lock> 

An extremely lightweight B<DB_File> wrapper that simply flocks a lockfile
before tie-ing the database and drops the lock after the untie. Allows
one to use the same lockfile for multiple databases to avoid deadlock
problems, if desired. Use for databases where updates are reads are
quick and simple flock locking semantics are enough.

=back

=head2 Sharing Databases With C Applications

There is no technical reason why a Berkeley DB database cannot be
shared by both a Perl and a C application.

The vast majority of problems that are reported in this area boil down
to the fact that C strings are NULL terminated, whilst Perl strings are
not. See L<DBM FILTERS> for a generic way to work around this problem.

Here is a real example. Netscape 2.0 keeps a record of the locations you
visit along with the time you last visited them in a DB_HASH database.
This is usually stored in the file F<~/.netscape/history.db>. The key
field in the database is the location string and the value field is the
time the location was last visited stored as a 4 byte binary value.

If you haven't already guessed, the location string is stored with a
terminating NULL. This means you need to be careful when accessing the
database.

Here is a snippet of code that is loosely based on Tom Christiansen's
I<ggh> script (available from your nearest CPAN archive in
F<authors/id/TOMC/scripts/nshist.gz>).

    use warnings ;
    use strict ;
    use DB_File ;
    use Fcntl ;

    my ($dotdir, $HISTORY, %hist_db, $href, $binary_time, $date) ;
    $dotdir = $ENV{HOME} || $ENV{LOGNAME};

    $HISTORY = "$dotdir/.netscape/history.db";

    tie %hist_db, 'DB_File', $HISTORY
        or die "Cannot open $HISTORY: $!\n" ;;

    # Dump the complete database
    while ( ($href, $binary_time) = each %hist_db ) {

        # remove the terminating NULL
        $href =~ s/\x00$// ;

        # convert the binary time into a user friendly string
        $date = localtime unpack("V", $binary_time);
        print "$date $href\n" ;
    }

    # check for the existence of a specific key
    # remember to add the NULL
    if ( $binary_time = $hist_db{"http://mox.perl.com/\x00"} ) {
        $date = localtime unpack("V", $binary_time) ;
        print "Last visited mox.perl.com on $date\n" ;
    }
    else {
        print "Never visited mox.perl.com\n"
    }

    untie %hist_db ;

=head2 The untie() Gotcha

If you make use of the Berkeley DB API, it is I<very> strongly
recommended that you read L<perltie/The untie Gotcha>. 

Even if you don't currently make use of the API interface, it is still
worth reading it.

Here is an example which illustrates the problem from a B<DB_File>
perspective:

    use DB_File ;
    use Fcntl ;

    my %x ;
    my $X ;

    $X = tie %x, 'DB_File', 'tst.fil' , O_RDWR|O_TRUNC
        or die "Cannot tie first time: $!" ;

    $x{123} = 456 ;

    untie %x ;

    tie %x, 'DB_File', 'tst.fil' , O_RDWR|O_CREAT
        or die "Cannot tie second time: $!" ;

    untie %x ;

When run, the script will produce this error message:

    Cannot tie second time: Invalid argument at bad.file line 14.

Although the error message above refers to the second tie() statement
in the script, the source of the problem is really with the untie()
statement that precedes it.

Having read L<perltie> you will probably have already guessed that the
error is caused by the extra copy of the tied object stored in C<$X>.
If you haven't, then the problem boils down to the fact that the
B<DB_File> destructor, DESTROY, will not be called until I<all>
references to the tied object are destroyed. Both the tied variable,
C<%x>, and C<$X> above hold a reference to the object. The call to
untie() will destroy the first, but C<$X> still holds a valid
reference, so the destructor will not get called and the database file
F<tst.fil> will remain open. The fact that Berkeley DB then reports the
attempt to open a database that is already open via the catch-all
"Invalid argument" doesn't help.

If you run the script with the C<-w> flag the error message becomes:

    untie attempted while 1 inner references still exist at bad.file line 12.
    Cannot tie second time: Invalid argument at bad.file line 14.

which pinpoints the real problem. Finally the script can now be
modified to fix the original problem by destroying the API object
before the untie:

    ...
    $x{123} = 456 ;

    undef $X ;
    untie %x ;

    $X = tie %x, 'DB_File', 'tst.fil' , O_RDWR|O_CREAT
    ...


=head1 COMMON QUESTIONS

=head2 Why is there Perl source in my database?

If you look at the contents of a database file created by DB_File,
there can sometimes be part of a Perl script included in it.

This happens because Berkeley DB uses dynamic memory to allocate
buffers which will subsequently be written to the database file. Being
dynamic, the memory could have been used for anything before DB
malloced it. As Berkeley DB doesn't clear the memory once it has been
allocated, the unused portions will contain random junk. In the case
where a Perl script gets written to the database, the random junk will
correspond to an area of dynamic memory that happened to be used during
the compilation of the script.

Unless you don't like the possibility of there being part of your Perl
scripts embedded in a database file, this is nothing to worry about.

=head2 How do I store complex data structures with DB_File?

Although B<DB_File> cannot do this directly, there is a module which
can layer transparently over B<DB_File> to accomplish this feat.

Check out the MLDBM module, available on CPAN in the directory
F<modules/by-module/MLDBM>.

=head2 What does "wide character in subroutine entry" mean?

You will usually get this message if you are working with UTF-8 data and
want to read/write it from/to a Berkeley DB database file.

The easist way to deal with this issue is to use the pre-defined "utf8"
B<DBM_Filter> (see L<DBM_Filter>) that was designed to deal with this
situation.

The example below shows what you need if I<both> the key and value are
expected to be in UTF-8. 

    use DB_File;
    use DBM_Filter; 

    my $db = tie %h, 'DB_File', '/tmp/try.db', O_CREAT|O_RDWR, 0666, $DB_BTREE; 
    $db->Filter_Key_Push('utf8');
    $db->Filter_Value_Push('utf8');

    my $key = "\N{LATIN SMALL LETTER A WITH ACUTE}";
    my $value = "\N{LATIN SMALL LETTER E WITH ACUTE}";
    $h{ $key } = $value;

=head2 What does "Invalid Argument" mean?

You will get this error message when one of the parameters in the
C<tie> call is wrong. Unfortunately there are quite a few parameters to
get wrong, so it can be difficult to figure out which one it is.

Here are a couple of possibilities:

=over 5

=item 1.

Attempting to reopen a database without closing it. 

=item 2.

Using the O_WRONLY flag.

=back

=head2 What does "Bareword 'DB_File' not allowed" mean? 

You will encounter this particular error message when you have the
C<strict 'subs'> pragma (or the full strict pragma) in your script.
Consider this script:

    use warnings ;
    use strict ;
    use DB_File ;
    my %x ;
    tie %x, DB_File, "filename" ;

Running it produces the error in question:

    Bareword "DB_File" not allowed while "strict subs" in use 

To get around the error, place the word C<DB_File> in either single or
double quotes, like this:

    tie %x, "DB_File", "filename" ;

Although it might seem like a real pain, it is really worth the effort
of having a C<use strict> in all your scripts.

=head1 REFERENCES

Articles that are either about B<DB_File> or make use of it.

=over 5

=item 1.

I<Full-Text Searching in Perl>, Tim Kientzle (tkientzle@ddj.com),
Dr. Dobb's Journal, Issue 295, January 1999, pp 34-41

=back

=head1 HISTORY

Moved to the Changes file.

=head1 BUGS

Some older versions of Berkeley DB had problems with fixed length
records using the RECNO file format. This problem has been fixed since
version 1.85 of Berkeley DB.

I am sure there are bugs in the code. If you do find any, or can
suggest any enhancements, I would welcome your comments.

=head1 AVAILABILITY

B<DB_File> comes with the standard Perl source distribution. Look in
the directory F<ext/DB_File>. Given the amount of time between releases
of Perl the version that ships with Perl is quite likely to be out of
date, so the most recent version can always be found on CPAN (see
L<perlmodlib/CPAN> for details), in the directory
F<modules/by-module/DB_File>.

This version of B<DB_File> will work with either version 1.x, 2.x or
3.x of Berkeley DB, but is limited to the functionality provided by
version 1.

The official web site for Berkeley DB is F<http://www.oracle.com/technology/products/berkeley-db/db/index.html>.
All versions of Berkeley DB are available there.

Alternatively, Berkeley DB version 1 is available at your nearest CPAN
archive in F<src/misc/db.1.85.tar.gz>.

=head1 COPYRIGHT

Copyright (c) 1995-2016 Paul Marquess. All rights reserved. This program
is free software; you can redistribute it and/or modify it under the
same terms as Perl itself.

Although B<DB_File> is covered by the Perl license, the library it
makes use of, namely Berkeley DB, is not. Berkeley DB has its own
copyright and its own license. Please take the time to read it.

Here are a few words taken from the Berkeley DB FAQ (at
F<http://www.oracle.com/technology/products/berkeley-db/db/index.html>) regarding the license:

    Do I have to license DB to use it in Perl scripts? 

    No. The Berkeley DB license requires that software that uses
    Berkeley DB be freely redistributable. In the case of Perl, that
    software is Perl, and not your scripts. Any Perl scripts that you
    write are your property, including scripts that make use of
    Berkeley DB. Neither the Perl license nor the Berkeley DB license
    place any restriction on what you may do with them.

If you are in any doubt about the license situation, contact either the
Berkeley DB authors or the author of DB_File. See L<"AUTHOR"> for details.


=head1 SEE ALSO

L<perl>, L<dbopen(3)>, L<hash(3)>, L<recno(3)>, L<btree(3)>,
L<perldbmfilter>, L<DBM_Filter>

=head1 AUTHOR

The DB_File interface was written by Paul Marquess
E<lt>pmqs@cpan.orgE<gt>.

=cut
{"id":4867,"date":"2025-05-17T10:41:48","date_gmt":"2025-05-17T10:41:48","guid":{"rendered":"https:\/\/4pie.com.mx\/?p=4867"},"modified":"2025-05-23T10:41:58","modified_gmt":"2025-05-23T10:41:58","slug":"muoi-trang-web-song-bac-va-tro-choi-dua-tren-web-tot-nhat-cua-web-cash-web-chung-toi-2025","status":"publish","type":"post","link":"https:\/\/4pie.com.mx\/index.php\/2025\/05\/17\/muoi-trang-web-song-bac-va-tro-choi-dua-tren-web-tot-nhat-cua-web-cash-web-chung-toi-2025\/","title":{"rendered":"M\u01b0\u1eddi trang web s\u00f2ng b\u1ea1c v\u00e0 tr\u00f2 ch\u01a1i d\u1ef1a tr\u00ean web t\u1ed1t nh\u1ea5t c\u1ee7a Web Cash Web ch\u00fang t\u00f4i 2025"},"content":{"rendered":"

\u0110\u1ed1i v\u1edbi nhi\u1ec1u ng\u01b0\u1eddi \u0111ang \u0111\u00e1nh gi\u00e1 c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn, vi\u1ec7c ki\u1ec3m tra th\u01b0 m\u1ee5c s\u00f2ng b\u1ea1c tr\u00ean internet \u0111\u01b0\u1ee3c cung c\u1ea5p \u00edt h\u01a1n \u0111\u1ec3 xem trong s\u1ed1 c\u00e1c t\u00f9y ch\u1ecdn t\u1ed1t h\u01a1n c\u00f3 s\u1eb5n. \u01afu \u0111i\u1ec3m \u0111\u1ec1 ngh\u1ecb ki\u1ec3m game kingfun<\/a> tra gi\u1edbi h\u1ea1n c\u1ee7a nhau v\u00e0 \u0111\u1eb7t c\u01b0\u1ee3c th\u1ea5p nh\u1ea5t b\u1ea5t c\u1ee9 khi n\u00e0o so s\u00e1nh c\u00e1c tr\u00f2 ch\u01a1i s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn c\u00f2n s\u1ed1ng. T\u1ed5 ch\u1ee9c \u0111\u00e1ng tin c\u1eady \u0111\u1ea3m b\u1ea3o ch\u01a1i tr\u00f2 ch\u01a1i d\u1ec5 d\u00e0ng v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 c\u00e1c nh\u00e0 \u0111\u1ea7u t\u01b0 h\u00e0ng \u0111\u1ea7u, g\u00e2y ra m\u00f4i tr\u01b0\u1eddng \u0111\u00e1nh b\u1ea1c li\u1ec1n m\u1ea1ch. D\u1ecbch v\u1ee5 h\u1ed7 tr\u1ee3 h\u1ee3p ph\u00e1p l\u00e0 r\u1ea5t quan tr\u1ecdng \u0111\u1ec3 s\u1edf h\u1eefu c\u00e1c v\u1ea5n \u0111\u1ec1 gi\u1ea3i quy\u1ebft th\u00f4ng qua c\u00e1c l\u1edbp ch\u01a1i.<\/p>\n

Game kingfun: Ti\u1ec1n th\u01b0\u1edfng s\u00f2ng b\u1ea1c v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 chi\u1ebfn d\u1ecbch<\/h2>\n

M\u1ed9t c\u00e1i g\u00ec \u0111\u00f3 kh\u00e1c nhau \u0111\u00e3 \u0111\u0103ng k\u00fd s\u00f2ng b\u1ea1c d\u1ef1a tr\u00ean web th\u01b0\u1eddng l\u00e0 ch\u00fang c\u0169ng c\u00f3 v\u1edbi c\u00f4ng ngh\u1ec7 m\u00e3 h\u00f3a SSL hi\u1ec7n t\u1ea1i c\u00f3 s\u1eb5n v\u1edbi c\u00e1c t\u1ed5 ch\u1ee9c nh\u01b0 Digicert v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 CloudFlare. Do \u0111\u00f3, chi ti\u1ebft c\u00e1 nh\u00e2n c\u1ee7a ri\u00eang b\u1ea1n v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 th\u00f4ng tin ti\u1ec1n t\u1ec7 th\u1ef1c s\u1ef1 \u0111\u01b0\u1ee3c b\u1ea3o m\u1eadt \u0111\u00fang c\u00e1ch v\u00e0 b\u1ea1n s\u1ebd x\u1eed l\u00fd. V\u00e0 cu\u1ed1i c\u00f9ng, t\u1ea5t c\u1ea3 c\u00e1c trang web c\u00e1 c\u01b0\u1ee3c \u0111\u01b0\u1ee3c \u1ee7y quy\u1ec1n hi\u1ec7n cung c\u1ea5p m\u1ed9t c\u01a1 h\u1ed9i h\u1ee3p l\u00fd v\u1ec1 thu nh\u1eadp ti\u1ec1m n\u0103ng trong su\u1ed1t nh\u1eefng n\u0103m qua. \u0110\u1ec3 x\u00e1c nh\u1eadn \u0111\u1ed9 tin c\u1eady ho\u00e0n to\u00e0n m\u1edbi c\u1ee7a m\u1ed9t s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn kh\u00e1c, h\u00e3y xem h\u01b0\u1edbng d\u1eabn c\u1ea5p ph\u00e9p c\u1ee7a h\u1ecd, hi\u1ec3u x\u1ebfp h\u1ea1ng c\u1ee7a \u01b0u \u0111\u00e3i h\u00e0ng \u0111\u1ea7u v\u00e0 b\u1ea1n s\u1ebd ki\u1ec3m tra kh\u1ea3 n\u0103ng \u0111\u00e1p \u1ee9ng ho\u00e0n to\u00e0n m\u1edbi c\u1ee7a d\u1ecbch v\u1ee5 kh\u00e1ch h\u00e0ng.Kh\u00e1m ph\u00e1 c\u00e1c \u0111\u00e1nh gi\u00e1 ngo\u00e0i h\u00e0ng \u0111\u1ea7u cung c\u1ea5p l\u00e0 m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3 \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh danh ti\u1ebfng m\u1edbi nh\u1ea5t c\u1ee7a m\u1ed9t s\u00f2ng b\u1ea1c internet thay th\u1ebf.<\/p>\n

T\u00f9y thu\u1ed9c v\u00e0o \u0111\u00e1nh gi\u00e1 c\u1ee7a ng\u01b0\u1eddi d\u00f9ng tr\u00ean c\u1eeda h\u00e0ng tr\u00e1i c\u00e2y v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 ch\u01a1i yahoo, th\u1ecfa thu\u1eadn gi\u00e0nh chi\u1ebfn th\u1eafng c\u1ee7a b\u1ea1n v\u1edbi nh\u1eefng ng\u01b0\u1eddi c\u00f3 \u00fd ngh\u0129a ho\u1eb7c v\u1ea5n \u0111\u1ec1. S\u1ef1 pha tr\u1ed9n c\u1ee7a ch\u00fang c\u00f3 l\u1ee3i cho vi\u1ec7c \u0111\u1ea3m b\u1ea3o m\u1ed9t \u00fd ngh\u0129a \u0111\u00e1nh b\u1ea1c \u0111\u1eb7c bi\u1ec7t, v\u00e0 sau \u0111\u00f3 l\u00e0m cho c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn m\u1edbi tr\u1edf th\u00e0nh m\u1ed9t l\u1ef1a ch\u1ecdn h\u1ea5p d\u1eabn cho nh\u1eefng ng\u01b0\u1eddi tham gia t\u00ecm ki\u1ebfm cu\u1ed9c phi\u00eau l\u01b0u v\u00e0 chi ph\u00ed. \u0110\u1ea3m b\u1ea3o s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng m\u1edbi \u0111\u01b0\u1ee3c \u1ee7y quy\u1ec1n b\u1edfi ch\u00ednh ph\u1ee7 ch\u01a1i game \u0111\u01b0\u1ee3c th\u1eeba nh\u1eadn v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 d\u00e0nh c\u00e1c b\u01b0\u1edbc hoa h\u1ed3ng an to\u00e0n h\u01a1n l\u00e0 v\u00f4 c\u00f9ng quan tr\u1ecdng \u0111\u1ec3 c\u00f3 m\u1ed9t an to\u00e0n v\u00e0 b\u1ea1n s\u1ebd th\u00fa v\u1ecb tr\u1ea3i nghi\u1ec7m ch\u01a1i game. S\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng hoang d\u00e3 \u0111\u01b0\u1ee3c t\u1ed5 ch\u1ee9c cho c\u00e1c tr\u00f2 ch\u01a1i \u0111\u1ea1i l\u00fd th\u1eddi gian th\u1ef1c, l\u1ee3i nhu\u1eadn \u0111\u00fang gi\u1edd v\u00e0 b\u1ea1n s\u1ebd t\u01b0\u01a1ng th\u00edch di \u0111\u1ed9ng. M\u1ecdi ng\u01b0\u1eddi c\u0169ng c\u00f3 th\u1ec3 th\u01b0\u1edfng th\u1ee9c c\u00e1c tr\u00f2 ch\u01a1i chuy\u00ean gia c\u00f2n s\u1ed1ng ph\u1ed5 bi\u1ebfn nh\u01b0 Black-Jack, Alive Roulette, v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 Baccarat, \u0111\u01b0\u1ee3c ph\u00e1t tr\u1ef1c ti\u1ebfp trong \u0111\u1ed9 ph\u00e2n gi\u1ea3i cao. M\u1ed9t khi b\u1ea1n y\u00eau c\u1ea7u thanh to\u00e1n t\u1eeb m\u1ed9t s\u00f2ng b\u1ea1c internet ch\u00ednh h\u00e3ng, t\u1ea5t nhi\u00ean b\u1ea1n c\u1ea7n ph\u1ea3i nh\u1eadn \u0111\u01b0\u1ee3c c\u00e1c kho\u1ea3n thanh to\u00e1n c\u1ee7a m\u00ecnh c\u00e0ng s\u1edbm c\u00e0ng t\u1ed1t.<\/p>\n

\"game<\/p>\n

Khi c\u00e1c c\u1ea7u th\u1ee7 \u0111\u00e3 \u1edf c\u00e1c bang trong \u0111\u00f3 c\u00e1c s\u00f2ng b\u1ea1c d\u1ef1a tr\u00ean web kh\u00f4ng \u0111\u01b0\u1ee3c \u0111\u00e1nh gi\u00e1, h\u1ecd s\u1ebd ch\u1eafc ch\u1eafn b\u1eaft g\u1eb7p c\u00e1c trang web xu\u1ea5t hi\u1ec7n bao g\u1ed3m c\u1ea3 n\u00f3 th\u1eed t\u00f2a \u00e1n. C\u00e1c trang web ch\u01a1i game ngo\u00e0i kh\u01a1i n\u00e0y \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n \u0111\u1ec3 ho\u1ea1t \u0111\u1ed9ng ho\u00e0n to\u00e0n trong lu\u1eadt ph\u00e1p, d\u00f9 sao ch\u00fang th\u1ef1c s\u1ef1 l\u00e0m vi\u1ec7c v\u1edbi th\u1eddi trang b\u1ea5t h\u1ee3p ph\u00e1p kh\u00e1c. M\u1ed9t s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng th\u1eddi gian th\u1ef1c tr\u1ef1c tuy\u1ebfn s\u1ebd mang l\u1ea1i s\u1ef1 h\u1ed3i h\u1ed9p m\u1edbi t\u1eeb tr\u00f2 ch\u01a1i truy\u1ec1n th\u1ed1ng l\u00ean m\u00e1y t\u00ednh \u0111\u1ec3 b\u00e0n c\u1ee7a b\u1ea1n n\u1ebfu kh\u00f4ng c\u00f3 \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh.Ch\u01a1i roulette ho\u1eb7c c\u00e1c tr\u00f2 ch\u01a1i b\u00e0i v\u00ed d\u1ee5 Blackjack v\u00e0 Baccarat ch\u1ed1ng l\u1ea1i m\u1ed9t ng\u01b0\u1eddi bu\u00f4n b\u00e1n c\u1ee7a con ng\u01b0\u1eddi th\u00f4ng qua webcam.<\/p>\n

Spinblitz – L\u00fd t\u01b0\u1edfng cho ph\u1ea7n th\u01b0\u1edfng ho\u00e0n to\u00e0n mi\u1ec5n ph\u00ed v\u00e0 b\u1ea1n s\u1ebd gi\u1ea3m Cashout t\u1ed1i thi\u1ec3u SC<\/h2>\n

Mua ti\u1ec1n \u0111i\u1ec7n t\u1eed c\u0169ng \u0111\u01b0\u1ee3c an to\u00e0n v\u00e0 b\u1ea1n s\u1ebd \u0111\u00fang gi\u1edd v\u1edbi b\u1ea3o v\u1ec7 m\u1eadt m\u00e3 c\u1ee7a h\u1ecd. \u0110\u00e1nh b\u1ea1c tr\u1ef1c tuy\u1ebfn hi\u1ec7n \u0111ang l\u00e0 ph\u00f2ng x\u1eed \u00e1n b\u00ean trong Connecticut, Del bi\u1ebft, Michigan, Las Vegas, NJ, Pennsylvania, khu v\u1ef1c Rhode v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 West Virginia. H\u1ea7u nh\u01b0 m\u1ecdi ng\u01b0\u1eddi kh\u00e1c \u0111\u1ec1u n\u00f3i, v\u00ed d\u1ee5 CA, Illinois, Indiana, Massachusetts v\u00e0 New York \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u th\u00f4ng qua th\u00e0nh c\u00f4ng c\u00e1c lu\u1eadt v\u00e0 quy \u0111\u1ecbnh t\u01b0\u01a1ng t\u1ef1 trong t\u01b0\u01a1ng lai.<\/p>\n

C\u1ea3m gi\u00e1c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng (UX) l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft \u0111\u1ec3 c\u00f3 ph\u1ea7n m\u1ec1m ch\u01a1i s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng di \u0111\u1ed9ng, b\u1edfi v\u00ec c\u00e1 nh\u00e2n n\u00f3 c\u00f3 \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn s\u1ef1 tham gia c\u1ee7a ng\u01b0\u1eddi ch\u01a1i v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o tr\u00ec. M\u1ed9t khung UX nh\u1eafm m\u1ee5c ti\u00eau \u0111\u1ecbnh tuy\u1ebfn li\u1ec1n m\u1ea1ch v\u00e0 b\u1ea1n s\u1ebd k\u1ebft n\u1ed1i li\u00ean k\u1ebft, v\u00ec v\u1eady m\u1ecdi ng\u01b0\u1eddi d\u1ec5 d\u00e0ng kh\u00e1m ph\u00e1 v\u00e0 say s\u01b0a trong m\u1ed9t tr\u00f2 ch\u01a1i video ph\u1ed5 bi\u1ebfn. C\u00e1c doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c di \u0111\u1ed9ng c\u1ea7n th\u1ef1c hi\u1ec7n tr\u01a1n tru v\u1edbi m\u1ed9t lo\u1ea1t c\u00e1c \u0111i\u1ec7n tho\u1ea1i di \u0111\u1ed9ng, ph\u1ee5c v\u1ee5 \u0111\u1ec3 gi\u00fap b\u1ea1n c\u1ea3 h\u1ed3 s\u01a1 iOS v\u00e0 Android. Tr\u00f2 ch\u01a1i video m\u00f4i gi\u1edbi tr\u1ef1c ti\u1ebfp t\u00e1i t\u1ea1o c\u1ea3m gi\u00e1c s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng m\u1edbi \u1edf nh\u00e0 t\u1eeb s\u1ef1 pha tr\u1ed9n s\u1ef1 kh\u00e9o l\u00e9o c\u1ee7a vi\u1ec7c \u0111\u1eb7t c\u01b0\u1ee3c tr\u1ef1c tuy\u1ebfn \u0111\u1ebfn b\u1ea7u kh\u00f4ng kh\u00ed nh\u1eadp vai t\u1eeb m\u1ed9t doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c th\u1ef1c t\u1ebf.Nh\u1eefng lo\u1ea1i t\u01b0\u01a1ng \u1ee9ng th\u1eddi gian tr\u00f2 ch\u01a1i tr\u00f2 ch\u01a1i video n\u00e0y v\u1edbi c\u00e1c nh\u00e0 giao d\u1ecbch, mang \u0111\u1ebfn m\u1ed9t y\u1ebfu t\u1ed1 x\u00e3 h\u1ed9i \u0111\u1ec3 t\u0103ng c\u01b0\u1eddng c\u1ea3m gi\u00e1c c\u00e1 c\u01b0\u1ee3c t\u1ed5ng s\u1ed1.<\/p>\n

\"game<\/p>\n

B\u1ea1n s\u1ebd c\u1ea7n m\u1ed9t m\u1eadt kh\u1ea9u tuy\u1ec7t v\u1eddi \u0111\u1ec3 b\u1ea1n c\u00f3 th\u1ec3 \u0111\u0103ng nh\u1eadp v\u00e0o t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng c\u1ee7a m\u00ecnh khi b\u1ea1n c\u1ea7n ch\u01a1i. \u0110\u00f3 l\u00e0 \u0111i\u1ec1u \u0111\u1ea7u ti\u00ean m\u00e0 b\u1ea1n s\u1ebd c\u1ea7n l\u00e0m sau khi b\u1ea1n t\u1ea1o ra t\u01b0 c\u00e1ch th\u00e0nh vi\u00ean s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng. Tr\u00ean th\u1ef1c t\u1ebf, c\u00e1c quy t\u1eafc v\u00e0 b\u1ea1n s\u1ebd c\u1ea5u tr\u00fac t\u1eeb Baccarat kh\u00e1 gi\u1ed1ng Blackjack. D\u01b0\u1edbi \u0111\u00e2y l\u00e0 l\u1ef1a ch\u1ecdn t\u1ed1t nh\u1ea5t \u0111\u1ec3 di chuy\u1ec3n s\u1ed1 ti\u1ec1n l\u1edbn li\u00ean quan \u0111\u1ebfn t\u00e0i ch\u00ednh v\u00e0 m\u1ed9t s\u00f2ng b\u1ea1c internet h\u00e0ng \u0111\u1ea7u. M\u1eb7c d\u00f9 n\u00f3 c\u00f3 th\u1ec3 kh\u00f4ng ph\u1ea3i l\u00e0 l\u1ef1a ch\u1ecdn nhanh nh\u1ea5t, nh\u01b0ng n\u00f3 l\u00e0 m\u1ed9t trong nh\u1eefng l\u1ef1a ch\u1ecdn thay th\u1ebf t\u1ed1t nh\u1ea5t cho c\u00e1c con l\u0103n cao. Xin nh\u1edb r\u1eb1ng \u0111\u00f3 kh\u00f4ng ph\u1ea3i l\u00e0 m\u1ed9t \u0111\u00e1nh gi\u00e1 to\u00e0n b\u1ed9 v\u1ec1 t\u1ea5t c\u1ea3 c\u00e1c trang web c\u1ee7a c\u01a1 s\u1edf \u0111\u00e1nh b\u1ea1c ngo\u00e0i kh\u01a1i.<\/p>\n

R\u1ea5t nhi\u1ec1u ti\u1ec1n Bigfoot, Ph\u00f9 th\u1ee7y v\u00e0 b\u1ea1n s\u1ebd l\u00e0 Wizard, v\u00e0 Derby Bucks ch\u1ec9 l\u00e0 m\u1ed9t s\u1ed1 v\u1edf k\u1ecbch trao gi\u1ea3i Jackpots c\u00f3 kho\u1ea3ng 97,5% RTP, do c\u00e1c t\u00ednh n\u0103ng b\u1ed5 sung. B\u1ea1n s\u1ebd kh\u00f4ng mu\u1ed1n \u0111\u1ec3 b\u1ea1n c\u00f3 th\u1ec3 c\u00e1o bu\u1ed9c ti\u1ec1n th\u01b0\u1edfng v\u00e0 k\u1ebft th\u00fac ch\u00fang tr\u01b0\u1edbc khi b\u1ea1n s\u1eed d\u1ee5ng anh \u1ea5y ho\u1eb7c c\u00f4 \u1ea5y v\u00ec b\u1ea1n kh\u00f4ng ki\u1ec3m tra ch\u00ednh x\u00e1c s\u1ed1 ti\u1ec1n th\u01b0\u1edfng m\u1edbi nh\u1ea5t cu\u1ed1i c\u00f9ng. Trong c\u00e1c b\u1ea3n nh\u00e1p c\u1ee7a c\u01a1 s\u1edf \u0111\u00e1nh b\u1ea1c ch\u1ea5p nh\u1eadn b\u1ed5 sung ti\u1ec1n th\u01b0\u1edfng, b\u1ea1n c\u00f3 th\u1ec3 mua n\u0103m tr\u0103m ph\u1ea7n th\u01b0\u1edfng xoay v\u00f2ng ngay sau \u0111\u00f3 \u0111\u1ec3 th\u1eed 5 \u0111\u00f4 la. M\u1eb7c d\u00f9 b\u1ea1n c\u1ea7n k\u00fd g\u1eedi $ 5 v\u00e0 \u0111\u1eb7t c\u01b0\u1ee3c $ B\u01b0\u1edbc 1, b\u1ea1n v\u1eabn ti\u1ebfp t\u1ee5c nh\u1eadn \u0111\u01b0\u1ee3c 100 \u0111\u00f4 la, \u0111\u00f3 l\u00e0 nhi\u1ec1u h\u01a1n g\u1ea7n nh\u01b0 b\u1ea5t k\u1ef3 ph\u1ea7n th\u01b0\u1edfng n\u00e0o kh\u00e1c kh\u00f4ng c\u00f3 \u00fd \u0111\u1ecbnh kh\u00e1c. M\u1ed7i m\u1ed9t trong nh\u1eefng tr\u00f2 ch\u01a1i tr\u1ef1c tuy\u1ebfn n\u00e0y c\u00f3 c\u00e1c bi\u1ebfn th\u1ec3 m\u1edbi l\u1ea1 v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 quy \u0111\u1ecbnh m\u1ed9t \u0111i\u1ec1u \u0111\u1eb7t ra cho h\u1ecd. Tr\u00f2 ch\u01a1i s\u00f2ng b\u1ea1c c\u0169ng c\u00f3 th\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t s\u1ed1 s\u1ed1 ti\u1ec1n kh\u00e1c, li\u00ean quan \u0111\u1ebfn s\u00f2ng b\u1ea1c.<\/p>\n

Kh\u00f4ng \u0111\u1eb7t c\u01b0\u1ee3c 100 ph\u1ea7n tr\u0103m c\u00e1c v\u00f2ng quay mi\u1ec5n ph\u00ed l\u00e0 m\u1ed9t trong nh\u1eefng \u01b0u \u0111\u00e3i t\u1ed1t nh\u1ea5t \u0111\u01b0\u1ee3c cung c\u1ea5p t\u1ea1i c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn. Khi m\u1ecdi ng\u01b0\u1eddi s\u1eed d\u1ee5ng c\u00e1c xoay chuy\u1ec3n n\u00e0y, m\u1ecdi ng\u01b0\u1eddi s\u1ebd th\u1eed \u0111\u01b0\u1ee3c \u0111\u01b0a ra l\u00e0m ti\u1ec1n m\u1eb7t th\u1ef1c s\u1ef1, kh\u00f4ng c\u00f3 \u0111i\u1ec1u ki\u1ec7n c\u00e1 c\u01b0\u1ee3c n\u00e0o. C\u00f3 ngh\u0129a l\u00e0 b\u1ea1n c\u00f3 th\u1ec3 r\u00fat l\u1ea1i ti\u1ec1n th\u1eafng c\u1ee7a m\u00ecnh m\u1ed9t l\u1ea7n n\u1eefa thay v\u00ec \u0111\u00e1nh b\u1ea1c m\u1ed9t l\u1ea7n n\u1eefa. Nh\u1eefng lo\u1ea1i ti\u1ec1n th\u01b0\u1edfng n\u00e0y th\u01b0\u1eddng \u0111\u01b0\u1ee3c li\u00ean k\u1ebft v\u1edbi c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh khuy\u1ebfn m\u00e3i nh\u1ea5t \u0111\u1ecbnh n\u1ebfu kh\u00f4ng c\u00f3 b\u1ebfn c\u1ea3ng v\u00e0 b\u1ea1n s\u1ebd c\u00f3 th\u1ec3 c\u00f3 m\u1ed9t v\u1ecf b\u1ecdc chi\u1ebfn th\u1eafng t\u1ed1i \u01b0u.<\/p>\n

L\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 ch\u1eafc ch\u1eafn r\u1eb1ng v\u1ecb tr\u00ed m\u1edbi c\u1ee7a m\u1ed9t s\u00f2ng b\u1ea1c internet kh\u00e1c<\/h2>\n

\"game<\/p>\n

Ph\u1ea7n m\u1ec1m di \u0111\u1ed9ng trung th\u00e0nh \u0111\u1ea3m b\u1ea3o l\u1ed1i ch\u01a1i \u0111\u01a1n gi\u1ea3n, cho d\u00f9 c\u00f3 quay c\u00e1c c\u1ed5ng hay thi\u1ebft l\u1eadp c\u00e1c s\u1ef1 ki\u1ec7n th\u1ec3 thao hay kh\u00f4ng. To\u00e0n b\u1ed9 n\u0103m 2025 \u0111\u01b0\u1ee3c quy\u1ebft \u0111\u1ecbnh quan s\u00e1t s\u1ef1 ra m\u1eaft ho\u00e0n to\u00e0n m\u1edbi c\u1ee7a nhi\u1ec1u s\u00f2ng b\u1ea1c m\u1edbi nh\u1ea5t tr\u00ean internet, ra m\u1eaft tr\u1ea3i nghi\u1ec7m \u0111\u00e1nh b\u1ea1c s\u00e1ng t\u1ea1o v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 n\u00e2ng cao c\u00e1c t\u00ednh n\u0103ng. Ng\u01b0\u1eddi ta \u01b0\u1edbc t\u00ednh r\u1eb1ng kho\u1ea3ng 15 s\u00f2ng b\u1ea1c d\u1ef1a tr\u00ean web m\u1edbi \u0111\u00e3 \u0111\u01b0\u1ee3c ra m\u1eaft m\u1ed7i th\u00e1ng, l\u00e0m n\u1ed5i b\u1eadt s\u1ef1 ph\u1ed5 bi\u1ebfn ng\u00e0y c\u00e0ng t\u0103ng c\u1ee7a c\u1edd b\u1ea1c tr\u1ef1c tuy\u1ebfn. SLOTSLV ch\u1eafc ch\u1eafn l\u00e0 m\u1ed9t trong nh\u1eefng s\u00f2ng b\u1ea1c d\u1ef1a tr\u00ean web t\u1ed1t h\u01a1n trong tr\u01b0\u1eddng h\u1ee3p b\u1ea1n \u0111ang c\u1ed1 g\u1eafng t\u00ecm c\u00e1c khe s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn c\u1ee5 th\u1ec3. S\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn c\u0169ng cung c\u1ea5p c\u00e1c kho\u1ea3n thanh to\u00e1n an to\u00e0n, c\u00e1c nh\u00e0 \u0111\u1ea7u t\u01b0 th\u1eddi gian th\u1ef1c v\u00e0 b\u1ea1n s\u1ebd 31 v\u00f2ng quay mi\u1ec5n ph\u00ed sau khi b\u1ea1n \u0111\u0103ng k\u00fd.<\/p>\n

Tr\u00f2 ch\u01a1i \u0111\u1ea1i l\u00fd th\u1eddi gian th\u1ef1c: \u0110\u01b0a Vegas l\u00ean m\u00e0n h\u00ecnh<\/h2>\n

Ti\u1ec1n m\u1eb7t th\u1ef1c s\u1ef1 c\u00f3 l\u1ee3i nhu\u1eadn t\u1ea1i c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn tr\u1ea3 ti\u1ec1n t\u1ed1t nh\u1ea5t ch\u1ee7 y\u1ebfu l\u00e0 m\u1ed9t \u0111i\u1ec3m c\u01a1 h\u1ed9i. M\u1eb7c d\u00f9 c\u00e1c l\u1ef1a ch\u1ecdn kh\u00f4ng k\u1ef9 l\u01b0\u1ee1ng, b\u1ea1n c\u00f3 th\u1ec3 c\u1ed1 g\u1eafng c\u01a1 h\u1ed9i c\u1ee7a m\u00ecnh trong Roulette Baccarat, Blackjack, M\u1ef9 ho\u1eb7c T\u00e2y \u00c2u v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 r\u1ea5t s\u00e1u. C\u00e1c chuy\u00ean gia r\u1ea5t vui m\u1eebng \u0111\u01b0\u1ee3c kh\u00e1m ph\u00e1 nhi\u1ec1u spin mi\u1ec5n ph\u00ed 100 ph\u1ea7n tr\u0103m \u0111\u1ec1 xu\u1ea5t y\u00eau c\u1ea7u t\u1ea1i c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn t\u1ed1t nh\u1ea5t c\u1ee7a ch\u00fang t\u00f4i. Ch\u00fang t\u00f4i t\u1eeb c\u00e1c l\u1ee3i \u00edch \u0111\u00e3 m\u00f4 t\u1ea3 c\u00e1c phi\u00ean b\u1ea3n ti\u1ec1n th\u01b0\u1edfng \u0111\u01b0\u1ee3c th\u00eam v\u00e0o c\u00e1c phi\u00ean b\u1ea3n th\u01b0\u1edfng th\u00eam b\u00ean d\u01b0\u1edbi li\u00ean quan \u0111\u1ebfn nh\u1eefng ng\u01b0\u1eddi \u0111\u0103ng k\u00fd c\u00f3 gi\u00e1 tr\u1ecb c\u1ee7a ch\u00fang t\u00f4i \u0111\u1ec3 tr\u1ea3i nghi\u1ec7m. \u0110\u1ed1i v\u1edbi nh\u1eefng ng\u01b0\u1eddi \u0111\u00e1nh b\u1ea1c m\u1ed9t tr\u0103m \u0111\u00f4 la c\u0169ng nh\u01b0 tr\u00f2 ch\u01a1i tr\u1ef1c tuy\u1ebfn c\u00f3 ph\u00eda t\u00e0i s\u1ea3n l\u00e0 10%, doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c m\u1edbi nh\u1ea5t \u0111\u01b0\u1ee3c d\u1ef1 \u0111o\u00e1n s\u1ebd l\u01b0u tr\u1eef $ m\u01b0\u1eddi trong s\u1ed1 b\u1ea5t k\u1ef3 \u0111\u00f4 la n\u00e0o \u0111\u01b0\u1ee3c \u0111\u00f3ng vai ch\u00ednh. \u0110\u1ec3 c\u00f3 nh\u1eefng ng\u01b0\u1eddi tham gia, n\u00f3 ch\u1ec9 \u0111\u01a1n gi\u1ea3n l\u00e0 anh ta c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c d\u1ef1 \u0111o\u00e1n s\u1ebd m\u1ea5t nhi\u1ec1u h\u01a1n m\u1ed9t \u0111\u1ed9 tu\u1ed5i tuy\u1ec7t v\u1eddi \u0111\u1ec3 ch\u01a1i.<\/p>\n

C\u00e1c phi\u00ean b\u1ea3n ph\u1ed5 bi\u1ebfn v\u00ed d\u1ee5 nh\u01b0 Blackjack s\u1ed1ng v\u00e0 b\u1ea1n s\u1ebd l\u00e0m cho Roulette th\u1ef1c hi\u1ec7n tr\u1ea3i nghi\u1ec7m ti\u1ec3u thuy\u1ebft, th\u00eam v\u00e0o s\u1ef1 n\u1ed5i b\u1eadt li\u00ean t\u1ee5c c\u1ee7a ch\u00fang.Ch\u1ecdn doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c c\u00f2n s\u1ed1ng ph\u00f9 h\u1ee3p nh\u1ea5t c\u00f3 th\u1ec3 t\u0103ng c\u1ea3m gi\u00e1c \u0111\u00e1nh b\u1ea1c c\u1ee7a ri\u00eang b\u1ea1n. \u01afu ti\u00ean c\u00e1c doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c c\u00f3 nhi\u1ec1u tr\u00f2 ch\u01a1i video chuy\u00ean gia c\u00f2n s\u1ed1ng \u0111\u1ec3 l\u01b0u tr\u1eef tr\u00f2 ch\u01a1i c\u1ee7a b\u1ea1n th\u00fa v\u1ecb. \u0110\u00e1nh gi\u00e1 c\u00e1c d\u1ecbch v\u1ee5 tr\u00f2 ch\u01a1i tr\u00ean trang web cho Variety v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 \u0111\u1ecbnh v\u1ecb v\u1edbi c\u00e1c l\u1ef1a ch\u1ecdn c\u1ee7a m\u00ecnh. C\u00e1c \u01b0u \u0111\u00e3i ch\u1ea5p nh\u1eadn \u0111\u00f3ng vai tr\u00f2 l\u00e0 m\u1ed9t s\u1ef1 bao g\u1ed3m n\u1ed3ng nhi\u1ec7t cho c\u00e1c chuy\u00ean gia m\u1edbi trong c\u00e1c s\u00f2ng b\u1ea1c d\u1ef1a tr\u00ean web, c\u00f3 xu h\u01b0\u1edbng \u0111\u1ebfn h\u00ecnh th\u1ee9c c\u1ee7a m\u1ed9t k\u1ebf ho\u1ea1ch ch\u00e0o m\u1eebng pha tr\u1ed9n ti\u1ec1n th\u01b0\u1edfng c\u00f3 100 % c\u00e1c xoay v\u00f2ng mi\u1ec5n ph\u00ed.<\/p>\n

100 ph\u1ea7n tr\u0103m c\u00e1c v\u00f2ng quay mi\u1ec5n ph\u00ed kh\u00f4ng c\u00f3 ti\u1ec1n th\u01b0\u1edfng ti\u1ec1n g\u1eedi l\u00e0 g\u00ec?<\/h2>\n

Nh\u00e0 h\u00e0ng S\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng ph\u1ee5c v\u1ee5 nh\u01b0 m\u1ed9t khu b\u1ea3o t\u1ed3n \u0111\u1ec3 s\u1edf h\u1eefu nh\u1eefng ng\u01b0\u1eddi \u0111am m\u00ea tr\u00f2 ch\u01a1i khe, c\u00e1c b\u00e1o c\u00e1o xoay v\u00f2ng t\u1eeb phi\u00eau l\u01b0u, ph\u1ea1m vi r\u1ed9ng v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 kh\u00f4ng ng\u1eebng ph\u1ea5n kh\u00edch v\u1edbi m\u1ecdi reel. T\u1ef1 h\u00e0o v\u1edbi m\u1ed9t b\u1ed9 s\u01b0u t\u1eadp c\u00e1c ti\u00eau \u0111\u1ec1 v\u1ecb tr\u00ed \u0111\u1ed9c quy\u1ec1n, cho m\u1ed7i l\u1ea7n quay l\u00e0 m\u1ed9t nhi\u1ec7m v\u1ee5 cho th\u1ebf gi\u1edbi \u0111\u1ea7y \u0111\u1ee7 c\u1ee7a c\u00e1c b\u1ed1 c\u1ee5c \u0111\u1ed9c \u0111\u00e1o v\u00e0 b\u1ea1n s\u1ebd c\u00e1c t\u00ednh n\u0103ng s\u00e1ng t\u1ea1o. Duy\u1ec7t c\u00e1c b\u1ea3n in \u0111\u1eb9p v\u00e0 ki\u1ebfm \u0111\u01b0\u1ee3c gi\u1edbi h\u1ea1n, gi\u1edbi h\u1ea1n k\u00edch th\u01b0\u1edbc \u0111\u1eb7t c\u01b0\u1ee3c v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 th\u00eam c\u00e1c y\u00eau c\u1ea7u m\u1eadt kh\u1ea9u ti\u1ec1n th\u01b0\u1edfng khi so s\u00e1nh c\u00e1c \u01b0u \u0111\u00e3i n\u00e0y. Th\u00f4ng tin Th\u00f4ng tin n\u00e0y c\u00f3 th\u1ec3 gi\u00fap b\u1ea1n t\u1eadn d\u1ee5ng c\u00e1c \u01b0u \u0111\u00e3i m\u1edbi c\u00f3 s\u1eb5n. Tuy nhi\u00ean, kh\u00f4ng, ph\u1ea3n h\u1ed3i th\u00e0nh vi\u00ean c\u00f3 xu h\u01b0\u1edbng l\u00e0m n\u1ed5i b\u1eadt s\u1ef1 c\u1ea7n thi\u1ebft cho ph\u1ea1m vi tr\u00f2 ch\u01a1i n\u00e2ng cao v\u00e0 b\u1ea1n c\u00f3 th\u1ec3 nhanh h\u01a1n c\u00e1c th\u1eddi \u0111i\u1ec3m hi\u1ec7u \u1ee9ng h\u1ed7 tr\u1ee3 kh\u00e1ch h\u00e0ng nhanh h\u01a1n l\u00e0m tr\u00f2n ph\u1ea7n m\u1ec1m c\u1ee5 th\u1ec3.<\/p>\n

\"game<\/p>\n

V\u00ec v\u1eady, n\u00f3 t\u1ef1 l\u1ef1c cho ph\u00e9p ng\u01b0\u1eddi tham gia x\u00e1c \u0111\u1ecbnh ph\u01b0\u01a1ng ti\u1ec7n hoa h\u1ed3ng n\u1ed5i ti\u1ebfng, c\u0169ng nh\u01b0 bitcoin, \u0111\u00f4 la bitcoin, litecoin, ethereum, v.v. C\u00f3 b\u01b0\u1edbc 1,400+ Gi\u1ea3i ph\u00e1p thay th\u1ebf tr\u00f2 ch\u01a1i tr\u1ef1c tuy\u1ebfn, c\u01a1 s\u1edf \u0111\u00e1nh b\u1ea1c Stardust l\u00e0 m\u1ed9t trong nh\u1eefng doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c quan tr\u1ecdng nh\u1ea5t. \u0110i\u1ec1u n\u00e0y l\u00e0m cho n\u00f3 tr\u1edf th\u00e0nh m\u1ed9t s\u00f2ng b\u1ea1c \u0111\u1ecba ph\u01b0\u01a1ng r\u1ea5t linh ho\u1ea1t \u0111\u1ec3 b\u1ea1n s\u1eed d\u1ee5ng ph\u1ea7n th\u01b0\u1edfng b\u1ed5 sung kh\u00f4ng nh\u1eadn \u0111\u01b0\u1ee3c doanh nghi\u1ec7p \u0111\u00e1nh b\u1ea1c tr\u1ef1c tuy\u1ebfn c\u1ee7a m\u00ecnh t\u1eeb.<\/p>\n","protected":false},"excerpt":{"rendered":"

\u0110\u1ed1i v\u1edbi nhi\u1ec1u ng\u01b0\u1eddi \u0111ang \u0111\u00e1nh gi\u00e1 c\u00e1c s\u00f2ng b\u1ea1c tr\u1ef1c tuy\u1ebfn, vi\u1ec7c ki\u1ec3m tra th\u01b0 m\u1ee5c s\u00f2ng b\u1ea1c tr\u00ean internet \u0111\u01b0\u1ee3c cung c\u1ea5p \u00edt h\u01a1n \u0111\u1ec3 xem trong s\u1ed1 c\u00e1c t\u00f9y ch\u1ecdn t\u1ed1t h\u01a1n c\u00f3 s\u1eb5n. \u01afu \u0111i\u1ec3m \u0111\u1ec1 ngh\u1ecb ki\u1ec3m game kingfun tra gi\u1edbi h\u1ea1n c\u1ee7a nhau v\u00e0 \u0111\u1eb7t c\u01b0\u1ee3c th\u1ea5p nh\u1ea5t b\u1ea5t […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4867","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/posts\/4867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/comments?post=4867"}],"version-history":[{"count":1,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/posts\/4867\/revisions"}],"predecessor-version":[{"id":4868,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/posts\/4867\/revisions\/4868"}],"wp:attachment":[{"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/media?parent=4867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/categories?post=4867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4pie.com.mx\/index.php\/wp-json\/wp\/v2\/tags?post=4867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}